Integrity of a database enforced by integrity rules, Database Management System

Assignment Help:

Question:

This Question refers to the database schema given in the Appendix.

(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.

(b) Using the database schema, express the following queries in SQL:

(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.

(ii) Insert the first row in the TIMETABLE table and make any assumption.

(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.

(iv) Find the numbers of students who have achieved one or more final grade greater than 14.

(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or
‘accountancy'.


Related Discussions:- Integrity of a database enforced by integrity rules

Concurrency executions, Explain TPS concurreny executions stating their adv...

Explain TPS concurreny executions stating their advantages in online business advancement

RDBMS, what is RDBMS? how it works? good example.

what is RDBMS? how it works? good example.

Linear commit protocol, With the linear commit protocol, sites are connecte...

With the linear commit protocol, sites are connected in a chain, and the subtransaction at the left-hand end of the chain initiates the protocol. Propose a crash recovery protocol

What are the purpose for having variable length records, What are the purpo...

What are the purpose for having variable length records? What kinds of separator characters are required for each? Variable-Length Records - Variable-length records are thos

Data manipulation language, Data Manipulation Language Data manipulatio...

Data Manipulation Language Data manipulation language (DML) describes a set of commands that are used to query and change data within existing schema objects. In this case comm

Define the division operation of relational algebra, Define the Division Op...

Define the Division Operation of Relational Algebra Let R be a relation comprising attributes (A1,...Ap,Ap+1,...An) and S comprising attributes (Ap+1,...An)  DEF: Division

Update anomaly-data redundancy, Update Anomaly : This anomaly is occurred d...

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014

Create a table to record a passengers information, Given the following rela...

Given the following relations TRAIN (NAME, START, DEST) TICKET (PNRNO., START, DEST, FARE) PASSENGER (NAME, ADDRESS, PNRNO.) Write SQL expressions for the following queries: No

Define catalog and meta data, Define Catalog and meta data ? A catalog ...

Define Catalog and meta data ? A catalog is a compilation of records elaborating the contents of a particular collection or group of collections. Metadata (Meta data, or someti

What is a data warehouse, Problem 1 What is a Data Warehouse? Mention i...

Problem 1 What is a Data Warehouse? Mention its advantages 2 Explain the Top-Down and Bottom-up Data Warehouse development Methodologies 3 What is Data Transformation? Ex

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd