Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
This Question refers to the database schema given in the Appendix.
(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.
(b) Using the database schema, express the following queries in SQL:
(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.
(ii) Insert the first row in the TIMETABLE table and make any assumption.
(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.
(iv) Find the numbers of students who have achieved one or more final grade greater than 14.
(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or ‘accountancy'.
vertical fragmentation
Define Atom of domain relational calculus An atom has the outline 1 , x 2 , ... , x n > -> r , in which r stands for a relation on n attributes and x 1 , x 2 , ... , x n ar
Consistency: This property makes sure that a complete transaction implementation takes a database from one consistent state to another consistent state. If the transaction fails e
Rules Of Data Normalisation Let us now summarise Normalisation with the help of various clean rules. The following are the necessary rules for the Normalisation process: 1.
Write a short note on built in function in QBE? Built in function in QBE: QBE involves various built in functions like AVG, MAX,MIN,SUM and CNT. We must prefix these operator
Describe the functions and features of foreign key? Foreign Key : The primary key of one file or table that is implanted in another file or table to implement the relationships
Differance between procedural and non procedural DML? Procedural and non procedural DML Procedural DML exactly what data is require and how to obtain those data. Non procedural
What is system log? What are the entries? Ans: The system log that is generally written on stable storage contains the redundant data required to recover from volatile
Order by clause By using this rows can be sorted It is used in the last portion of select statement By default it gets ascending order DESC: is used
Describe Embedded Query Language? Embedded Query Language - A query language (e.g., SQL) can be implemented in two ways. It can be used interactively or embedded within a host
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd