Integrity of a database enforced by integrity rules, Database Management System

Assignment Help:

Question:

This Question refers to the database schema given in the Appendix.

(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.

(b) Using the database schema, express the following queries in SQL:

(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.

(ii) Insert the first row in the TIMETABLE table and make any assumption.

(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.

(iv) Find the numbers of students who have achieved one or more final grade greater than 14.

(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or
‘accountancy'.


Related Discussions:- Integrity of a database enforced by integrity rules

Explain outer join, Explain outer join? Outer Join - If there are any...

Explain outer join? Outer Join - If there are any values in one table which do not have corresponding value(s) in the other, in an equi-join which will not be chosen. Such ro

What are referential integrity constraints, What are referential integrity ...

What are referential integrity constraints? A value that appears in single relation for a given set of attributes also appears for a particular set of attributes in another rel

Explain cursors in sql, Explain cursors in SQL? Cursors in SQL - An o...

Explain cursors in SQL? Cursors in SQL - An object used to store the output of a query for row-through-row processing through the application programs. Cursors are constructs

What is deadlock, What is deadlock? Neither of the transaction can ever...

What is deadlock? Neither of the transaction can ever proceed with its normal implementation. This situation is known as deadlock.

Explain the utilities which help the dba to manage database, Explain the ut...

Explain the utilities which help the DBA to manage the database? Every DBA uses database utilities to maintain and control their databases. But there is a lot of confusion wit

Property management database, You are to write a property management databa...

You are to write a property management database program that allows a real estate agent to view, add, search, and save property listings. The program is to do the following: 1.

Explain growing phase of locking, Explain Growing Phase of locking Grow...

Explain Growing Phase of locking Growing Phase: In this phase the transaction can only obtain locks, but cannot release any lock. The transaction enters the growing phase as so

I need help on the following 5 questions, 1. Define and discuss Work Breakd...

1. Define and discuss Work Breakdown Structure, Critical Path Analysis, PERT charts and GANTT charts. Describe the role of each in determining scope, budgets, and schedules? What

What is called bit-level striping, Normal 0 false false fal...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Aggregation, What does Aggregation mean?

What does Aggregation mean?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd