Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
This Question refers to the database schema given in the Appendix.
(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.
(b) Using the database schema, express the following queries in SQL:
(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.
(ii) Insert the first row in the TIMETABLE table and make any assumption.
(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.
(iv) Find the numbers of students who have achieved one or more final grade greater than 14.
(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or ‘accountancy'.
Update or Modify operation alters the existing values. If these operations alter the value that is the foreign key also, the only check need is the similar as that of the Insert op
what is entity in database system?
Attributes that are directly kept in the data base. For example, 'Birth date' attribute of a person. Derived Attributes that are not stored directly but can be derived
Define average seek time. The average seek time is the average of the seek times, calculated over a sequence of random requests.
The database application project (DAP) for this assignment consists of the creation of a fully functional Microsoft Access database application for a real client. I recommend you s
A use case diagram giving a pictorial overview of user requirements and brief use case descriptions. As the case study contains only an outline of a business scenario, you will als
Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n
I need solution of the question posted at http://www.expertsmind.com/questions/sql-query-for-testing-triggers-and-stored-procedures-30140149.aspx
Discuss deferred update technique of recovery. What are the advantages? Ans: The deferred update methods do not physically update the database on disk till after a transact
Use Delegation to Share Implementation The delegation " Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd