Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
This Question refers to the database schema given in the Appendix.
(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.
(b) Using the database schema, express the following queries in SQL:
(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.
(ii) Insert the first row in the TIMETABLE table and make any assumption.
(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.
(iv) Find the numbers of students who have achieved one or more final grade greater than 14.
(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or ‘accountancy'.
Draw the precedence graph of the following schedule and determine whether the schedule is serializable. (Note that all instructions, except lock and unlock, are omitted. We assume
Ways for Selecting Data Structure Algorithms operate on data structure. Therefore, selection of the best algorithm means selecting the best data structure from whole bunch. Th
Explain the concept of QBE? Query-by-example represents a visual/graphical approach for accessing information in a database by the use of query templates called as skeleton tab
Problem : (b) A deductive database system is essentially the outcome of applying mathematics logic to database management, where logic is used for both data representation and
Where does view definition stored? A view definition is permanently stored as part of the database.
Explain Deadlock detection and recovery Deadlock Detection - A deadlock is said to take place when there is a circular chain of transaction, every waiting for the release of a
What is the need of a log in a DBMS? Briefly describe the various types of records that are normally present in a log. Ans: The system log, which is generally writt
Primary index A primary index is a file that has a sorted series of records having two columns: a block address for that key field in the data file; and the ordering key field.
I have one assignment that has to be done in neo4j
These are interactive interfaces, graphical that hide the difficulty of the DBMS and query language behind an intuitive, simple to understand, and convenient interface. This permit
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd