Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
This Question refers to the database schema given in the Appendix.
(a) The integrity of a database is enforced by integrity rules. Discuss what should happen on an attempt to delete the target of a foreign key reference (for example, to delete a lecturer in the LECTURER table who lectures at least one unit listed in the TIMETABLE table)? Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique by using the above tables.
(b) Using the database schema, express the following queries in SQL:
(i) Create the TIMETABLE table including the primary and foreign key constraints in the code. Make any assumption you want to make.
(ii) Insert the first row in the TIMETABLE table and make any assumption.
(iii) Modify the code value to Workshop for the above record created assuming that the rest of the values have already been created.
(iv) Find the numbers of students who have achieved one or more final grade greater than 14.
(v) Find the student number, unit number and final grade for those students attending units run by the departments named ‘computing' or ‘accountancy'.
The Third Normal Form (3NF) Even though, transforming a relation that is not in 2NF into a number of relations that are in 2NF take out many of the anomalies, it does not neces
What is a records management consultation? Our organization is an authority for disseminating your specific requirements and giving you with a solution to effectively manage yo
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set
Differentiate between logical database design and physical database design. Show how this separation leads to data independence? Basis Logical Databas
what is Storage-Device Hierarchy question
Describe the algorithm for updating indices for a single level index when a record is (i) Inserted (ii) deleted What will be the modification if there are multilevel in
I need help for my Uni assignments
What is known as a search key? An attribute or set of attributes used to look up records in a file is known as a search key.
What are the features of embedded SQL? Explain. Embedded SQL - SQL could be implemented within two ways. It can be used interactively or embedded in a host language or throu
Develop Database academic assignment Project Description: For a provided set of instructions in a case study design Entity Relationship Diagram. - Entity Relationship Diag
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd