Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
One-to-many: An entity in A is related with any number of entities in B. An entity in B is related with at the most one entity in A.
Example: Relationship between faculty and department.
One department can take on any number of faculty members but a faculty member is assigned to only one department.
Example: Relationship between course and instructor. An instructor can teach several courses but a course can be taught only by one instructor. Please note this is an assumption
What is property - properties of a database ? It is an integrated collection of logically related records. It consolidates separate files into a common pool of data records and
Define value set? Value set: It is a set of values. You do not always need a user to enter junk free text within all the fields. Therefore, Oracle Apps uses value set to valida
Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014
What is Relational Algebra? Relational algebra is a Procedural query Language?
Determine the advantage of object-orientation Finally, object-orientation has advantage of continuity throughout analysis, persistent representation and design implementation.
Explain the shadow paging recovery technique. Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i
List the set operations of SQL? 1) Union 2) Intersect operation 3) The except operation
Before defines the second type of integrity constraint, viz., Entity Integrity, we should be well-known with the concept of NULL. Mostly, NULL is intended as a basis for dealing
Creating views with Replace option : This option is used to alter the definition of the view without recreating and dropping it or regranting object privileges previously granted o
Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd