Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
One-to-many: An entity in A is related with any number of entities in B. An entity in B is related with at the most one entity in A.
Example: Relationship between faculty and department.
One department can take on any number of faculty members but a faculty member is assigned to only one department.
Example: Relationship between course and instructor. An instructor can teach several courses but a course can be taught only by one instructor. Please note this is an assumption
How is concurrency identified? Concurrency in objects can be identified by the way they alter their state. Current objects can change their state independently. Aggregation imp
What is a recovery scheme? An integral part of a database system is a recovery scheme that can restore the database to the reliable state that existed before the failure.
The Second Normal Form (2NF) Definition: A relation is in 2NF if it is in 1NF and each non-key attribute is fully dependent on each candidate key of the relation. Some of th
Convert the following ER - diagram (Entity Relationship Diagram) into a relational database (the primary keys are underlined): Ans: The relational database schema f
What are audit trails? An audit trail is a log of all alters to the database along with information like which user performed the change and when the alter was performed.
Write A short note on temporary tables? Temporary Tables - Temporary tables exists solely for a particular session, or whose data persists for the duration of the transaction
What are the kinds of Strings? -A binary string in MySQL is one that MySQL treats as case sensitive in comparisons. -A non binary string in MySQL is one that MySQL does'nt
At its most essential level the DBMS architecture can be divide into two parts: the back end and the front end. The back end is responsible for managing the physical database an
Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in
Which method is used to key transformation ? A hash method is used to key transformation.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd