Write a query to find name from the relational algebra, Database Management System

Assignment Help:

Consider the relations
City (city_name, state)
Hotel (name, address)
City_hotel (hotel_name, city_name, owner)

Answer the following queries in relational algebra
(i) Find out the names and address of hotels in Agra.
(ii) List the names of cities that have no hotel.
(iii) List the names of the hotels owned through ‘Taj Group'.

Ans: (i) Π name, address ( σ city_name= ‘Agra' (Hotelname=city_name City_hotel))
(ii) Π city_name (City) - Π city_name(City_hotel)
(iii) Π hotel_name ( σ owner='Taj Group' (City_hotel))


Related Discussions:- Write a query to find name from the relational algebra

Operator precedence-data manipulation language, Operator Precedence The...

Operator Precedence The basic operators used in SQL are * /   - + Operators of the similar priority are evaluated From Left to right Parentheses are used to force priorit

Erd, Table_Name( attribute_1, attribute_2, attribute_3, ….. ,attribute_x) ...

Table_Name( attribute_1, attribute_2, attribute_3, ….. ,attribute_x) Primary Key ( attribute_1, attribute_2) Foreign Key attribute_4 References Table_Name_2 (repeat for each fore

Demonstrate the uml model, Demonstrate the UML model Using UML, it is p...

Demonstrate the UML model Using UML, it is possible to generate code in any of the programming language from UML model (called forward engineering) and rebuild a model from an

When it is better to use files than a dbms, When It is better to use files ...

When It is better to use files than a DBMS? It is better to use files than a DBMS when Multiple users wish to access the data.

Example of ancestry database , Ancestry database records information about ...

Ancestry database records information about family trees . Following information is recorded about each person: FIRSTNAME first name SURNAME surname MNAME maiden name (if

Explain the deadlock avoidance, Define deadlock avoidance. An alternat...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Explain the two constraints check and foreign key in sql, Explain the two c...

Explain the two constraints, check and foreign key in SQL along with an example for each. Give the syntax. CHECK constraint - CHECK constraint specifies an expression which

Entity integrity constraint - relational constraints, It defines that no pr...

It defines that no primary key value can be null. This is as the primary key is used to recognize individual tuple in the relation. So we will not be able to recognize the records

Define the terms physical schema and logical schema., Define the terms 1) p...

Define the terms 1) physical schema 2) logical schema. Physical schema: The physical schema explains the database design at the physical level, which is the lowest level of abs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd