Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write A short note on temporary tables?
Temporary Tables - Temporary tables exists solely for a particular session, or whose data persists for the duration of the transaction. The temporary tables are commonly used to support specialized rollups or exact application processing requirements. Unlike a permanent table, a temporary table does not automatically allocate space while it is formed. Space will be dynamically allocated for the table as rows are inserted. The CREATE GLOBAL TEMPORARY TABLE command is used to form a temporary table in Oracle. CREATE GLOBAL TEMPORARY TABLE ( )ON COMMIT {PRESERVE|DELETE} ROWS;
What is ICR? A. ICR (Intelligent Character Recognition) is a technology that gives scanning and imaging systems the ability to identify images of hand-printed or script charact
What are composite objects? Objects that have other objects are known as complex objects or composite objects.
Question: AirwaysCentre, an international airline booking company currently uses a relational database system for their operations, which includes the following relations: P
What is candidate key? Candidate Key - A candidate key of an entity set is a minimal superkey, which uniquely identifies each row in the relation.
What are the various states through which a transaction passes through in its lifetime? Briefly discuss all the events that causes transition from one state to another. Ans:
All edges of a cube are expanding at a rate of 6 centimeters per second. How fast is the surface area changing when each edge is (a) 2 centimeters and (b) 10 centimeters?
Northwind Pty Ltd sells a variety of food products throughout the world. They want to use the reporting features of SAP''s Business Information Warehouse to better understand thei
Which method of access uses key transformation? A Hash method of access uses key transformation.
1 NF Normal Form The domain of attribute must add only atomic (simple, indivisible) values First normal form (Minimal Form or 1NF) is a normal form need in database normalizat
Suppose an instruction takes 1 nanosecond to execute (on average), a page fault takes 20 microseconds of processor time, and it takes 300 microseconds of disk time to read or write
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd