Reference no: EM131077290
Answer each of the following questions labeling your answers clearly. Save your work in the Desire 2 Learn Dropbox for Week 06 - Review Questions.
1. What type of integrity is enforced when a primary key is declared?
2. Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.
3. Explain two major components of SQL.
4. What is the difference between a column constraint and a table constraint?
5. Write the SQL command that will create a user-defined data type called KEY_CODE for all the primary keys containing character values with a length of 7.
6. Within the context of a database, explain authentication.
7. What is the objective of SQL?
8. Describe the two types of tables that exist in a database.
9. What are "referential constraint actions"?
10. Write the SQL command that will delete the EMPLOYEE table from the database.
11. Explain why it would be preferable to use a DATE data type to store date data instead of a character data type.
12. What is a database?
13. What is a user-defined data type?Why is it used?
14. Describe the purpose of the IDENTITY property.
15. Within the context of a database, what are constraints?
16. If you create a database called inventory, what two files are created?
17. Within the context of a database, what is a table?
18. What special meaning does using the @, @@, # and ## symbols have at the beginning of an identifier?
19. List and explain three constraints.
20. Write the SQL code command that will drop the PAYROLL database.
Determining the rest for kernel data
: Assuming 64KB of program flash memory and 64KB of data SRAM, assign values to BMXxxxBA special function registers to partition the program flash memory into 50KB for kernel program and rest for user program; and partition the data SRAM into 10KB f..
|
Data warehouse consists of four dimensions
: Suppose a market shopping data warehouse consists of four dimensions: customer, date, product and store and two measures: count and avg_sales, where avg_sales stores the real sales in dollar at lowest level but the corresponding average sales at o..
|
Create a power point slide show
: Choose an historical event, short story, speech, or other document, create a power point slide show from the document. The slide show has a title slide that displays your name and the title of your slide show, table of contents slide that provides..
|
Corresponding iceberg cube
: Data Warehousing and OLAP for data mining (a) Suppose the base cuboid of data cube contains only two cells (a1, a2, a3 ...a10) (b1, b2, b3 ....b10) Where ai = bi where i is an odd number otherwise ai ≠ bi.
|
Explain two major components of sql
: 1. What type of integrity is enforced when a primary key is declared? 2. Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type. 3. Explain two major compon..
|
Workbook and a worksheet group in excel
: What is the difference between a Workbook and a Worksheet group in excel?
|
How it work in a pseudocode
: What three elements are used to make a loop work? How's it work in a pseudocode?
|
Tunnel cost comparisons
: Search the internet for the link to the Boston tunnel, "the Big Dig" or the "Channel Tunnel," and London's Millennium Dome. In spite of their poor cost performance, why do you think these projects were supported to their conclusion? What would it ..
|
Adaptive tree walk protocol
: Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?
|