Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Consider the following relational schema for a library:
member(memb_no,name,dob) books(isbn,title,authors,publisher) borrowed(memb_no,isbn,date)
Write eh following queries in relational algebra.
a. Find the names of members who have borrowed any book published by "McGraw-Hill". b. Find the names of members who have borrowed all book published by "McGraw-Hill". c. Find the name and membership number of members who have borrowed more than five books published by "McGraw-Hill". d. Find the name and membership number of members who have borrowed more than five different books of that publisher. e. Find the average number of books borrowed per member. Take into account that if a member does not borrow any books, then that member does not appear in the borrowed relation at all.
Draw an ER diagram for database scenario. Design a set of 3NF tables for your database scenario.
You have probably seen that already when you tried to create an E-R diagram. Visio uses notation and graphical shapes that are not the same as those in your text. If you look at some of the links to schemas, you will see a similar sort of thing.
Describe the difference ways of implementing one-to-one relationships. Assume you are maintaining information on offices (office numbers, building, and phone numbers)
List the sequence of relational algebra operations needed to implement the queries.
Find the maximum salary of all employees who are not managers. Give all the managers in the database a 10 percent salary raise. Give all the other employees a 5 percent salary raise.
Why do you believe that views by themselves are insufficient for protecting access by unauthorized users?
What is lock granularity? Explain the use of BEGIN, COMMIT, and ROLLBACK TRANSACTION statements. Explain the meaning of expression ACID transaction.
Examine different sales transactions. Design a context diagram and a level-0 diagram that represent the selling system at the store.
VSS has an existing software package that controls its high bay systems and wants to rewrite it. The existing system is written in C and uses C-ISAM files to store data.
In talking about database security, some aspects to regard as are Data Integrity, Confidentiality, and Malicious Activity. Illustrate how does database security relate to data integrity?
What criteria would you use in selecting a life-cycle model for the project?
Data Modeling and Normalization
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd