Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Before we talk about the relational model in more detail, let us first define some very basic terms used in this model.
Tuple
Every row in a table shows a record and is called a tuple. A table containing 'n' attributes in a record is called n-tuple.
Attribute
The name of every column in a table is used to interpret its meaning and is known as an attribute. Every table is called a relation.
For instance, Figure shows a relation PERSON. The columns NAME, PERSON_ID, AGE and ADDRESS are the attributes of PERSON and every row in the table represents a separate tuple (record).
Relation Name: PERSON
PERSON_ID
NAME
AGE
ADDRESS
TELEPHONE
1
Sanjay Prasad
35
b-4,Modi Nagar
011-25347527
2
Sharad Gupta
30
Pocket 2, Mayur Vihar.
023-12245678
3
Vibhu Datt
36
c-2, New Delhi
033-1601138
Figure: An extended PERSON relation
What is an object design? Object design is a very interactive method, which decides the relationship among objects, classifies operations on classes, determines overall system
Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock
Define Atom of domain relational calculus An atom has the outline 1 , x 2 , ... , x n > -> r , in which r stands for a relation on n attributes and x 1 , x 2 , ... , x n ar
The Incident table, with an auto-incrementing incident number, etc, looks like: incident_num reporter date time incide
Differance between Unordered and ordered file ? Unordered file do no has any sequence although ordered file has arranged in a few sequence and data are assigned in ordered form
Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s
Illustrate the Deployment Diagram A deployment diagram shows all nodes on network, their processor execution and interconnections. In a dynamic model, this is used to represen
Explain weak and strong entity sets? Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that k
Assume that you are responsible for selecting a new DBMS product for Sohar Hospital
What is hash file organization? What are the causes of bucket overflow within a hash file organization? What can be completed to decrease the occurrence of bucket overflow?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd