Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Before we talk about the relational model in more detail, let us first define some very basic terms used in this model.
Tuple
Every row in a table shows a record and is called a tuple. A table containing 'n' attributes in a record is called n-tuple.
Attribute
The name of every column in a table is used to interpret its meaning and is known as an attribute. Every table is called a relation.
For instance, Figure shows a relation PERSON. The columns NAME, PERSON_ID, AGE and ADDRESS are the attributes of PERSON and every row in the table represents a separate tuple (record).
Relation Name: PERSON
PERSON_ID
NAME
AGE
ADDRESS
TELEPHONE
1
Sanjay Prasad
35
b-4,Modi Nagar
011-25347527
2
Sharad Gupta
30
Pocket 2, Mayur Vihar.
023-12245678
3
Vibhu Datt
36
c-2, New Delhi
033-1601138
Figure: An extended PERSON relation
Explain the Recoverable Schedule A recoverable schedule is one in which for each pair of transactions Ti and Tj such that Tj reads a data item formerly written by Ti, the comm
Describe an data dictionary? A data dictionary is a data structure which keeps meta data about the structure of the database ie. the schema of the database.
Define Outer join Outer join - If there are any type of values in the one table that do not have corresponding value(s) in the other, in an equi-join which will not be selected
Should I select imaging software that allows changes? An imaging system should not give features to edit or alter images. Images generally are formed as safe and secure records
What is meant by normalization of data? It is a process of examining the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the prop
How can we Classify the operations on classes This step fundamentally means all three models functional, object and dynamic (studied in last section) must be combined so that
We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like
Explain briefly concurrent task by taking an example. Concurrent Task- The concurrent occurrence of more than one event is called concurrent task. Operating systems can handl
what are the main characteristics of database
Wait-die" scheme : The idea is based on non-preventive method. It is based on a simple rule: If Ti requests a database resource that is held by T
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd