Components of a typical database environment, Database Management System

Assignment Help:

Question:

(a) List four disadvantages of the File Processing System as compared to the Database Systems.

(b) The integrity of a database is enforced by integrity rules. One of these rules, the referential integrity rules, states that the database must not contain any unmatched foreign key values.

(i) Discuss what should happen on an attempt to delete the target of a foreign key reference?

(ii) Discuss what should happen on an attempt to update the primary key of the target of a foreign key reference?

Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique.

(c) List and describe briefly the nine components of a typical database environment.

(d) Explain the difference between external, internal and conceptual schemas. How are these different schema layers related to the concept of logical and physical data independence?


Related Discussions:- Components of a typical database environment

Convert encrypted hsql database into csv format, Project Description: We...

Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n

What are the advantages of embedded query language, What are the advantages...

What are the advantages of embedded query language? Give an example of an embedded SQL query. Embedded query language - SQL could be implemented within two ways. It can be us

Exclusive lock, Exclusive lock It is asked for by a transaction on...

Exclusive lock It is asked for by a transaction on a data item that it wants to update. No other transaction can put either a shared lock or an exclusive lock on a dat

Adding redundant associations for efficient access, Adding Redundant Associ...

Adding Redundant Associations for Efficient Access Redundant associations do not add any type of information, therefore during design we should actually examine structure of o

Relationship between security and integrity, Relationship between Security ...

Relationship between Security and Integrity: Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually

Define object-oriented database, Question : Object-Oriented Database (O...

Question : Object-Oriented Database (OODM) is defined as a logical data model that captures the semantics of objects supported in object-oriented programming. An Object-Oriente

Illustration of implementation of inheritance, Illustration of implementati...

Illustration of implementation of inheritance Let us take the illustration of implementation of inheritance. Suppose that we are about to implement the Stack class and by now w

Database system design and Implementation, Consider a typical sales invoice...

Consider a typical sales invoice that would include the following information. Design a single table to hold all of the information required to store an invoice including this info

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd