Components of a typical database environment, Database Management System

Assignment Help:

Question:

(a) List four disadvantages of the File Processing System as compared to the Database Systems.

(b) The integrity of a database is enforced by integrity rules. One of these rules, the referential integrity rules, states that the database must not contain any unmatched foreign key values.

(i) Discuss what should happen on an attempt to delete the target of a foreign key reference?

(ii) Discuss what should happen on an attempt to update the primary key of the target of a foreign key reference?

Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique.

(c) List and describe briefly the nine components of a typical database environment.

(d) Explain the difference between external, internal and conceptual schemas. How are these different schema layers related to the concept of logical and physical data independence?


Related Discussions:- Components of a typical database environment

Information infrasctructure., what factors might influence a company to out...

what factors might influence a company to outsource its IT infrascture.

Describe the definition of a transaction in sql, Describe the definition of...

Describe the definition of a transaction in SQL  Ans: The SQL transaction starts implicitly. Transactions are finished by either Commit work that commits the transaction and st

What are the benefits of document scanning, What are the benefits of docume...

What are the benefits of document scanning? Document scanning, in addition to being cost-efficient, also enhances productivity. This service enhances security as you set the pa

RAID technology, what characterizes the levels in RAID technology

what characterizes the levels in RAID technology

Explain entity integrity and referential integrity rules, Explain entity in...

Explain entity integrity and referential integrity rules within relational model. Show how these are realized in SQL? Entity Integrity Rule - No primary key value could be nu

Determine that the checkpoints are a part of, 1. Determine that the Checkpo...

1. Determine that the Checkpoints are a part of  Ans: Checkpoints are a part of Recovery measures

Differentiate between b-tree and b+ tree, Differentiate between B-tree and ...

Differentiate between B-tree and B + tree    Ans:  A B-tree (or Balanced Tree) is a search tree along with additional constraints that makes sure that the tree is all the time

We need help in booking system for golf business, We need help in Booking S...

We need help in Booking System for Golf Business Development of a web based booking system which permits clients to book golf lessons with the following features- a) 4 user p

Sql, Events4Fun is an event management company in Europe with branches in S...

Events4Fun is an event management company in Europe with branches in South America as well. The company is well-known for its efficiency, good-quality services, and affordable char

What is system r, What is System R? What are its two major subsystems? ...

What is System R? What are its two major subsystems? System R was intended and developed over a period of 1974-79 at IBM San Jose Research Center. It is a prototype and its pur

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd