Components of a typical database environment, Database Management System

Assignment Help:

Question:

(a) List four disadvantages of the File Processing System as compared to the Database Systems.

(b) The integrity of a database is enforced by integrity rules. One of these rules, the referential integrity rules, states that the database must not contain any unmatched foreign key values.

(i) Discuss what should happen on an attempt to delete the target of a foreign key reference?

(ii) Discuss what should happen on an attempt to update the primary key of the target of a foreign key reference?

Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique.

(c) List and describe briefly the nine components of a typical database environment.

(d) Explain the difference between external, internal and conceptual schemas. How are these different schema layers related to the concept of logical and physical data independence?


Related Discussions:- Components of a typical database environment

Give the limitations of sql authorization, Give the limitations of SQL auth...

Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

What is the state machine engine, What is the State Machine Engine The...

What is the State Machine Engine The straightest approach to implement control is to have any way of explicitly representing and executing state machines. With the help of thi

Which is the properties of entities, Which is the properties of entities? ...

Which is the properties of entities? Attributes is the properties of entities.

Explain the disadvantages of creating a temporary table, Explain the disadv...

Explain the disadvantages of creating a temporary table? If you have already created a temporary table with a shown name and attempting to create a second one with that nam

Relational database integrity, A database is a set of data. But, is the dat...

A database is a set of data. But, is the data kept in a database trustworthy? To answer that query we must first answer the question. What is integrity? Integrity simply means t

What is the function of io/m signal in the 8085, What is the function of IO...

What is the function of IO/M signal in the 8085? It is a status signal. It is used to differentiate among memory locations and I/O operations. When this signal is low (IO/M = 0

Data handling and research methods, Data Handling and Research Methods: ...

Data Handling and Research Methods: The dataset encompassing 130 participants contains several variables measuring detrimental health related behaviours referring to the use o

Data modelling and normalization methodology, MOSS VALE is a town with 1500...

MOSS VALE is a town with 15000 inhabitants. The fire department wishes to develop a system that automates the despatch of fire engines to attend fires. The ERD below describes the

What is called as an n-way merge, What is called as an N-way merge? The...

What is called as an N-way merge? The merge operation is a generalization of the two-way merge used by the standard in-memory sort-merge algorithm. It merges N runs, so it is k

Domains, A domain is a set of permissible values that can be given to an at...

A domain is a set of permissible values that can be given to an attribute. So each attribute in a table has a definite domain. Values to these attributes cannot be assigned outside

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd