Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) List four disadvantages of the File Processing System as compared to the Database Systems.
(b) The integrity of a database is enforced by integrity rules. One of these rules, the referential integrity rules, states that the database must not contain any unmatched foreign key values.
(i) Discuss what should happen on an attempt to delete the target of a foreign key reference?
(ii) Discuss what should happen on an attempt to update the primary key of the target of a foreign key reference?
Your discussion should describe the three possible techniques which can be used to deal with the problem, and provide one example for each technique.
(c) List and describe briefly the nine components of a typical database environment.
(d) Explain the difference between external, internal and conceptual schemas. How are these different schema layers related to the concept of logical and physical data independence?
List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of
Describe the storage structure of indexed sequential files and their access method. Ans: Storage structure of Indexed Sequential files and their access: To achieve fast rand
The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located
Describe the statement in SQL which allows to change the definition of a table? In SQL Alter statement is used to allow the changes the definition of a table.
1. Define each of the following IN YOUR OWN WORDS: (a) File: (b) Record: (c) Field: (d) Primary Key: (e) Secondary Key: 2. A travel agency wants t
CREATE TABLE prodtrans ( pno number (4) ptype char (1) CHECK (ptype in ('I','R','S')), qty number (5) FOREIGN KEY pno REFERENCES product (pno) ON DELETE CASCADE);
Describe the advantage of State chart Diagram A state chart represents a state machine, emphasizing flow of control from one state to other. A state machine is a behaviour whi
Types of Data fragmentation
discuss the purpose of the concurrency control?
Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd