Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Conversion of entity sets:
I) For every strong entity type E in the ER diagram, we make a relation R containing all the easy attributes of E. The relation R primary key will be one of the key attributes of R.
For example, the STUDENT, FACULTY, COURSE and DEPARTMENT tables in Figure.
STUDENT
ROLLNO: Primary Key
NAME
ADDRESS
FACULTY
ID: Primary
Key
BASIC_SAL
COURSE
COURSE_ID: Primary Key
COURSE_NAME
DURATION
DEPARTMENT
D_NO: Primary Key
For each weak entity type W in the E R Diagram, we make another relation R that have all easy attributes of W. If E is an owner entity of W then key attribute of E is also contained in R. This key attribute of R is set as a foreign key attribute of R. Now the mixture of primary key attribute of owner partial key and entity type of weak entity type will form the key of the weak entity type.
The weak entity GUARDIAN, where the key field of student entity
RollNo has been added.
RollNo Name
(Primary Key)
Address
Relationship
what do you mean by primary key constraint?
Describe association design of an object by giving one suitable example of it. The Design of Associations Associations are "glue" of advanced object oriented analysis and
What is Cross Product? Simply Cross product is Binary Operator
Define functional and multivalued dependencies. Ans: A functional dependency is a assets of the semantics of the attributes in a relation. The semantics point out how at
Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF. This database stores records from a (ve
What is the main difference between read-only and update methods? A read-only method does not affect the values of a variable in an object, whereas an update method may alter t
Consider a research paper submission process. The process starts when an author submits a draft research paper (the paper may have up to 3 authors) to the chair of the organizing c
Which is another name for weak entity? Child is another name of weak entity.
What are the two integrity rules? Ans: The two integrity rules are: Entity Integrity Rule & Referential Integrity Rule. Entity Integrity Rule - If the attribute A of rel
What is difference between TRUNCATE and DELETE? - Truncate can't be rolled back whereas Delete can be. - Truncate keeps the lock on table whereas Delete keeps the lock on ea
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd