Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Database design
Database tables will be created for you on the Technology web server. The schema will be as follows. Please note that this is a simplified database structure, designed to make it straightforward to implement the assignment on a basic level; you can modify this or add additional tables if you wish. Only the first two tables are absolutely essential to implement a bare pass solution.
sc_users table
Records users in the system, and whether they are an administrator or a regular user.
ID INT PRIMARY KEY
isadmin TINYINT
name VARCHAR(255)
username VARCHAR(255)
password VARCHAR (255)
dayofbirth INT
monthofbirth INT
yearofbirth INT
filmshowings
Records the current film showings.
film VARCHAR(255)
date VARCHAR(255)
time VARCHAR(255)
screen INT
maxtickets INT
certificate VARCHAR(5)
mybookings
A table which can be used if you wish to implement code to allow users to view, change and cancel their bookings. Not required for a bare pass answer but useful for more advanced answers.
username varchar(255)
showingID INT
ntickets INT
Differentiate between strict two-phase and rigorous two-phase with conversion protocol Ans: Strict two-phase locking holds all its exclusive that is write locks until commit t
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be
Process of Adjustment of inheritance During object design, inheritance is readjusted by rearranging classes and operations, and abstracting common behaviour.
Explain the EXISTS and UNIQUE functions of SQL. Give an example for each? EXISTS: The EXISTS function takes one parameter that is a SQL statement. If any records exist which
Types of Locks There are two necessary types of locks: Binary lock : This locking mechanism has two states for to a data item: locked or unlocked Multiple-mode loc
What is meant by computing the closure of a set of functional dependency? The closure of F denoted by F + is the set of functional dependencies logically implied by F.
Given the subsequent relations: vehicle (reg_no, make, colour) Person (eno, name, address) Owner (eno, reg_no) Write expressions
During the deletion of a tuple two cases can happen: Deletion of tuple in relation having the foreign key: In this type of case simply delete the desired tuple. For example, in
Advantages of Database management system Let us summarize the advantages. Reduction of Redundancy: This is perhaps the most important advantage of using DBMS. Redundancy i
Which element in the database can modified by changing the data dictionary? Data elements in the database can be changed or modified through changing the data dictionary.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd