Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Creating views with check option: This option limits those updates of data values that cause records to go off the view. The following instance tells this in more detail:
Example: To produce a view for employees of Department = 30, such that user cannot alter the department number from the view:
CREATE OR REPLACE VIEW EMPD30 AS
SELECT EMPNO EMPL_NUM, ENAME NAME, SAL SALARY FROM EMP
WHERE DEPTNO=30
WITH CHECK OPTION;
Now the user cannot alter the department number of any record of view EMPD30. If this change is permitted then the record in which the change has been made will go off the view as the view is only for department-30. This restricted due to use of WITH CHECK OPTION clause
Explain the concept of deadlock Yes. It can direct to deadlock. Suppose that a batch of frames arrived correctly and were accepted. Then receiver will advance its window. Now s
Explain Composite attribute in SQL ? Composite attribute: A composite attribute has many components, each of that is atomic or composite.
Record based Logical Models: Use records as the key data representation components Examples: Relational Model: It shows data as well as relationship between data in the form
.#question. Discuss the problem which may arise during concurrency control and recovery in distributed database which are not encountered in controlized database environment.
intent locking
(a) What is a Sub-Query? (b) What is the difference between a scalar sub-query and a tabular sub-query? (c) Write an equivalent SQL statement to get the Name of Product wh
Question: (a) e-Government implementations normally evolve through a multi-stage process. Describe, using appropriate examples, the stages involved in an e-Government implemen
Authorisation Authorisation is the culmination of the administrative policies of the organisation. As the name shows, authorisation is a set of rules that can be used to verif
Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica
external and internal mapping with examples
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd