Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1 Discuss about second normal form and third normal form
Question 2 Write short note on 1) Data Manipulation Language 2) Data Definition Language
Question 3 Define the following terms 2) Entity 2) Keys
Question 4 Write down the characteristics of different types of storage devices. List (Cache, Main memory, Flash memory, Magnetic-disk storage, Optical storage, Tape storage)
Question 5 Differentiate between 1) Relational Data Model 2) Hierarchical Model
Question 6 What is Normalization? Explain different types of normal form
Q. Define a weak entity set and its identifying relationship. List the necessary conditions for a meaningful identifying relationship set of a weak entity set. Entity is a t
Log based recovery: Let us first describe the term transaction log in the context of DBMS. A transaction log is a record in DBMS that remains track of all the transactions of a dat
Consider student (std_id, std_name, date_of_birth, phone, dept_name). Put the data for a student with student id200, name arun, birth date 1 February, 1985, phone number (01110 328
Gyan Gurukul is a software company that provides software related solution. Ashutosh Dubey who is the director of Gyan Gurukul want a three-level schema architecture for the Gyan G
Describe disk manager and their work? Disk Manager: Responsible for fetching data regulated through file Manager from disk storage within Main memory and deciding what data to
How can you connect to the MySQL Server? In order to connect to the MySQL server it is necessary to give the username and password so this be able to done with The following
Foreign Keys and NULL Let us take the relation: DEPT DEPT ID DNAME BUDGET D1 M
Super keys of a relation can have extra attributes. Candidate keys are minimal super key, i.e. such a key have no extraneous attribute. An attribute is known as extraneous if even
1. Determine the set of minimal functional dependencies for the following data. The local bakery, Happy Cakes, needs your help designing a database that will support a kiosk in
Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd