Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to
State The position of object at any moment is called state. An object can have many states depend upon time. After receiving some input instructions, the object can change its
object oriented database
examples of fields in a database
What is a disjoint less constraint? Ans: It needs that an entity belongs to no much more than one level entity set. Disjoint less constraint needs that an entity belongs to
It can be easily defined as: The database must not have any unmatched foreign key values. The term "unmatched foreign key value" means a foreign key value for which there doe
What is the use of rename operation? Rename operation is used to rename both relations and an attributes. It uses the as clause, taking the form: Old-name as new-name.
What is a recovery scheme? An integral part of a database system is a recovery scheme that can restore the database to the reliable state that existed before the failure.
Explain what is Aggregation ? Aggregation: This is used whenever we intend to show a relationship between an entity and the relationship. There is no provision for this in th
Question: a) Discuss the concept of data independence, explaining its importance in a database environment. b) To address the issue of data independence, the ANSI-SPARC t
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd