Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
If the deletion violates referential integrity constraint, then three alternatives are available:
Example:
Let R:
A#
B
C^
A1
B1
C1
A2
B3
C3
A3
B4
A4
C5
Q
C#
D
D1
D2
D3
Note:
1) '#' shows the Primary key of a relation.
2) '^' shows the Foreign key of a relation.
(1) Delete a tuple with C# = 'C1' in Q.
Violated constraint: - Referential Integrity constraint
Motive: - Tuples in relation A refer to tuple in Q.
Dealing: - Options available are
1) Decline the deletion.
2) DBMS may automatically delete all tuples from relation S and Q with C
# = 'C1'. This is known as cascade detection.
3) The one more option would result in putting NULL value in R where C1 exist, which is the initial tuple R in the attribute C.
What is a security? Securities are claims on financial assets. They can be illustrated as "claim checks" which give their owners the right to receive funds in the future. Sec
Which language has presently become the defacto standard for interfacing application programs along with relational database system? The language which has recently become the
Self-Join: In a self join a table is joined with itself. Let consider the following sample partial data of EMP table EMPNO ENAME MGRID
What is OCR? OCR (Optical Character Recognition) is a technology that enables you to change different types of machine-readable documents, like scanned paper documents, PDF fil
Explain what is Aggregation ? Aggregation: This is used whenever we intend to show a relationship between an entity and the relationship. There is no provision for this in th
What are the advantages of having an index structure? Ans: The index structures commonly provide secondary access paths, which offer alternative ways of accessing the reco
With the linear commit protocol, sites are connected in a chain, and the subtransaction at the left-hand end of the chain initiates the protocol. Propose a crash recovery protocol
explain in detail about time stamp orderting/
Example -Find the employee name, salary, department number and average salary of his/her department, for those employees whose salary is more than the average salary of that depart
What are the three fundamental operations that are regular to MySQL Programs? a) Establishing a connection to the MySQL server b) Choosing a database. c) Disconnecting fr
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd