Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
If the deletion violates referential integrity constraint, then three alternatives are available:
Example:
Let R:
A#
B
C^
A1
B1
C1
A2
B3
C3
A3
B4
A4
C5
Q
C#
D
D1
D2
D3
Note:
1) '#' shows the Primary key of a relation.
2) '^' shows the Foreign key of a relation.
(1) Delete a tuple with C# = 'C1' in Q.
Violated constraint: - Referential Integrity constraint
Motive: - Tuples in relation A refer to tuple in Q.
Dealing: - Options available are
1) Decline the deletion.
2) DBMS may automatically delete all tuples from relation S and Q with C
# = 'C1'. This is known as cascade detection.
3) The one more option would result in putting NULL value in R where C1 exist, which is the initial tuple R in the attribute C.
Update Operations and Dealing with Constraint Violations There are three basic operations to be executes on relations: Insertion Deletion Update The INSER
Explain what is Aggregation? Aggregation: Aggregation is an significant concept in database design whereas composite objects could be modelled during the design of database a
External failure : A failure can also result because of an external cause, such as earthquakes, fire, floods, etc. The database must be duly backed up to avoid troubles occurring d
Northwind Pty Ltd sells a variety of food products throughout the world. They want to use the reporting features of SAP''s Business Information Warehouse to better understand thei
design a generalization specialization hierarchy for a motor vehicle sales company. the company sells motorcycles, passenger cars, vens and buses.
Question: (a) What are decision support systems, and what role do they play in the business environment? (b) Data mining is a knowledge discovery process of automated extr
Data Control The data control mostly refers to commands that permit system and data privileges to be passed to several users. These commands are usually available to database admi
What is called as an N-way merge? The merge operation is a generalization of the two-way merge used by the standard in-memory sort-merge algorithm. It merges N runs, so it is k
losers with new information systems
Explain the challenges before an E-business management.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd