Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
2NF Normal Form:
A relation schema process R is in 2NF if it is in 1NF and each non-prime attribute A in R is fully functionally related on primary key. Second normal form (2NF) is a normal process needed in database normalization. 2NF was originally described by E.F. Codd in 1971. A table that is in first normal form (1NF) must accept additional criteria if it is to accept for second normal form. A table is in 2NF if and only if, it is in 1NF and no non prime attribute is related on any proper subset of any candidate key of the table.
What is a view? Make a view of EMP table named DEPT 20, to display the employees in department 20 and their annual salary. Ans: View is a virtual table that does not consist
Explain the disadvantages of file oriented approach? In the oriented approach Applications are designed in isolation. Design of application is optimized for one application. In
I need web security expert , website management Project Description: i want professional for the below . website management server management database management
Q. Why would you choose a database system instead of simply storing data in operating system file? Define at a base concept in details. Sol. Advantages of Database over Fil
What are deadlocks? How can they be avoided? Ans: Deadlock considers to a particular condition when two or more processes are every waiting for another to release a resource,
Database Administrator One of the main perpose for having the database management system is to have control of both data or programs accessing that data. The person having li
Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with
Define granularity, hierarchy of granularity of locks & multiple granularity locking. Explain the modified two phase locking along with multiple granularity locking. Ans: The s
What is use of generating such tables? How can you create temporary tables? When you require a table only for a short time after that you want it to disappear automatically you
Explain the function of Object model Object model describes the classes of objects in system, including their attributes and operations which they support. The analysis object
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd