Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Define a table in SQL known as Client that is used to store information about the clients. Define CLIENT_NO as the primary key whose first letter must begin with ‘C'. Also ensure that the column ‘NAME' should not permit NULL values.
Column name Data type SizeCLIENT_NO Varchar2 6NAME Varchar2 20ADDRESS1 Varchar2 30ADDRESS2 Varchar2 30CITY Varchar2 15STATE Varchar2 15PINCODE Number 6BAL_DUE Number 10, 2
Ans:CREATE TABLE CLIENT( CLIENT_NO VARCHAR2(6) PRIMARY KEY CHECK (CLIENT_NO LIKE‘C%'), NAME VARCHAR2(20) NOT NULL, ADDRESS1 VARCHAR2(30), ADDRESS2 VARCHAR2(30), CITY VARCHAR2(15), STATE VARCHAR2(15), PINCODE NUMBER(6), BAL_DUE NUMBER(10,2))
describe all the tables you have created. ?get table_name, status, num_rows, user_stats in user_tables system view ?get table_name, constraint_name, constraint_type in user_constr
The Internal or Physical Level The collection of files permanently stored on secondary storage devices is called as the physical database. The internal or physical level is t
Why DML is used for? DML is used to Manipulation and processing of database. DML is provided for manipulation & processing of database. (Data stored in the database is processed
PRINCIPLES OF DATABASE 1. State the following terms: a) Database b) Database Management System c) Entity d) Attribute e) Relationship 2. Discuss the Three Level Architecture
Why Like predicate used for? LIKE predicate: The LIKE predicate searches for strings in which have a certain pattern.
What is DML (Data Manipulation Language)? This language that enable user to access or manipulate data as organised by appropriate data model. Procedural DML or Low level: DM
Describe the two alternatives for specifying structural constraints on relationship kinds? Relationship kinds have certain constraints in which limit the possible combination o
Differance between Open addressing and chaining for collision resolution ? In open addressing , proceeding from the occupied position specified by hash address the program che
What are the various properties of Relational tables? Relational tables have 6 properties: 1. Each row is unique. 2. Column values are of the same kind. 3. Values are
What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow? When a record is inserted, the bucket to that
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd