Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Define entity integrity and referential integrity. How does SQL allow specification of these?
Ans: Entity Integrity Rule- If the attribute A of relation R is a prime attribute of R after that A cannot accept null values.
Referential Integrity Rule- In referential integrity, it is made sure that a value that appears in one relation for a given set of attributes as well appears for a particular set of attributes in another relation.
In SQL, referential integrity and entity integrity rules are implemented as constraints on the relation known as reference Key constraint and primary Key constraint correspondingly.
These constraints can be fixed with relation at the time of creation of the relations or after the creation of the relations by altering the definition of the relations. For instance:
Different stages of DDLC ?
Compute the closure (F+) for the following set of the functional dependencies defined on R(a,b,c,d), where F - {c→ a, ab → d, a → b, d → c}, i.e. what are all of the FDs implied b
What are shortcomings in structured approach? Structured methodology treats data and their behaviours separately, and this makes it harder to isolate changes. If changes are re
Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictori
In how many parts events are classified Events are classified as four types in UML 1. Signals 2. Calls 3. Passing of Time 4. Change in State
Can your organization scan large format documents? Yes, large format scanning used for such entities as city plans and blueprints is available. We selected scanners with the ab
Explain how the associations are implemented as classes. A general approach in this case is to transform an association class into a simple class linked to two original classes
Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u
Hot Backup: Some sites cannot terminate the database while creating a backup copy of the files. The cold backup is not a reliable option. So different kinds of backing up database
what are the main characteristics of database
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd