Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Define entity integrity and referential integrity. How does SQL allow specification of these?
Ans: Entity Integrity Rule- If the attribute A of relation R is a prime attribute of R after that A cannot accept null values.
Referential Integrity Rule- In referential integrity, it is made sure that a value that appears in one relation for a given set of attributes as well appears for a particular set of attributes in another relation.
In SQL, referential integrity and entity integrity rules are implemented as constraints on the relation known as reference Key constraint and primary Key constraint correspondingly.
These constraints can be fixed with relation at the time of creation of the relations or after the creation of the relations by altering the definition of the relations. For instance:
a. Define the term "deadlock". There are four conditions that must hold before deadlock is possible. Name them. b. Outline an algorithm that detects whether there is a deadlock.
Question: (a) Use the following business rules to produce the E-R diagram. You should clearly show all the minimum and maximum cardinality constraint on each side of the relati
Describe Embedded Query Language? Embedded Query Language - A query language (e.g., SQL) can be implemented in two ways. It can be used interactively or embedded within a host
Determine the language that needs a user to specify the data to be retrieved with no specifying exactly how to get it is Ans: Non-Procedural DML
Explain the conventions (relationships) for displaying an ER schema as an ER diagram.
What does authentication refer? Authentication refers to the task of verifying the uniqueness of a person.
The users who use easy-to-use menu are called ? The users who use easy to use menu are called as Naïve users.
what are the limitations of dbms?
What is recursive closure? Why is it not possible to describe this operation in relational algebra? Recursive closure is applied to recursive relationship. An instance of rec
Explain the ANSI SPARC architecture The three-schema architecture is as well known as ANSI SPARC architecture. The aim of the three-schema architecture is to separate the user
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd