Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the differences among MySQL_fetch_array(), MySQL_fetch_object(), MySQL_fetch_row()?
Mysql_fetch_object returns the result from the database like objects while mysql_fetch_array returns result as an array.
This will permit access to the data via the field names E.g. using mysql_fetch_object field can be accessed as $result-
>name andusing mysql_fetch_array field can be accessed as $result->[name].
mysql_fetch_row($result):- where $result is the result resource come back from a successful query executed using the mysql_query() function.
Illustration:
$result = mysql_query("SELECT * from students);
while($row = mysql_fetch_row($result))
{
Some statement;
}
Explain the rules for creating a labelled precedence graph for testing view serializability. Ans: A schedule S is view serializable if it is view equivalent to a ser
a need some real life examples of database management systems three level of ANSI SPARC architecture life teacher and student ,company and employee or for NGO etc.
Ask question #MinimThe Georgia Tech Library (GTL) has approximately 16,000 members, 100,000 titles, and 250,000 volumes (an average of 2.5 copies per book). About 10 percent of the
What is foreign key? Foreign Key - Let there are two relations in tables R and S. Any candidate key of the relation R that is referred in the relation S is known as the forei
State about the Use Case Diagram A use case diagram represents a set of use cases, actors and their relationships. These diagrams shall be used to model context or requirement
For problems 1-4, give all candidate keys for the tables with FDs specified. Composite candidate keys must be put in parentheses, and candidate keys must be separated with commas
Define instance and schema? Instance: Collection of data stored in the data base at a certain moment is Schema: The overall design of the data base is known as the data base
sir, could anybody help me in getting complete information about the mentioned topic
What are uncommitted modifications? The immediate-modification technique permits database modifications to be output to the database whereas the transaction is still in the act
List the types of authorization. A) Read authorization B) Write authorization C) Update authorization D) Drop authorization
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd