Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the differences among MySQL_fetch_array(), MySQL_fetch_object(), MySQL_fetch_row()?
Mysql_fetch_object returns the result from the database like objects while mysql_fetch_array returns result as an array.
This will permit access to the data via the field names E.g. using mysql_fetch_object field can be accessed as $result-
>name andusing mysql_fetch_array field can be accessed as $result->[name].
mysql_fetch_row($result):- where $result is the result resource come back from a successful query executed using the mysql_query() function.
Illustration:
$result = mysql_query("SELECT * from students);
while($row = mysql_fetch_row($result))
{
Some statement;
}
What are the four main characteristics of the database approach? The four major characteristics of the database approach are: 1. Self-describing nature of a database system. 2.
Problem: a) Briefly describe what you understand by Client-Server environment b) The File Server is a simple form of Client-Server. Describe the principles of the File Serve
What is transaction? Collections of operations that form a single logical unit of work are known as transactions.
Explain query execution plan? - Optimizer available in SQL Server optimizes code to be effectively executed. - A query execution plan demonstrates how this optimizer would r
is Chipo carrying his baby
Define canonical cover? A canonical cover Fc for F is a set of dependencies like F logically implies all dependencies in FC and Fc logically shows all dependencies in F.
The clause in SQL which specifies that the query result should be sorted in ascending or descending order based upon the values of one or much more columns is Ans : Order by
We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like
Determine the Strong and Weak Entity Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and a
Define null values. In some cases a certain entity may not have an applicable value for an attribute or if we do not know the value of an attribute for a certain entity. In the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd