Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
By using the delete operation some consisting records can be deleted from a relation. To delete some definite records from the database a condition is also specified based on which records can be taken for deletion.
Constraints that can be violated during deletion
Only one type of constraint can be violated during deletion, it is referential integrity constraint. It can happen when you want to delete a record in the table where it is referenced by the foreign key of another table. Please read the example given below very carefully.
Normalization :It is a process of examine the given relation schemas based on their primary key and Functional Dependencies (FDs) to achieve the properties Minimizing redun
Define Physical and Logical independence Ans: Physical data independence: The ability to modify physical level without causing application program to be rewritten. Logic
Natural Join : It is the similar like Equi join except one of the duplicate columns is removed in the result table. The natural join is the most usually used form of join operation
First Normal Form and second normal form First Normal Form (1NF) A relation is said to be in 1NF if it having no non-atomic values and each row can give a unique combinat
What is RDBMS terminology for a row? A tuple is a RDBMS terminology for a row
Define rotational latency time. The time spent waiting for the sector to be accessed to appear under the head is known as the rotational latency time.
What is difference between primary index and secondary index? Primary Index a) It is an ordered file whose records are of fixed length along with two fields. b) Only base
Example: //REVOKE ALL ON EMP FROM MCA12; (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-
Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system. Different use
Give some encryption techniques? A) DES B) AES C) Public key encryption
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd