Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe integrity constraints?
Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of incorrect information. An integrity constraint is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. If a database instance satisfies all the integrity constraints specified on the database schema, it is a legal instance. A DBMS enforces integrity constraints, in that it permits only legal instances to be stored within the database.
Integrity constraints are specified and enforced at various times:
When the DBA or end user describes a database schema, he or she specifies the integrity constraints which must carry on any instance of this database. While a database application is run, the DBMS checks for violations and disallows changes to the data in which violate the specified integrity constraints. Several types of integrity constraints can be specified in the relational model, such as, Not Null, Check, Unique, Primary Key, etc.
Problem: a) Briefly describe what you understand by Client-Server environment b) The File Server is a simple form of Client-Server. Describe the principles of the File Serve
Example -Find the employee name, salary, department number and average salary of his/her department, for those employees whose salary is more than the average salary of that depart
Analyzing Association Traversal Association Traversal shall be understood properly for the association design explanation. Analyzing association traversal means analyzing tra
what is the need of a log in dbms
Given the following relations Vehicle (Reg_no, make, colour) Person(eno, name, address) Owner(eno, reg_no) Write expressions in the relational algebra to answer the following
What are metrics for choosing the best algorithm? Matrices for choosing the best algorithms are as below: Computational complexity Ease of understand ability and im
The Third Normal Form (3NF) Even though, transforming a relation that is not in 2NF into a number of relations that are in 2NF take out many of the anomalies, it does not neces
recovey techniques based on deferred update and immediate update
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set: Entity set that
Mention the various user privileges All privileges directly granted to the user or role. All privileges granted to roles that have been granted to the user or role.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd