Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe integrity constraints?
Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of incorrect information. An integrity constraint is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. If a database instance satisfies all the integrity constraints specified on the database schema, it is a legal instance. A DBMS enforces integrity constraints, in that it permits only legal instances to be stored within the database.
Integrity constraints are specified and enforced at various times:
When the DBA or end user describes a database schema, he or she specifies the integrity constraints which must carry on any instance of this database. While a database application is run, the DBMS checks for violations and disallows changes to the data in which violate the specified integrity constraints. Several types of integrity constraints can be specified in the relational model, such as, Not Null, Check, Unique, Primary Key, etc.
Consider a systems development project with the following data Activity Duration (weeks) Precedence Relationship 1. Software design
what is file organization? what are file organization techniques.explain in detail? explain random file organization technique, multikey file organization technique?what is indexin
#question. acompani datdbase needs to store information about employees (identified by a social security number,with salary and phone as attributes) and departments (identified by
Compare the Nested-loop join and block-nested loop join Ans: Nested loop join - It is costly as worst case cost, no. of block accesses needed is n r * b s + b r where b
Define query language? A query is a statement requesting the retrieval of information. The portion of DML that includes information retrieval is known as a query language.
What are the General Transformation Rules for Relational operations? Ans: The transformation rules transform one relational algebra expression to AN EQUIVALENT ONE 1. E
Write the syntax of creating an INDEX ? Syntax of Creating an Index: CREATE [BITMAP] [UNIQUE] INDEX ON ( [, ] . . .);
Is it mandatory to declare all the tables in Report by the key word tables for all the tables that exist in the structure of LDB, and are being explained in the Database part of LD
What are the advantages of using a DBMS? The benefits of using a DBMS are a) Controlling redundancy b) Restricting unauthorized access c) Giving multiple user interfac
Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd