Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Determine the Strong and Weak Entity
Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and an entity not having a primary key of its own. In such a case, the entity having its own primary key is known as a strong entity and the entity not having its own primary key is known as a weak entity. Whenever we need to relate a strong and a weak entity together, the ERD would alter just a little.
Say, for instance, we have a statement "A Student lives in a Home." STUDENT is obviously a strong entity having a primary key Roll. But HOME might not have a unique primary key, as its only attribute Address may be shared by a lot of homes (what if it is a housing estate?). HOME is a weak entity in this case.
Evaluate: a.When transactions T1 and T2 are in a deadlock, one of the transactions will eventually implement to completion and let the other one continue implementation. b.
Question : (a) Differentiate between database integrity and database security (b) Database security involves measures to avoid loss of privacy and loss of confidentiality. D
Question: (a) Use the following business rules to produce the E-R diagram. You should clearly show all the minimum and maximum cardinality constraint on each side of the relati
What is the use of integrity constraints? Integrity constraints make sure that changes made to the database by authorized users do not result in a loss of data consistency. The
What is meant by mean time to failure? The mean time to failure is the amount of time that the system could run continuously without failure.
Produce a set of relations (equivalent to the Finkelstein entity list) in third normal form (3NF) from the following un-normalised relation. You must use the Finkelstein methodolog
Describe the storage structure of indexed sequential files and their access method. Ans: Storage structure of Indexed Sequential files and their access: To achieve fast rand
Explain the database Planning Project ?
Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam
Differentiate OO development from structured development. Structured approach of problem solving is based upon the idea of decomposition of system into subsystem. In this appro
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd