Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Determine the Strong and Weak Entity
Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and an entity not having a primary key of its own. In such a case, the entity having its own primary key is known as a strong entity and the entity not having its own primary key is known as a weak entity. Whenever we need to relate a strong and a weak entity together, the ERD would alter just a little.
Say, for instance, we have a statement "A Student lives in a Home." STUDENT is obviously a strong entity having a primary key Roll. But HOME might not have a unique primary key, as its only attribute Address may be shared by a lot of homes (what if it is a housing estate?). HOME is a weak entity in this case.
Define functional and multivalued dependencies. Ans: A functional dependency is a assets of the semantics of the attributes in a relation. The semantics point out how at
Describe Interfaces for the DBA? Interfaces for the DBA - Most database systems holds privileged commands which could be used only through the DBA's staff. These involves com
The Maximum no of key fields that can be used in a header is?? 50
How can Redundant Associations be done It can be done by asking questions: i) Is there a specific arrangement of network which would optimize critical aspects of completed
Explain sorted File with advantages? Sorted file The sort utility shall perform one of the subsequent functions: 1.Sort lines of all the named files together and write the
to develop elrctronic database from manual forms
What is a guard condition? Explain it with a suitable example. The guard-condition is a Boolean expression written with respect to parameters of triggering event and attributes
How many types of users works on database? Users are differentiated through the way they expect to interact along with the system (i) Application programmers-interact with
Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples. Insert operation can violet any of the subse
1. Use the Invoice table structure shown below to answer the following questions: a) Draw the dependency diagram and identify the primary key and all dependencies, including al
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd