Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Determine the Strong and Weak Entity
Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and an entity not having a primary key of its own. In such a case, the entity having its own primary key is known as a strong entity and the entity not having its own primary key is known as a weak entity. Whenever we need to relate a strong and a weak entity together, the ERD would alter just a little.
Say, for instance, we have a statement "A Student lives in a Home." STUDENT is obviously a strong entity having a primary key Roll. But HOME might not have a unique primary key, as its only attribute Address may be shared by a lot of homes (what if it is a housing estate?). HOME is a weak entity in this case.
.#question. Discuss the problem which may arise during concurrency control and recovery in distributed database which are not encountered in controlized database environment.
What is DAG? The class-subclass relationship is shown by a directed acyclic graph.eg: employees can be temporary or permanent. We might be create subclasses temporary \and perm
Using the questions found at the end of Chapter 9 in your textbook, complete this homework activity. Students will submit a Word document answering questions 2, 3, and 4.
State the Component Diagram A component diagram represents a set of component and relationships among them. In a dynamic model, component diagram is used to model physical com
I am using Siteground. And my database is full of limit so need someone who reduces the data which no need. This is very simple and simple task. Skills required are Databa
Process of implementing system design in dynamic models There are three essential approaches to implementing system design in dynamic models. These approaches are as below:
Deletion Anomalies: Loss of important Information: In some cases, useful information may be lost when a tuple is deleted. For instance, if we delete the tuple corresponding to stu
I have to solve a problem using access
List the types of authorization. A) Read authorization B) Write authorization C) Update authorization D) Drop authorization
Define outer union operation of the relational algebra. Compute the outer union for the relations R and S given below. Outer Join - If there are any values in one tabl
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd