Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Domain Constraints
Domain constraints are primarily formed for defining the logically correct values for an attribute of a relation. The relation allows attributes of a relation to be confined to a range of values, for instance, values of an attribute age can be restricted as Zero to 150 or a definite type like integers, etc.
REDUNDANCY AND ASSOCIATED PROBLEMS
Let us take the subsequent relation STUDENT
Enrolment no
Sname
Address
Cno
Cname
Instructor
Office
050112345
Rahul
D-27, main Road
Ranchi
MCS-011
Problem
Solution
Nayan
Kumar
102
D-27, Main Road
MCS-012
Computer
Organisation
Anurag
Sharma
105
MCS-014
SSAD
Preeti
Anand
103
050111341
Aparna
B-III, Gurgaon
Figure: A state of STUDENT relation
The above relation satisfies the properties of a relation and is said to be in first normal form (or 1NF). Theoretically it is convenient to have all the information in one relation as it is then likely to be simpler to query the database. But the relation over has the following undesirable kinds:
What is a Built-in A notation of identity is built-into the data model or programming language and no user-supplied identifier is needed. This form of identity is used in objec
How can one distinguish among different kinds of parameters? Input parameters are used to pass data to subroutines. Output parameters are used to pass data from subrout
Explain the Strategy of Database Planning ?
There are a number of possible solutions to the open ended brief. One of the simple ones is shown here without the PKs and FKs. It is important to think of how a number of tasks
What are deadlocks? How can they be avoided? Ans: Deadlock considers to a particular condition when two or more processes are every waiting for another to release a resource,
Sequences Sequences: Automatically produce unique numbers Are sharable Are typically used to make a primary key value Replace application code Speed up t
Differentiate OO development from structured development. Structured approach of problem solving is based upon the idea of decomposition of system into subsystem. In this appro
When a function module is activated syntax checking is performed automatically. YEs, a function module is activated syntax checking.
Explain controlled redundancy? Controlled redundancy : The replication of data within the data warehouse for the purposes of improved data access or understand ability.
how to solve the C type problems?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd