Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.
Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.
Attributes
Let us first answer the question:
What is an attribute?
An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.
For example, a student entity may be defined by the student's name, address, age, course, etc.
An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:
RollNo: 1234
Name: Supriya
Age: 18
Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)
Candidate Key: In a relation R, a candidate key for R is a subset of the set of attributes of R, which have the differnt two properties: (1) Uniqueness: N
explain cascading rollback
Three way to handle missing field val
What is use of generating such tables? How can you create temporary tables? When you require a table only for a short time after that you want it to disappear automatically you
Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictori
he SQL query that will return the order number, quantity ordered, price each and total cost of an order (quantity * price each) from the order details table. Label the calculated c
Benefits of Sequential File Organisation It is quick and efficient when dealing with huge volumes of data that require being processed periodically (batch system). Dra
what is the need of a log in dbms
Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how
The Database Approach In order to overcome the limits of a file system, a new approach was needed. Hence a database approach emerged. A database is a persistent collection of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd