Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.
Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.
Attributes
Let us first answer the question:
What is an attribute?
An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.
For example, a student entity may be defined by the student's name, address, age, course, etc.
An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:
RollNo: 1234
Name: Supriya
Age: 18
Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)
Question A What is operational intelligence? Question B What is Business Intelligence? Explain the components of BI architecture Question C Differentiate between databas
Explain the relevance of Data Dictionary in a Database System? Data dictionary is a database in its own right residing on the disk that consist of Meta data which is = Data abo
1. Staff (staffID --> availabilityID) 2. Services (servicesID --> itemBasedID --> timedBasedID) 3. TimedBased (timedbasedID--> priceid) 4. Clients (clientId, serviceId-->
The objectives of this assignment are: - to develop skills in the design of database driven applications - to develop skills in applying SQL to implement the relational and
Explain the Object-oriented decomposition Object-oriented decomposition targets at identifying individual sovereign objects that encapsulate both a state and certain behavio
Define physical and logical data independence. How does this architecture help in achieving these? Data independence entails that change in one view must not need a change in t
Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in
Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.
List and also explain the dissimilar stages of DDLC ?
The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd