Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.
Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.
Attributes
Let us first answer the question:
What is an attribute?
An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.
For example, a student entity may be defined by the student's name, address, age, course, etc.
An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:
RollNo: 1234
Name: Supriya
Age: 18
Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)
1.Suppose you are given a dataset that consists of a random sample of tasters, on which the following variables were obtained: (y) Zpref = taste preference for green beans store
Event Occurrence of a process is called event. In other words, the object can receive many input instructions. The changes which occur due to these instructions are known as e
Mention the several levels in security measures. A) Database system B) Operating system C) Network D) Physical Human
How persistent programming languages differ from traditional programming languages? Database languages vary from traditional programming languages in that they directly manipul
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4
Which operator is Cartesian product in relational algebra? Cartesian product in relational algebra is a binary operator. (It requires two operands. e.g., P X Q)
Which method of access uses key transformation? A Hash method of access uses key transformation.
What are the storage types? The storage types are: a) Volatile storage b) Nonvolatile storage
You are required to write a report which evaluates two of the following issues in relation to your case study database: a. Security issues b. Performance issues c. Backup
Question: (a) Can a set of data requirements be correctly modelled by two or more different ER diagrams? Explain your answer. You may use a small example, if you think it will
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd