Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.
Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.
Attributes
Let us first answer the question:
What is an attribute?
An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.
For example, a student entity may be defined by the student's name, address, age, course, etc.
An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:
RollNo: 1234
Name: Supriya
Age: 18
Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)
What is a database? Database - Basically in simple terms A database is a collection of inter related data and/or information stored so which it is available to several users
The database is to record information about artists for a (music) production company. An artist is the name of a singer or band; the name of the artist, the year the artist started
What is DML compiler? DML Compiler: Translates DML statements in a query language within low level instructions understandable through the query evaluation engine. Attempts to
What are the two methods for dealing deadlock problem? The two procedures for dealing deadlock problem is deadlock detection and deadlock recovery.
Example: //REVOKE ALL ON EMP FROM MCA12; (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-
Describe queries with complex types? The present extension of the SQL query language deal with the complex type Let us start with the simple example: Find the title and t
multiplicity constarin
Objectives differentiate DDBMS and conventional DBMS; Describe Network topology for DDBMS; Describe the concepts of horizontal and vertical fragmentation; Descr
Question : (a) Data mining is one of the best ways to analyse data and using software method, hidden and unexpected patterns and relationships in sets of data can be extracte
Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd