Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Before defines the second type of integrity constraint, viz., Entity Integrity, we should be well-known with the concept of NULL.
Mostly, NULL is intended as a basis for dealing with the trouble of missing information. This type of situation is frequently encountered in the actual world. For instance, historical records sometimes have entries such as "Date of birth unknown", or police records may contain the entry "Present whereabouts unknown." Therefore it is necessary to have some way of dealing with such concepts in database systems.
Therefore Codd proposed an approach to this issue that creates use of special markers known as NULL to show such missing information.
A given attribute in the relation may or may not be allowed to include NULL. However, can the Primary key or any of its components (in case of the primary key is a composite key) contain a NULL? To answer this Query an Entity Integrity Rule states: No component of the primary key of a relation is permitted to accept NULL. In different words, the definition of each attribute involved in the primary key of any basic relation have to explicitly or implicitly contain the specifications of NULL NOT ALLOWED.
Consider the 1ollowin8 relation: CAR SALE (Car_id, Option_type, Option_listprice, Sale_date, Option_discountedprice) This relation refers to options installed in cars (e.g., crui
Super keys of a relation can have extra attributes. Candidate keys are minimal super key, i.e. such a key have no extraneous attribute. An attribute is known as extraneous if even
What is the initial step for object-oriented designing The initial step for object-oriented designing is object modeling. Before we go into deep about object modeling first of
Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce
Data Mining 1. What is data mining? Write Data Mining applications. 2. Explain OLAP? Write the benefits of OLAP. 3. What are the key features of a Data Warehouse? 4. W
design a generalization specialization hierarchy for a motor vehicle sales company. the company sells motorcycles, passenger cars, vens and buses.
What are the different integrity constraints in RDBMS? The various integrity constraints in RDBMS are as: Primary Key: primary key is a grouping of one or more attributes
What is hash file organization? What are the causes of bucket overflow within a hash file organization? What can be completed to decrease the occurrence of bucket overflow?
2NF Normal Form : A relation schema process R is in 2NF if it is in 1NF and each non-prime attribute A in R is fully functionally related on primary key. Second normal form (2N
What are the two types of blocks in the fixed -length representation? Define them. Anchor block: Have the first record of a chain. Overflow block: Have the records other tha
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd