Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Before defines the second type of integrity constraint, viz., Entity Integrity, we should be well-known with the concept of NULL.
Mostly, NULL is intended as a basis for dealing with the trouble of missing information. This type of situation is frequently encountered in the actual world. For instance, historical records sometimes have entries such as "Date of birth unknown", or police records may contain the entry "Present whereabouts unknown." Therefore it is necessary to have some way of dealing with such concepts in database systems.
Therefore Codd proposed an approach to this issue that creates use of special markers known as NULL to show such missing information.
A given attribute in the relation may or may not be allowed to include NULL. However, can the Primary key or any of its components (in case of the primary key is a composite key) contain a NULL? To answer this Query an Entity Integrity Rule states: No component of the primary key of a relation is permitted to accept NULL. In different words, the definition of each attribute involved in the primary key of any basic relation have to explicitly or implicitly contain the specifications of NULL NOT ALLOWED.
Question 1 List and explain various Normal Forms. How BCNF differs from the Third Normal Form and 4th Normal forms? Question 2 Describe the concepts of Structural Semantic Da
what is Nested relational model? Explain with examples.
What is a Data Flow Diagram? Data Flow Diagram: A data flow diagram is the graph that shows flow of data values from their sources in objects in the course of processes whic
average response time?
How does Oracle act as ODBC and give examples of front end uses with ODBC? ODBC achieve portability at the level of the executable by introducing an extra level of indirection.
Explain the Relational Completeness Codd described the term relational completeness to consider to a language that is complete with respect to first-order predicate calculus ex
Wait-die" scheme : The idea is based on non-preventive method. It is based on a simple rule: If Ti requests a database resource that is held by T
Mention the several levels in security measures. A) Database system B) Operating system C) Network D) Physical Human
How does the two phase protocol ensure serializability in database schedules? Ans: A transaction is termed to follow the two-phase locking protocol if all locking operations
To eliminate duplicate rows (distinct operator) Example: SELECT DISTINCT DEPTNO FROM EMP;
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd