Explain cursors in sql, Database Management System

Assignment Help:

Explain cursors in SQL?

Cursors in SQL - An object used to store the output of a query for row-through-row processing through the application programs. Cursors are constructs which enable the user to name a private memory field to hold an exact statement for access at a later time.

Cursors are used to procedure multi-row result sets one row at a time. In addition, cursors remain track of which row is currently being accessed, that permit for interactive processing of the active set.


Related Discussions:- Explain cursors in sql

Primary index, Primary index A primary index is a file that has a sorte...

Primary index A primary index is a file that has a sorted series of records having two columns: a block address for that key field in the data file; and the ordering key field.

The conceptual level or global level in dbms, The Conceptual Level or Globa...

The Conceptual Level or Global level The conceptual level presents a logical view of the complete database as a unified whole. It permits the user to bring all the data in th

List the set operations of sql, List the set operations of SQL? 1) Unio...

List the set operations of SQL? 1) Union 2) Intersect operation 3) The except operation

What are the kinds of strings, What are the kinds of Strings?  -A binar...

What are the kinds of Strings?  -A binary string in MySQL is one that MySQL treats as case sensitive in comparisons. -A non binary string in MySQL is one that MySQL does'nt

Three level architecture of dbms-logical architecture, Three Level Architec...

Three Level Architecture of DBMS or Logical DBMS Architecture The logical architecture defines how data in the database is perceived by users. It is not deals with how the da

Define single valued and multivalued attributes, Define single valued and m...

Define single valued and multivalued attributes. Single valued attributes: attributes with a single value for a particular entity are known as single valued attributes. Mult

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Illustrate the state model for the atm class, Illustrate the State model fo...

Illustrate the State model for the ATM class let us take state model for the ATM class given below in Figure showing state model of the ATM class and the pseudo code derived fr

What are axioms, What are axioms? Axioms or rules of inference give a s...

What are axioms? Axioms or rules of inference give a simpler technique for reasoning about

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd