Explain er model, Database Management System

Assignment Help:

Question 1 Explain ER model

Question 2 What are the characteristics of a computer provided information?

Question 3 What are facts and guidelines to be considered when selecting a character set?

Question 4 Explain

  • altering tables
  • Dropping table

Question 5 Write an SQL query to create the student table with the necessary columns and check whether that column allows null values.

Question 6 Create a student table with the following attributes Student name, student roll no, 5 different subjects. Write SQL query for the following conditions

  1. Add column to display the total marks of a particular student
  2. Add column display the Grade of the student >60 First > 40 & < 60 Second < 40 Fail
  3. Group all the students who got Fail grade

Related Discussions:- Explain er model

Compute natural join and outer join, For the relations R and S given below:...

For the relations R and S given below: R                      S A B C 1 4 7 2 5 8 3 6 9

Queries, Find the names of all Albums that have more than 30 tracks. Result...

Find the names of all Albums that have more than 30 tracks. Result: (name: varchar(255))

Functional dependencies, 1. Staff (staffID --> availabilityID) 2. Servic...

1. Staff (staffID --> availabilityID) 2. Services (servicesID --> itemBasedID --> timedBasedID) 3. TimedBased (timedbasedID--> priceid) 4. Clients (clientId, serviceId-->

Explain superkey, Explain Superkey Ans: A superkey is described in the ...

Explain Superkey Ans: A superkey is described in the relational model of database organization like a set of attributes of a relation variable for which it holds that in all re

There are two major types of fragmentation, There are two major types of fr...

There are two major types of fragmentation: Horizontal& Vertical. Horizontal fragments, as the name suggests are subsets of tuples and vertical fragments are subsets of attributes

Wound-wait scheme-deadlock prevention, " Wound-wait" scheme : It is based o...

" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

Components of a typical database environment, Question: (a) List four d...

Question: (a) List four disadvantages of the File Processing System as compared to the Database Systems. (b) The integrity of a database is enforced by integrity rules. One

Linked list, what is difference between circular inked lust and grunded lin...

what is difference between circular inked lust and grunded linked list

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd