Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain Record Based Logical Models?
Record-Based logical Models: Also define data at the conceptual and view levels. Unlike object-oriented models, are used to state overall logical structure of the database, and gives a higher-level description of the implementation. Named so since the database is structured in fixed-format records of various types. Each record type defines a fixed number of fields, or attributes. Each field is commonly of a fixed length (this simplifies the implementation). Record-based models do not involved a mechanism for direct representation of code in the database. Separate languages related along with the model are used to express database queries and updates. The three most widely-accepted models are the relational, network, and hierarchical.
Write a short note on oracle Instance? Oracle Instances: An instance is the (executed) Oracle software and the memory they use. It is the instance which manipulates the data s
UNION If R1 and R2 are two union compatible relations then R3 = R1 ∪ R2 is the relation having tuples that are either in R1 or in R2 or in both. In case, R3 will have tuples
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set
Consider entity type Employee with attributes empNumber (this is unique), empName, and the year when he/she was hired. An employee can either be a technical employee, a marketing e
Define query optimization. Query optimization refers to the process of search the lowest -cost method of evaluating a given query.
This project requires you to create a database design. Your design will be documented in a set of Entity-Relationship diagrams. Draw a set of Entity-Relationship diagrams to mode
Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many
What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it
Discuss the problem of Spurious tuples and how we may prevent it. Ans: A spurious tuple is, mainly, a record in a database that gets created while two tables are joined bad
Explain how the object classes are mapped to tables. Each object class maps to one or more than one tables in the database. The objects in the class may be partitioned horizont
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd