Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the integrity constraints: Not Null, Unique, Primary Key with an example each. Is the combination 'Not Null, Primary Key' a valid combination. Justify.
Not Null - Should hold valid values and cannot be NULL.
Unique - An attribute or a combination of two or more attributes must have a unique value in each row. The unique key can have NULL values.
Primary Key - It is similar as unique key but cannot have NULL values. A table can have at most one primary key in it.
For example:
STUDENT
Roll No
Name
City
Mobile
17
Ankit Vats
Delhi
9891663808
16
Vivek rajput
Meerut
9891468487
6
Vanita
Punjab
NULL
75
Bhavya
delhi
9810618396
Roll No is a primary key.
Name is defined with NOT NULL, means each student must have a name.
'Not Null, Primary Key' is a valid combination. Primary key constraint already includes
'Not Null' constraint in it but we can also add 'Not Null' constraint with it. The use of
'Not Null' with 'Primary Key' will not have any effect. It is same as if we are using just 'Primary Key'.
What is the use of RAID? A variety of disk-organization methods, collectively called redundant arrays of independent disks are used to better the performance and reliability.
Locks: Serialisabilty is just a test whether a given interleaved schedule is ok or has a concurrency related trouble. Though, it does not make sure that the interleaved concurrent
Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system. Different use
Given the following relations TRAIN (NAME, START, DEST) TICKET (PNRNO., START, DEST, FARE) PASSENGER (NAME, ADDRESS, PNRNO.) Write SQL expressions for the following queries: No
Question: (a) e-Government implementations normally evolve through a multi-stage process. Describe, using appropriate examples, the stages involved in an e-Government implemen
Define access time. Access time is the time from when a read or write request is issued to when data transfer starts.
why shadow copy technique is used?
Increased overheads on update : On the drawbacks side, it will need the system to ensure that all replicas of a relation are consistent. This shows that all the replicas of the rel
A use case diagram giving a pictorial overview of user requirements and brief use case descriptions. As the case study contains only an outline of a business scenario, you will als
What are object interaction diagrams? Object interaction diagrams are the diagrams that used to describe order in which messages are communicated in execution of an operation,
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd