Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the integrity constraints: Not Null, Unique, Primary Key with an example each. Is the combination 'Not Null, Primary Key' a valid combination. Justify.
Not Null - Should hold valid values and cannot be NULL.
Unique - An attribute or a combination of two or more attributes must have a unique value in each row. The unique key can have NULL values.
Primary Key - It is similar as unique key but cannot have NULL values. A table can have at most one primary key in it.
For example:
STUDENT
Roll No
Name
City
Mobile
17
Ankit Vats
Delhi
9891663808
16
Vivek rajput
Meerut
9891468487
6
Vanita
Punjab
NULL
75
Bhavya
delhi
9810618396
Roll No is a primary key.
Name is defined with NOT NULL, means each student must have a name.
'Not Null, Primary Key' is a valid combination. Primary key constraint already includes
'Not Null' constraint in it but we can also add 'Not Null' constraint with it. The use of
'Not Null' with 'Primary Key' will not have any effect. It is same as if we are using just 'Primary Key'.
Accessing information about permissions to all users- Object level permissions: With the use of data dictionary you can see the permissions to user. Let us get the table name fro
A database to track your progress in your college program will track your progress towards graduation! A database that has information containing the classes that you have taken, c
What are the two methods for dealing deadlock problem? The two procedures for dealing deadlock problem is deadlock detection and deadlock recovery.
Storage Of Database On Hard Disks At this point, it is worthwhile to note the difference among the terms file Organisation and the access method. A file organisation shows to t
What is Secondary Index While making the index, generally the index table is kept in the primary memory (RAM) and the main table, because of its size is keeps in the secondary
The File Based System File based systems are an early attempt to computerise the manual filing system. For example, a manual file can be set up to hold all the correspondence r
Multiple-mode locks : It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that neve
Order by clause By using this rows can be sorted It is used in the last portion of select statement By default it gets ascending order DESC: is used
What is a hashing function? What are the properties of a good hashing function? Describe the folding technique for hashing functions. Ans: Hashing function is a method
need to get answer for questions 3&4 on this page in part 1
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd