Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the Weak Entity Set
An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in an organization do not comprise an identifying attribute.
As with other software, databases can potentially be used for unethical purposes. As a database developer, and a consumer, you should recognize database misuse, and how it may affe
Different stages of DDLC ?
Log based recovery: Let us first describe the term transaction log in the context of DBMS. A transaction log is a record in DBMS that remains track of all the transactions of a dat
Section A: Use the following tables to create a database called College. Use SQL commands. Student stuid(primary) lastName firstName
how many hourse have been spent on a certain project
What sorts of tables one can se in designing the hierarchy of a LDB? Tables, which are having Foreign Key relations.
triggering
Q. With the help of a suitable diagram gives module wise explanation of system architecture of DBMS. Sol. A Database management is a collection of interrelated data and col
external and internal mapping with examples
What is key ? Key - A single attribute or a combination of two or more attributes of an entity set which is used to recognize one or more instances (rows) of the set (table) is
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd