Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain weak and strong entity sets?
Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that key. A weak entity set has no primary key unless attributes of the tough entity set on which it depends are included. Tuples in a weak entity grouped are partition according to their relationship along with tuples within a strong entity set. Tuples inside each partition are discernible by a discriminator, that is a set of attributes. A strong entity set has a primary key. All tuples within the set are distinguishable through that key. A weak entity set has no primary key unless attributes of the strong entity set on that it depends are included. Tuples in a weak entity set are partitioned according to their relationship along with tuples in a strong entity set. Tuples within each partition are discernible through a discriminator that is a set of attributes.
What is Interaction Diagram An interaction diagram shows an interaction, comprises of a set of objects and their relationships including the messages that may be dispatched be
Distributed query and transaction processing a. Construct a query around any one of the functional divisions you made in 4a such that if executed in the distributed design of 4
distributed quey processing
what is definition hierarchical data model
diagrams and meaning
Compare the two log-based recovery schemes in terms of ease of implementation and overhead cost. Ans: There are two types of log based recovery techniques: deferred update
Drawbacks of Database systems ?
What is the need for triggers? Triggers are useful mechanisms for alerting humans or for starting particular tasks automatically when particular conditions are met.
Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock
Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd