Explain weak and strong entity sets, Database Management System

Assignment Help:

Explain weak and strong entity sets?

Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that key. A weak entity set has no primary key unless attributes of the tough entity set on which it depends are included. Tuples in a weak entity grouped are partition according to their relationship along with tuples within a strong entity set. Tuples inside each partition are discernible by a discriminator, that is a set of attributes. A strong entity set has a primary key. All tuples within the set are distinguishable through that key. A weak entity set has no primary key unless attributes of the strong entity set on that it depends are included. Tuples in a weak entity set are partitioned according to their relationship along with tuples in a strong entity set. Tuples within each partition are discernible through a discriminator that is a set of attributes.


Related Discussions:- Explain weak and strong entity sets

What is interaction diagram, What is Interaction Diagram An interactio...

What is Interaction Diagram An interaction diagram shows an interaction, comprises of a set of objects and their relationships including the messages that may be dispatched be

Distributed query and transaction processing, Distributed query and transac...

Distributed query and transaction processing a.  Construct a query around any one of the functional divisions you made in 4a such that if executed in the distributed design of 4

Compare the two log based recovery schemes, Compare the two log-based recov...

Compare the two log-based recovery schemes in terms of ease of implementation and overhead cost.    Ans:  There are two types of log based recovery techniques: deferred update

What is the need for triggers, What is the need for triggers? Triggers ...

What is the need for triggers? Triggers are useful mechanisms for alerting humans or for starting particular tasks automatically when particular conditions are met.

Shared lock or read lock, Shared lock or Read Lock It is requested ...

Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd