Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Information Hiding
With the information hiding, you see only the details that are significant at a given level of algorithm and data structure design. The Information hiding keeps high-level design decisions separate from the low-level design details that are more likely to be change.
Algorithms
You employ information hiding for the algorithms through top-down design. Once you define the aim and interface specifications of a low-level procedure, you can pay no attention to the implementation details. They are hidden at higher levels. For e.g., the implementation of a procedure named raise_salary is hidden. All you require is to know that the procedure will increase a specific employee's salary by a given amount. Any change in the definition of raise_salary is visible to the calling applications.
Data Structures
You implement information hiding for the data structures through data encapsulation. By developing a set of utility subprograms for a data structure, you protect it from users and other developers. In that way, the other developers know how to use the subprograms that operate on the data structure but not how the structure is represented.
With the PL/SQL packages, you can specify whether the subprograms are public or private. Therefore, the packages enforce data encapsulation by letting you put subprogram definitions in a black box. The private definition is hidden and unapproachable. Only the package, not your application, is affected if definition changes. This simplifies the maintenance and enhancement.
Effects of NULL in Table Literal When a VALUES expression appears as the source value for an SQL INSERT statement, the key word NULL can appear as a field value, such that for
ROWNUM The ROWNUM returns a number representing the order in which a row was selected from the table. The first row selected has a ROWNUM of 1; the second row has a ROWNUM of
"Not Enforced" Table Constraints A constraint that is not enforced is not really a constraint within the meaning of the act, but SQL does have such a concept and it needs to b
Keyword & Parameter Description: WHEN: This keyword introduces the exception handler. You can have many exceptions execute the similar sequence of the statements by follo
DBMS_PIPE: The Package DBMS_PIPE allows various sessions to communicate over the named pipes. (A pipe is a region of memory used by one of the process to pass information to
Initializing and Referencing Collections Until you initialize a collection, a nested table or varray is automatically null (i.e. the collection itself is null, not its elements)
Creating a SQL file 1. Open a new file in Notepad++ and save it to the location c:\mysql\bin, with the name lab8script.sql (the file extension should be .sql ). Add a MySQL co
Cursor Attributes The Cursors and cursor variables have 4 attributes which give you helpful information about the execution of a data manipulation statement. Syntax:
Using the BULK COLLECT Clause The keywords BULK COLLECT specify the SQL engine to bulk-bind output collections before returning them to the PL/SQL engine. You can use these ke
Write a stored procedure that accepts the post code in which the customer resides as the input parameter. The procedure should then use an explicit cursor to display comprehensive
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd