Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
This constraint shows that the key attribute value in each tuple must be unique, i.e., no two tuples have the similar value for the key attribute. This is because the value of the primary key is used to recognize the tuples in the relation.
Example: If A is the key attribute in the following relation R than A1, A2 and A3 must be unique.
A
B
A1
B1
A3
B2
A2
Example: In relation PERSON, PERSON_ID is primary key so PERSON_ID cannot be given as the similar for two persons.
Integrity Constraint
There are two kinds of integrity constraints:
What is the need of a log in a DBMS? Briefly describe the various types of records that are normally present in a log. Ans: The system log, which is generally writt
Accessing information about permissions to all users- Object level permissions: With the use of data dictionary you can see the permissions to user. Let us get the table name fro
what is primary key
WRITE SHORT NOTES ON INDEX STRUCTURE OF FILES? There are two basic parts of indices 1. Ordered indices 2. Hash indices Every technique must be evaluated on the bas
What is Log Shipping? Log shipping is the method of automating the backup of database and transaction log files on a production SQL server, and then restoring them onto a stand
Lossless-Join Decomposition Let us show an intuitive decomposition of a relation. We require a better basis for deciding decompositions since intuition may not always be r
First Normal Form and second normal form First Normal Form (1NF) A relation is said to be in 1NF if it having no non-atomic values and each row can give a unique combinat
Define a relation ? Relation - A relations is a named two-dimensional table of data. Mathematically, a relation can be described as a subset of the cartesian product of a lis
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4
Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd