Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
This constraint shows that the key attribute value in each tuple must be unique, i.e., no two tuples have the similar value for the key attribute. This is because the value of the primary key is used to recognize the tuples in the relation.
Example: If A is the key attribute in the following relation R than A1, A2 and A3 must be unique.
A
B
A1
B1
A3
B2
A2
Example: In relation PERSON, PERSON_ID is primary key so PERSON_ID cannot be given as the similar for two persons.
Integrity Constraint
There are two kinds of integrity constraints:
What are the categories of SQL command? SQL commands are separated in to the following categories: 1. Data - Definitition Language 2. Data Manipulation language 3. Dat
Describe the primary key functions? Primary Key : The primary key is an attribute or a set of attributes in which uniquely identify a specific example of an entity. Every entit
What subschema expresses ? A subschema expresses the external view. (External schemas are called also called as subschemas)
what factors might influence a company to outsource its IT infrascture.
What Is Sql? Structured Query Language (SQL) is a standard query language. It is usually used with all relational databases for data manipulation and definition. All the re
Discuss the problem of Spurious tuples and how we may prevent it. Ans: A spurious tuple is, mainly, a record in a database that gets created while two tables are joined bad
Higher Normal Forms Is there more normal forms beyond BCNF? Yes, though, these normal forms are not based on the concept of functional dependence. More normalisation is needed if
In a relational model how relations are termed? In a relational model, relations are termed as tables. (The term ‘relation’ is the technical name of the ‘table’ in RDBMS)
Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce
Describes the several relationship constraints through giving suitable example? Constraints on relationships: There are two kinds of constraints on relationships. 1) Mapping
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd