Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view.
Ans: The two restrictions are:
1. If a view does not consist of primary key and/or at least one of the attributes along with the NOT NULL constraint which do not have default values specified, is not updatable. This restriction is needed because if we are inserting any row in the view than all attributes not included in view of the base relation are will be denoted by the NULLs if any default value is not specified. In this type of case, if any attribute is set as NOT NULL or primary key, then it should not be NULL, and the insertion will be violating the constraints.
2. If a view defined by using grouping and/or aggregate functions, is not updatable. This restriction is also needed because, if we want to modify the base relation by view then we are not in the position to identify that tuple(s) will be modified in the group in what way.
Define tuple variable? Tuple variables are used for comparing two tuples in the same relation. The tuple variables are explained in the from clause by way of the as clause.
Strict 2PL :Though, this basic 2PL suffers from the trouble that it can result into loss of isolation / atomic property of transaction as theoretically speaking once a lock is rele
CREATE TABLE prodtrans ( pno number (4) ptype char (1) CHECK (ptype in ('I','R','S')), qty number (5) FOREIGN KEY pno REFERENCES product (pno) ON DELETE CASCADE);
Dirty Reads: T10 reads a value which is updated by T9. This update has not been committed and T9 aborts. T9 T10 Value of x old value = 200
Question 1: (a) Explain the legal meaning of :- (i) Computer Service Person (ii) Data holding (b) Explain how the law ensures Data protection and Security. Qu
prototype of a distributed information system for a national car part retail outlet chain.
What is Message switching Message switching transmits data units which can be arbitrarily long. Packet switching has a utmost packet size, if any message longer than that, it s
what are the limitations of dbms?
Define Deadlock recovery measures To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac
Scenario 1: Power goes out after the first instruction. What happens?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd