Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A database is a set of data. But, is the data kept in a database trustworthy? To answer that query we must first answer the question. What is integrity?
Integrity simply means to keep the consistency of data. Therefore, integrity constraints in a database make sure that changes made to the database by authorised users do not compromise data consistency. Therefore, integrity constraints do not permit damage to the database.
There are primarily two integrity constraints: the referential integrity constraint and the entity integrity constraint. In order to describe these two, let us first describe the term Key with respect to a Database Management System.
Write short notes on relational constraints? Relational Constraints are: 1. NOT NULL 2. Unique 3. Primary key 4. Foreign key 5. Table check
What is view in SQL? How is it defined? Any relation that is not part of the logical model, but is made visible to a user as a virtual relation is known as a view. We descri
draw ER diagram of student entity and course entity where attribute of student entity are student roll, student name, student phone and student address and attribute of course enti
Explain trigger? Trigger: A database trigger is procedural code which is automatically executed within response to certain events on a particular table in a database. Trigger
Question : (a) Differentiate between database integrity and database security (b) Database security involves measures to avoid loss of privacy and loss of confidentiality. D
Structure Of Distributed Database: A distributed database system haves of a collection of sites, each of which keeps a local databases system. Every site is able to process local
What do you understand by a view? What does WITH CHECK OPTION clause for a view do? - A view is a virtual table which comprises fields from one or more real tables. - It is
we need example of 2phase locking
Use the IRIS dataset that comes with Weka to compare the classification performance of the following algorithms. 1. NaiveBayesSimple 2. MultiLayerPerceptron J48 (
Benefits of heap files 1. This is a easy file Organisation method. 2. Insertion is somehow capable. 3. Good for bulk-loading data into a table. 4. Best if file
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd