Relational schema for person, Database Management System

Assignment Help:

Example:

RELATIONAL SCHEMA for PERSON:

PERSON (PERSON_ID: integer, NAME: string, AGE: integer, ADDRESS: String)

RELATION INSTANCE

In this instance, m = 3 and n = 4

PERSON_ID

NAME

AGE

ADDRESS

1

Sanjay Prasad

35

b-4,Modi Nagar

2

Sharad Gupta

30

Pocket 2, Mayur

Vihar.

3

Vibhu Datt

36

c-2, New Delhi

Therefore current relation state reflects only the valid tuples that show a particular state of the real world. Though, Null values can be assigned for the cases where the values are missing or unknown.


Related Discussions:- Relational schema for person

Data handling and research methods, Data Handling and Research Methods: ...

Data Handling and Research Methods: The dataset encompassing 130 participants contains several variables measuring detrimental health related behaviours referring to the use o

aggregate functions-data manipulation language, Aggregate functions ...

Aggregate functions Some of these functions are min, count, max, and avg. These functions help in getting consolidated information from a set of tuples. Example:

Non-redundant cover and canonical cover, Given the following set of functio...

Given the following set of functional dependencies {cf?bg, g?d, cdg?f, b?de, d?c} defined on R(b,c,d,e,f,g) a.Find a non-redundant cover. b.Find a canonical cover.

Weak entity, Entity types that do not have any key attribute, and therefore...

Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by

Creating views with check option-data control, Creating views with check op...

Creating views with check option : This option limits those updates of data values that cause records to go off the view. The following instance tells this in more detail: Examp

What are the basic objects of the data dictionary, What are the basic objec...

What are the basic objects of the data dictionary? Tables Domains Data elements Structures Foreign Keys

Shadow copy, why shadow copy technique is used?

why shadow copy technique is used?

Assignment, What are the typical phases of query processing

What are the typical phases of query processing

Discuss the method for a hash file to expand shrink dynamic, Discuss the me...

Discuss the methods for a hash file to expand and shrink dynamically. What are the advantages and disadvantages of each? The hashing methods that permit dyanamic file expansi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd