Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the Constituents of File? Also elaborates all the possible file operations?
A file is organised logically as sequence of record. These records are mapped onto disk blocks. Although blocks are of fixed size denoted through the physical properties of the disk and through the operating system, record sizes vary. In a relational database, tuples of distinct relations are commonly of different sizes.
Possible operations on a file: (i) Create: a file can be created (ii) Delete: a file can be deleted (iii) Changing attributes of a file: The attributes of a file say read only, author's name etc. can be changed. (iv) Contents of the file can be altered.
Define the terms i) DDL ii) DML DDL: Data base schema is specified by a set of definitions expressed by a special language known as a data def
assume we have the following apllicationthat model sccer team the games they play and the players inv each teamin the design we want to capture
Saving Derived Attributes to Avoid Re-computation Data that is derived from other data should be stored in the computed form to avoid re-computation. For this, we could define
a need some real life examples of database management systems three level of ANSI SPARC architecture life teacher and student ,company and employee or for NGO etc.
Question: (a) e-Government implementations normally evolve through a multi-stage process. Describe, using appropriate examples, the stages involved in an e-Government implemen
Explain Candidate key? Candidate Key - A candidate key is a minimal superkey, that can be used to uniquely identify a tuple in the relation.
Discuss the methods for a hash file to expand and shrink dynamically. What are the advantages and disadvantages of each? The hashing methods that permit dyanamic file expansi
What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.
What is the function of IO/M signal in the 8085? It is a status signal. It is used to differentiate among memory locations and I/O operations. When this signal is low (IO/M = 0
Question 1 Explain the concept of Foreign Key. How a foreign key differs from a Primary Key? Can the Foreign Key accept nulls? Question 2 With a necessary example explain (i)
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd