Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the DBMS languages? Explain.
Ans: a) Data Definition Languages (DDL): It is employed to specify database schema for example CREATE DROP statements etc.
b) Data Manipulation language (DML): DML is employed to express database queries and update. For example: SELECT, UPDATE, DELETE statements, etc.
Related fields in a database are grouped in which form? Related data fields in a database are grouped to form a data record. (A record is a collection of related fields)
Object-based Models: Use objects as key data representation components . Examples:- Entity-Relationship Model: It is a collection of real world objects known as entitie
What is a disjoint less constraint? Ans: It needs that an entity belongs to no much more than one level entity set. Disjoint less constraint needs that an entity belongs to
Define Deadlock prevention These protocols make sure that the system will never enter a deadlock state. There are two methods to deadlock prevention. One approach makes sure t
At its most essential level the DBMS architecture can be divide into two parts: the back end and the front end. The back end is responsible for managing the physical database an
What is banker's algorithm? Banker's algorithm is a deadlock avoidance algorithm that is applicable to a resource-allocation system with multiple instances of each resource ty
Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many
One-way Associations If an association is only traversed in single direction, then it is known as one-way association. It is implemented as a pointer or an attribute which con
The primary key is selected from the
Which method is used to key transformation ? A hash method is used to key transformation.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd