Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the DBMS languages? Briefly explain?
Data Definition language (DDL):A database schema is specified through a set of definitions expressed through a special language called data definition language. For instance, the subsequent statement in the SQL describes the account table
Create table account (account_number char(10), balance integer)
Execution of the above DDL statement creates the account table. DDL permits a user to specify storage structure and access techniques used through the database system as well as specify certain consistency constraints such as balance of an account should on fall below Rs1000.
Data Manipulation language (DML): A data-manipulation language (DML) is a language which enables users to access or manipulate data as organized through the appropriate data model.
There are basically two types:
1) Procedural DMLs needs a user to specify what data are required and how to get those data. 2) Declarative DMLs (also referred to as nonprocedural DMLs) need a user to specify what data are required without specifying how to get those data.
What is a hashing function? What are the properties of a good hashing function? Describe the folding technique for hashing functions. Ans: Hashing function is a method
Modular growth: In distributed environments, it is simple to expand. Latest sites can be added to the network without affecting the operations of other sites, as they are somewhat
How to reduce data redundency
Economics: It is now usually accepted that it costs less to make a system of smaller computers with the equivalent power of a one large computer. It is more cost-effective to get s
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be
An object-oriented design process 1. Define the context and modes 2. Designs the system architecture 3. Identifies the principal system objects 4. Identifies concurrency in
what is Mapping Constraints? with examples
Why were functional methods fashionable in early days? These are inspired directly by computer architecture and thus popular among computer scientist in early days. The divisio
Give the forms of triggers? The triggering event can be insert or delete. For updated the trigger can state columns. The referencing old row as clause The referencing
What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow? When a record is inserted, the bucket to that
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd