Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is completeness constraint on generalization? Define the variation between total and partial design constraint. Give an example each.
Ans: Completeness Constraints
1. Total specialization constraint
a. Each entity in the superclass should be a member of some subclass in the specialization for example {HOURLY_EMPLOYEE, SALARIED_EMPLOYEE}
b. Notation: superclass
2. Partial specialization constraint an entity might not belong to any type of the subclasses
For example: {SECRETARY, ENGINEER, TECHNICIAN}
Lock Based Protocol A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are t
A relation instance indicates as r is a collection of tuples for a given relational schema at a exact point of time. A relation state r of the relation schema R (A 1 ,A 2 ,.....
1. Define and discuss Work Breakdown Structure, Critical Path Analysis, PERT charts and GANTT charts. Describe the role of each in determining scope, budgets, and schedules? What
What is self-transition? If there is a transition which goes back to same state, it is known as "self- transition." With a trigger action exit action would be executed f
Describe the storage structure of indexed sequential files and their access method. Ans: Index offers a lookup capability to rapidly reach the vicinity of the desired record.
State about the Use Case Diagram A use case diagram represents a set of use cases, actors and their relationships. These diagrams shall be used to model context or requirement
What is a security? Securities are claims on financial assets. They can be illustrated as "claim checks" which give their owners the right to receive funds in the future. Sec
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4
What are the function of DBA?
Depending upon the rules we have found, we can classify the locks into two types. Shared Lock: A transaction might be acquiring shared lock on a data item in order to read it
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd