Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is inheritance? Define it in detail?
Inheritance
Inheritance can be at the levels of types, or at the level of tables we first consider inheritance of types, then inheritance at the level of labels.
Type inheritance
Assume that we have the following type definition for people
create type person
(name varchar(20)
address varchar(20))
Table inheritance
Create table people of person
The consistency requirements for sub tables are
1. Each tuple of the sub table can correspond to at most single tuple in each of its immediate sub tables.
2. SQL:1999 has an additional constraint that all the tuples corresponding to each other must be derived from single tuple .
#question.explain diversity and magnitude of organic compounds and general properties?
Hot Backup: Some sites cannot terminate the database while creating a backup copy of the files. The cold backup is not a reliable option. So different kinds of backing up database
Differentiate between a Global and a Local temporary table? - A local temporary table exists only for the duration of a connection or if defined inside a compound statement, fo
What are ways of finding out either an update is required or not for derived attributes? The ways to find out an update is required or, not are as: Explicit update
Describe Physical Data independence ? Physical Data Independence - It is capacity to modify the internal schema without having to change conceptual schema. Therefore, the exter
the of super market system done in database
1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict
State the Design of Associations Before designing associations, it is essential to know the way they are used. For this, analysis of association traversals is required. It is
Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to
Explain about primary key Primary Key: It is one of the candidate keys that are taken to be the recognizing key for the entire table. E.g. although there are two candidate ke
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd