What is inheritance, Database Management System

Assignment Help:

What is inheritance? Define it in detail?

 Inheritance

Inheritance can be at the levels of types, or at the level of tables we first consider inheritance of types, then inheritance at the level of labels.

Type inheritance

Assume that we have the following type definition for people

create type person

(name varchar(20)

address varchar(20))

Table inheritance

Create table people of person

The consistency requirements for sub tables are

1. Each tuple of the sub table can correspond to at most single tuple in each of its immediate sub tables.

2. SQL:1999 has an additional constraint that all the tuples corresponding to each other must be derived from single tuple .

 


Related Discussions:- What is inheritance

#cursor, #what is cursor its uses ? Explain it

#what is cursor its uses ? Explain it

The need for three level architecture, The need for three level architectur...

The need for three level architecture The aim of the three level architecture is to divide each user's view of the database from the way the database is physically shown.

Describe the most important classes of parallel machines, Question 1 Discu...

Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.

Er digrams, what is er digram given that example of hospital,bank and libra...

what is er digram given that example of hospital,bank and library er digram.

Illustrate how customer relationship is promoted, FitAll Ltd is a company t...

FitAll Ltd is a company that manufactures clothes. Its processes are manual and there are stand-alone Information Systems that aid to manage them. The Information Systems were purc

Complete replication-data replication, Complete replication: It implies ma...

Complete replication: It implies maintaining of a whole copy of the database at every site. Thus, the reliability & availability and performance for query response are maximized.

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

Estimate the transaction states, Suppose an instruction takes 1 nanosecond ...

Suppose an instruction takes 1 nanosecond to execute (on average), a page fault takes 20 microseconds of processor time, and it takes 300 microseconds of disk time to read or write

Greater potential for bugs and increased processing overhead, Greater poten...

Greater potential for bugs: Since the sites of a distributed system operate simultaneously, it is more complex to ensure the correctness of algorithms. The art of constructing dis

Explain data models namely relational network - hierarchical, Explain the t...

Explain the three data models namely relational, network and hierarchical and evaluate their relative advantages and disadvantages. Hierarchical Model: In hierarchical model, da

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd