Why are cursors necessary in embedded sql, Database Management System

Assignment Help:

Why are cursors necessary in embedded SQL?

A cursor is an object used to store the output of a query for row-by-row processing through the application programs. SQL statements operate on a set of data and return a set of data. Instead, host language programs operate on a row at a time.

The cursors are used to navigate by a set of rows returned through an embedded SQL SELECT statement. A cursor could be compared to a pointer.


Related Discussions:- Why are cursors necessary in embedded sql

List the string operations supported by sql, List the string operations sup...

List the string operations supported by SQL? 1) Pattern matching Operation 2) Concatenation 3) Extracting character strings 4) Converting among uppercase and lower cas

Describe integrity constraints, Describe integrity constraints? Integr...

Describe integrity constraints? Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of inc

Read-set(t) and timestamps-optimistic concurrency contents, read-set(T) : E...

read-set(T) : Each data items that are read by a transaction T Timestamps : for all transaction T, the start-time and the end time are reserved for all the three phases.

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Sorting-stacks, 1. Identify the comparisons and exchanges made to sort the ...

1. Identify the comparisons and exchanges made to sort the following array using the selection exchange sort technique. Note: you may not need all columns. Ori

Give the limitations of sql authorization, Give the limitations of SQL auth...

Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

Define physical and logical data independence, Define physical and logical ...

Define physical and logical data independence. How does this architecture help in achieving these? Data independence entails that change in one view must not need a change in t

What are the ways of obtaining the connection parameters, What are the ways...

What are the ways of obtaining the connection parameters?  Hardwire the parameters into the program. Ask for the parameters interactively. Get the parameters

Command line interfaces, Command Line Interfaces: These are interactive int...

Command Line Interfaces: These are interactive interfaces, character-based that let you use the complete power and functionality of the DBMS query language directly. They permit yo

How many types of users works on database, How many types of users works on...

How many types of users works on database? Users are differentiated through the way they expect to interact along with the system (i) Application programmers-interact with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd