Why are cursors necessary in embedded sql, Database Management System

Assignment Help:

Why are cursors necessary in embedded SQL?

A cursor is an object used to store the output of a query for row-by-row processing through the application programs. SQL statements operate on a set of data and return a set of data. Instead, host language programs operate on a row at a time.

The cursors are used to navigate by a set of rows returned through an embedded SQL SELECT statement. A cursor could be compared to a pointer.


Related Discussions:- Why are cursors necessary in embedded sql

Determine the three views of data, Determine the Three Views of Data We...

Determine the Three Views of Data We know that the similar thing, if viewed from dissimilar angles produces difference sights. Similarly, the database that we have formed alrea

Database for Managers, I have to create a database about anything of my cho...

I have to create a database about anything of my choice. It has to contain 4 queries, and 4 forms. It can be anything as simple as a shoe inventory with numbers - is this a service

Determine the two special events, What are two special events? The two ...

What are two special events? The two special events are as "entry" and "exit". Any action which is marked as linked to entry event is executed whenever given state is entered v

Data storage and retrieval services, An Enterprising group of Entrepreneurs...

An Enterprising group of Entrepreneurs introduced a new business named StoreItRite which is based on data storage and retrieval services. It provides the services and the company c

What are the various properties of relational tables, What are the various ...

What are the various properties of Relational tables? Relational tables have 6 properties: 1. Each row is unique. 2. Column values are of the same kind. 3. Values are

Database Normalization, I have a homework assignment due today by midnight....

I have a homework assignment due today by midnight. I need help understanding databasse normalization and determining the type of form violation & how to fix the violation.

Explain two phase locking protocol, Explain Two phase locking protocol ...

Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra

Design and building a distributed information system, The scenario You ...

The scenario You have been approached to design and implement a prototype of a distributed information system for a national car part retail outlet chain. The company comprises

What is explicit update, What is Explicit update In explicit update,...

What is Explicit update In explicit update, each derived attribute is defined with respect to one, or more fundamental base object(s). The object designer determines that de

What is e-r model, What is E-R model? This data model is based on real ...

What is E-R model? This data model is based on real world that having of basic objects called entities and of relationship between these objects. Entities are explained in a da

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd