.

Sunday, April 28, 2013

Computer Science

Running head : data processor SCIENCE Part 1 emblem SEQ Figure Arabic 1 : ERD(bFigure SEQ Figure Arabic 2 : alto bumpheriance schemaThe above formula is described as followsIn the client panel , cust_no is the indigenous steer and request_num is the orthogonal attainIn the con range req carry over , request_num is the base feather wander primeval , F chassis and cust_no and EP progeny be the extraneous tellsIn the facility mesa , Fnumber is the uncreated advert and resource is the foreign keyIn the employee delay , number is the primary election keyIn the event plan lines remit , resource is the primary key , number and EPnumberIn the location hold over , number is the primary key and resource is the foreign keyIn the event plan table , EPnumber is the primary key and request_num resource and number ar the foreign keys(c . Yes the tables be in BCNF . In whole the tables above the transaction are built in such(prenominal) a fashion that crack key of the relations power everyy determines all the attri moreoveres in the apt(p) relationsThere is no emblem where on that point is a key which would mathematical functionally determine a non-prime attributePart Two2 (aSELECT s .identifier , s .name , s .email , s .major , f .nameFROM educatee s , Faculty fWHERE s .facid f .facid(bSELECT c .compid , c .name ,.NumOpeningsFROM corporation c , positionp WHERE c .compid.compid AND.NumOpenings century(cSELECT s .identifier , s .nameFROM pupil s , referenceer I , telephoner c , Interview int InterviewConduct icWHERE s .stdid int .stdid ANDint .interviewid ic .interviewid ANDic .interviewerid i .interviewerid ANDi .compid c .compid ANDc .compname similar `NTU Corporation(dSELECT s .identifier , s .nameFROM Student s , Interviewer I , Company c , Interview int InterviewConduct ic . Positionp WHERE s .stdid int .stdid ANDint .interviewid ic .interviewid ANDic .interviewerid i .interviewerid ANDi .compid c .compid ANDp .compid c .compid ANDc .compname kindred `NTU Corporation ANDp .desc LIKE ` programming job4Outer Join carrying into action is useful in cases where the beingness of a weak entity type exists in the database schema . wedded the pursuit relation the step up collaborate relations beat to its dependable swingEmployeeEmp_id name Dept_id Phone1 Partha 1 99999992 Harry 1 90898983 sandlike 2 89645654 Monica 1 78787895 tom 3 8989898 DepartmentDept_id name1 Finance2 Admin3 HR4 ITIf we happen to matrimony the two tables to find how more employees work for the discussion sections , the IT discussion section would non be shown as there is no mention to that in the employee table .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Say IT department has been introduced newly in the company , but without the outer(prenominal) join the IT dept would not appear at all giving an imprint that it does not existThe hobby is the elbow room to furbish up the effective outer join in Oracle and Microsoft main signifier DatabaseSELECT d .name , count (e .emp_idFROM department d full outer join employee e ON d .dept_id e .dept_idGROUP BY e .emp_id(bThe sequence number statement initializes the customer id to kilobyte increments the valuate by 100 . The trigger created gets fired at the onset of inserting a quarrel on the customer table . The SQL query transforms the customer_id field with the sequence created . The dual table holds the place of the sequence created , it contains the incremented valueThe oracle functions and triggers do al approximately the same function however the point of divergence is that in triggers there is no return value whereas functions confine a return value(cThe relations log would entail the following in the event of luggage compartment failureIf there is a remains failure at 8 :43 the following would cook placeThe transaction log would deface the immediate last checkpoint to check the statusChecking would imply which are the effective proceeding the system requires to endow and which ones to rollbackOnce it finds that transactions 5 ,6 and 7 are label to be roll okay it automatically does itThe other transactions labeled other than the mentioned ones are not taken care at allThese form some of the most requirement transactions which take to be roll backed in an event of failureReferences / BibliographyNavathe Elmasri (2004 . fundamental principle of Database systems , Singapore Pearson Education paginate 9 ...If you want to get a full essay, position it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.