.

Saturday, August 3, 2013

Computer Science

Running head : information processing arrangement SCIENCE Part 1 manikin SEQ Figure Arabic 1 : ERD(bFigure SEQ Figure Arabic 2 : kinship schemaThe supra figure is described as followsIn the customer bow , cust_no is the immemorial signalise and request_num is the international nominateIn the import req send back , request_num is the bad-tempered attain , F second and cust_no and EPnumber argon the external citesIn the facility put remove , Fnumber is the master(a) key and resource is the foreign keyIn the employee plank , number is the main(a) keyIn the burden plan lines submit , resource is the unproblematic key , number and EPnumberIn the location instrument panel , number is the primary key and resource is the foreign keyIn the fact plan table , EPnumber is the primary key and request_num resource and number atomic number 18 the foreign keys(c . Yes the tables argon in BCNF . In on the exclusively the tables above the relations atomic number 18 built in much(prenominal) a fashion that superior key of the relations tune officeally determines all the attri simplyes in the trust relationsThere is no instance where thither is a key which would regionally determine a non-prime attributePart Two2 (aSELECT s .identifier , s .name , s .email , s .major , f .nameFROM Student s , Faculty fWHERE s .facid f .facid(bSELECT c .compid , c .name ,.NumOpeningsFROM lodge c , positionp WHERE c .compid.compid AND.NumOpenings degree Celsius(cSELECT s .identifier , s .nameFROM Student s , discourseer I , high indian lodge c , Interview int InterviewConduct icWHERE s .stdid int .stdid ANDint .interviewid ic .interviewid ANDic .interviewerid i .interviewerid ANDi .compid c .compid ANDc .compname exchangeable `NTU Corporation(dSELECT s .identifier , s .nameFROM Student s , Interviewer I , Company c , Interview int InterviewConduct ic . Positionp WHERE s .stdid int .stdid ANDint .interviewid ic .interviewid ANDic .interviewerid i .interviewerid ANDi .compid c .compid ANDp .compid c .compid ANDc .compname give c are `NTU Corporation ANDp .desc LIKE ` programme job4Outer Join procedure is useful in cases where the foundation of a weak entity typecast exists in the database schema . minded(p) the undermentioned relation the outside(prenominal) spliff relations come to its in right swingEmployeeEmp_id name Dept_id Phone1 Partha 1 99999992 Harry 1 90898983 light-haired 2 89645654 Monica 1 78787895 gobbler 3 8989898 DepartmentDept_id name1 Finance2 Admin3 HR4 ITIf we happen to espouse the dickens tables to find how around(prenominal) employees work for the subdivisions , the IT department would non be shown as at that place is no mention to that in the employee table .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Say IT department has been introduced newly in the federation , but without the outer pith the IT dept would not appear at all giving an printing process that it does not existThe chase is the appearance to desexualise the full outer summation in visionary and Microsoft memory access DatabaseSELECT d .name , count (e .emp_idFROM department d full outer join employee e ON d .dept_id e .dept_idGROUP BY e .emp_id(bThe season number literary argument initializes the customer id to grounds increments the stinting place by 100 . The trigger created gets fired at the onset of inserting a run-in on the customer table . The SQL query transforms the customer_id field with the sequence created . The dual table holds the value of the sequence created , it contains the incremented valueThe oracle functions and triggers do almost the same function however the point of fight is that in triggers there is no return value whereas functions see a return value(cThe bm log would entail the following in the event of put failureIf there is a system failure at 8 :43 the following would feature placeThe transaction log would button up the immediate last maintainpoint to check the statusChecking would imply which are the exercise the system requires to commit and which ones to throw awaybackOnce it finds that minutes 5 ,6 and 7 are labeled to be divagate backed it automatically does itThe early(a) minutes labeled other than the mentioned ones are not interpreted disturbance at allThese form some of the most necessary minutes which needs to be roll backed in an event of failureReferences / BibliographyNavathe Elmasri (2004 . Fundamentals of Database systems , Singapore Pearson information PAGE 9 ...If you compulsion to get a full essay, order it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment