What is domain constraints in DBMS?
each column contains same type of data thus when you select a data type for a particular domain then DBMS will not accept any value of other data type.
Further information contributed by Ramona Maxwell. Please visit www.sqlsolver.com:
Domain constraints are a user-defined data type which enforces the integrity of the standard data types. A domain consists of all values permitted in a column. In constructing your database you would first select a standard data type such as VARCHAR or INT. You could then constrain or limit the data using NOT NULL, UNIQUE, CHECK, PRIMARY KEY or FOREIGN KEY. For example the CHECK constraint could limit INT data within your domain [column] to numbers less than 5000. You would thus define a custom data type using domain constraints.
How do you make an er- diagram for computer shop?
ER Diagram - entity relationship diagram.
Identify the entities in a computer shop.
there will be
computers , and various peripherals and components
workers
customers (.. what else ?)
Compare Database Systems and File Systems?
File system has data stored in flat files, which stores only processed data. Database system has data stored in table and they may or may not be related to each other. Database system is more efficient and also reduce redundant information which file system can not do.
It is a data structure composed of rows and fields/columns. Each row is one entry of data and the fields define what the data is. For example, in a table named People, there could be fields for FirstName, LastName, ID, PhoneNumber. Each row on that table would have information for one person.
What is microprocessor architecture?
Microprocessor Architecture is the design of Processor's functioning. It defines how devices are controlled, Execution of Data, Physical connectivity between units & components on the Processor.
What is a row in a database called?
A database is said to be a collection of records and the data is stored in the table. A table consist of number of rows and columns. Row in the database table is known as a record .
What is the meaning of g in oracle 10g?
G signifies "Grid Computing"... With the release of Oracle 10g in 2003, Oracle changed the suffix in their previous release version; from 9i to 10g... 'I' stands for Internet...this was done as a marketing effort in order to show Oracle's move towards Grid Computing... Purely a marketing strategy...
windows, mac os, unix, linux..generally all of the present versions of these OC's are multitasking ones..
Difference between Tracert and ping commands?
Tracert lists the places that a message passes from source to destination. Ping only says the computer destination is answering "yes, I'm here." Traceroute is like when you are making directions for friends to come to your house as you ride the route - "Turn right on 5th, left on 10th, 640 north, left on highway 251" Ping is a phone call where the other person picks up and says "I'm home" then hangs up.
1.planning
Establishes a high-level view of the intended project and determines its goals.
2.Analysis
Refines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
3.Design
Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudo-code and other documentation.
4.Implementation
The real code is written here.
****************
search also "system analysis and design"
What are the various type of DBMS?
Hello,
Main types of database server are:
By Anaya,
The Cheesy Animation(India ,Ahmedabad)
What are the disadvantages ofmetropolitan area network?
List of main disadvantages. - If Sever develops a fault then users may not be able to run the application programs. - A fault in the network can cause user to lose the data. -If the network stops operating then it may not be possible to access to various computers. - It is difficult to make the system secure from hackers, novices or industrial espionage. - Decisions on resource planning tend to become centralized. - Networks that have grown with little thought can be inefficient in the long term. -As traffic increases on a network the performance degrades unless it is designed properly. - The larger the network becomes difficult to manage.
How many pins are present in 8085 and 8086 microprocessor?
There are 256 ports available in the 8085 microprocessor. The IN and OUT instructions have an 8-bit port number, and that is where the 256 comes from.
In order to use ports, the hardware addressing system must decode IO/M-. Some implementations don't do this, so they map IO addresses to memory addresses. In that case, you could say there are 65536 possible IO addresses, but that is not the same as ports, because ports are specific to the IN and OUT instructions.
The other "problem" with IN and OUT is that you cannot specify the address in a register, while you can do so with indirect memory addressing.
Database comprises of records that are related to each other. In database the data is stored in the form of tables, are called database tables .
A shop will use a database to keep an inventory of stock on the shelves. When stock levels reaches a certain point, automatic reordering may take place. Price control should also be enabled within the database.
What is the best software out there to create a relational database?
you can use Microsoft excel what usually comes with the computer/laptop or u can download it of the miscrsoft website or the good old fashiond way buy it in computer software shops
hope this is a great help
Dominic barnett
If you need an online database you could try www.recs4free.com
This allows you to create your own tables and users. You can upload images and documents and it's all free.
Martin
What is functions of a database management system?
a set of principles concerned with determining which states are valid for a database.
Data Integrity within a relational database is that property of a database which ensures that it is and remains an accurate reflection the universe of discourse that it is attempting to model. This includes rules and restrictions to ensure the recording of correct data. It also involves the protection of data within the database. These rules are called integrity constrains.
These restrictions are used in almost every field of input to the database.
Examples of this is where you are given a drop box on a form to select from a list. This eliminates the chance of multiple spelling of a word. eg. colour color
Which is the best free movie download engine?
uTorrent is arguably the best free movie download engine. It is important to note, however, that downloading copyrighted material is illegal, so make sure any movies you download are not copyrighted.
What is general purpose application software?
What is Getresponse?
Getresponse is an email promoting application that permits you to:
make a mailing rundown and catch information onto it
send messages to the supporters on your mailing list
robotize your messages to endorsers by means of utilization of 'autoresponders'
see and investigate measurements identified with your email crusades – open rate, navigate, advances and so forth
Lately nonetheless, Getresponse has moved its accentuation extensively: the item currently points be a greater amount of an 'across the board' internet business and web based promoting arrangement — as opposed to a traditional email showcasing device.
In like manner, notwithstanding email showcasing highlights, Getresponse presently additionally gives a web designer, visit highlights, internet business highlights, online class facilitating, presentation pages and robotized deals channels.
What is the importance of foreign key in a table?
Foreign key is used as a reference in the child table. It is important because it is used to logically relate two and more tables.
Yes, in an Access database, typical field names for a table storing contact information could include "First Name," "Last Name," "Address," and "Phone." These field names help organize and categorize the data within the database, making it easier to manage and retrieve information.
What does the term form mean in databases?
Strictly speaking, it is meaningless with respect to databases themselves. However, many database management system (DBMS) softwares have additional applications over and above that necessary for the creation and use of the database itself. Forms are one such application, which allows the designer to create a user-friendly layout for an end-user to enter, vies and update database data.
Is there sales tax on website development in Texas?
Yes, in Texas, website development services are generally subject to sales tax. This includes charges for designing, coding, and hosting websites. However, certain services may be exempt if they qualify as custom software development or if they are delivered electronically. It's advisable for businesses to consult with a tax professional to understand specific tax obligations.
Which kind of results will appear using the search query 'frosty the snowman'?
the results will only include sites that contain the exact phrase "frosty the snowman".
No. Any number that has a decimal place is not an integer. Even if the decimal place is ".0".