answersLogoWhite

0

📱

Database Programming

Databases are collections of tables that maintain and display information, often collaboratively; this information can be used for interaction with an application or gaining general knowledge. Questions about database engines and modifying or using them belong in this category.

8,803 Questions

How do you apply a foreign key in a database?

The foreign key is a reference to a key (identifier) of a row in another or even the same table. When the foreign key is not null, it implies that there's an entry in the referenced table with that identifier.

The syntax depends on wich database are you using, check the page in the related links below.

What helps insure data integrity by maintaining information in only one place?

A centralized database helps ensure data integrity by maintaining information in only one place. This prevents the occurrence of duplicate or conflicting data, as changes or updates are made in a single location. This approach helps maintain consistency and accuracy of the data, reducing the risk of data corruption or inconsistencies.

What is a paid database?

Lite Database A Lite database is database software offered for free and contains a limited selection of functionality. It will work forever but more advanced features are disabled. This is done to allow people to 'try before the buy'.

Paid Database

A Paid version offers all of the functionality but at a cost.

Trial Database

A Trial version offers all of the functionality of the Paid database, but only for a short period of time. Generally a month or less. After that point, it either offers Lite database functionality or none at all.

Open Source

Databases that are fully functional and free to use forever.

In general, these types refer not to the database itself or it's abilities, but to the methods of driving sales of the database software.

How is a database used during an ecommerce transaction?

An online database is searched in order that the consumer can find the product they are looking to purchase, and it is selected. The customer then checks out, and their information is added to a customer database so the company can email the customer periodically; first to review the product and then any time after when the company things the consumer may be interested in a new product. The customer databse also prevents consumers from having to re-enter all their information, such as a shipping address, each time they purchase something from the same website.

What is query coverage IN BLAST?

this tells you, how long piece of your sequence is covered by the one found

Why most of the Enterprise Resource Planning project failed in the world?

Because too many companies take a technical view of the project. What they need to do is to take a business view first, choose software that supports how they want to run the business, adapt/change the software as little as possible, install and roll it out.

Does access database allow you to save data?

Yes, Microsoft Access allows you to save data in a relational database format. Users can create tables to store data, use forms for data entry, and run queries to retrieve specific information. Additionally, Access supports various data types and relationships between tables, facilitating organized data management and retrieval.

What is one type of relational transgression?

Relational Transgression is where an individual steps out of the "norms". This often includes a betrayal of some sort. A good example of this betrayal would be a partner flirting with other people, although somewhat innocent, it still is a type of betrayal. The degree of seriousness can often range from one level to another.

Can you convert a currency field to a number field in access?

ya sure we can do for convert a currency field to a number field.

What is grouping in DBMS?

Let's start with the GROUP BY clause. You can use this to group values from a column, and, if you wish, perform calculations on that column. Let's look at a simple example:

mysql> SELECT poet,SUM(copies_in_stock) FROM writer GROUP BY poet; +----------------------+----------------------+ | poet | SUM(copies_in_stock) | +----------------------+----------------------+ | Douglas Livingstone | 23 | | Mongane Wally Serote | 13 | +----------------------+----------------------+

by

m.sathyam reddy

How do you create relationships in databases?

first you be friends with the person and when you get closer your crush will like you and then you will be in a relationship

What are advantages and disadvantages of data acquisition system?

Advantages

  • Reduced data redundancy
  • Reduced updating errors and increased consistency
  • Greater data integrity and independence from applications programs
  • Improved data access to users through use of host and query languages
  • Improved data security
  • Reduced data entry, storage, and retrieval costs
  • Facilitated development of new applications program

Disadvantages

  • Database systems are complex, difficult, and time-consuming to design
  • Substantial hardware and software start-up costs
  • Damage to database affects virtually all applications programs
  • Extensive conversion costs in moving form a file-based system to a database system
  • Initial training required for all programmers and users

What is some information on ice overflow?

ICEs are made of custom actions that evaluate static data in a built MSI file. They check things that need to be true, but the database schema cannot enforce. In this sense, it's somewhat like a unit test for a database, but doesn't test a lot of things, such as any of the code for custom actions. InstallScript projects do not create an MSI, so ICEs cannot be used; however InstallScript MSIs do create an MSI.

What is schema and sub-schema in dbms?

A subschema is the applications programmer's view of the data within the database pertinent to the specific application. A subschema has access to those areas, set types, record types, data items, and data aggregates of interest in the pertinent application to which it was designed. Naturally, a software system usually has more than one programmer assigned and includes more than one application. This means there are usually many different subschemas for each schema.

The following are a few of the many reasons subschemas are used:

1 Subschemas provide different views of the data to the user and the programmer, who do not need to know all the data contained in the entire database.

2. Subschemas enhance security factors and prohibit data compromise.

3. Subschemas aid the DBA while assuring data integrity.

Each data item included in the subschema will be assigned a location in the user working area (UWA).The UWA is conceptually a loading and unloading zone,where all data provided by the DBMS in response to a CALL for data is delivered. It is also where all data to be picked up by the DBMS must be placed.

Schema Data Definition Language (DDL)The schema data definition language (DDL) is used for describing a database, which maybe shared by many programs written in many languages. This description is in terms of the names and characteristics of the data items, data aggregates, records, areas, and sets included in the database, and the relationships that exist and must be maintained between occurrences of those elements in the database.l Data item. A data item is an occurrence of the smallest unit of named data. It is represented in a database by a value.l Data aggregate.A data aggregate is an occurrence of a named collection of data items within a record. There are two kinds-vectors and repeating groups. A vector is a one-dimensional sequence of data items, all of which have identical characteristics. A repeating group is a collection of data that occurs a number of times within a record occurrence collection may consist of data items, vectors.repeating groups

What are different types of hashing techniques are there in DBMS?

there are 2 types of hashing techniques

1- Static hashing

2-Dynamic hashing