answersLogoWhite

0

📱

Database Programming

Databases are collections of tables that maintain and display information, often collaboratively; this information can be used for interaction with an application or gaining general knowledge. Questions about database engines and modifying or using them belong in this category.

8,803 Questions

Identify two limitations of physical models?

One limitation of a physical model is that a model of a human body may look like a human body, but does not act/work like a human body does.

( sorry only found one limitation )

What is the different between a view and a create view?

View is a virtual table that do not have any data of its own but have data that is derived from another table called base table. Create view is the command used to create a view (virtual table).

How do you enter data into the table?

You can enter data into a table using the INSERT keyword.

Ex:

INSERT INTO emp_master VALUES ('11111', 'john', '30, Newport pkwy, NJ')

The above command will insert one row of data into the emp_master table.

What is a one-to-many relationship?

It is a term from computer databases. A relational database can have a one-to-many relationship in its data. For example, if you have a customer order database, one table will contain customer names and another will contain their orders. Each customer will only be listed once, but each customer can make many orders. So one customer can be related to many orders. Incorporating that into a database requires the creation of a one to many relationship.

How do you build a database in visual foxpro?

On File choose New, a window will appear and ask you for New Project or Database. Choose Database and click New File. It will then ask you to give a database name. After your Database is made, you can now add tables.

Explain about primary key super key candidate key alternate key composite key foreign key?

KEYS IN SQL

* Alternate key - An alternate key is any candidate key which is not selected to be the primary key

* Candidate key - A candidate key is a field or combination of fields that can act as a primary key field for that table to uniquely identify each record in that table.

For Eg:

The table:

Emloyee(Name,Address,Ssn,Employee_Idprimary_key,Phone_ext)

In the above example Ssn no. and employee identity are ccandidate keys.

* Compound key - compound key (also called a composite key or concatenated key) is a key that consists of 2 or more attributes.

* Primary key - a primary key is a value that can be used to identify a unique row in a table. Attributes are associated with it. Examples of primary keys are Social Security numbers (associated to a specific person) or ISBNs (associated to a specific book).

In the relational model of data, a primary key is a candidate key chosen as the main method of uniquely identifying a tuple in a relation.

For Eg:

Emloyee(Name,Address,Ssn,Employee_Idprimary_key,Phone_ext)

* Superkey - A superkey is defined in the relational model as a set of attributes of a relation variable (relvar) for which it holds that in all relations assigned to that variable there are no two distinct tuples (rows) that have the same values for the attributes in this set. Equivalently a superkey can also be defined as a set of attributes of a relvar upon which all attributes of the relvar are functionally dependent.

For Eg:

Emloyee(Name,Address,Ssn,Employee_Idprimary_key,Phone_ext)

All the above are super keys.

* Foreign key - a foreign key (FK) is a field or group of fields in a database record that points to a key field or group of fields forming a key of another database record in some (usually different) table. Usually a foreign key in one table refers to the primary key (PK) of another table. This way references can be made to link information together and it is an essential part of database normalization.

For Eg:

For a Student....

School(Name,Address,Phone,School_Reg_noprimary_key

Why is accuracy data input important?

yes,data should b accurate in database.so that if any time we want to retrive data from database we will be able to see correct data.for example burger king arrange a special menu and pricing for weekends.and if data is not accurate then other branches of burger king will not get this information correctly.and due to this business can flop.

How is indexing faster than sorting when accessing data from a table?

Indexing can be faster than sorting. It can also be slower. It depends on how many rows your predicate clause is selecting, and on the data dispersion represented by those index keys. If you are selecting a few rows, such as less than 4% of the table, then by all means use an index. If you are selecting a lot of rows, such as more than 25% of the table, then the use of the index will usually degrade performance, so go for the full table scan followed by a sort. (Of course, now you are adding the use of sort space, so that is a consideration.) The break-even point depends on the particular RDBMS and on the structure of the data. If your RDBMS supports EXPLAIN PLAN, then use it, and learn to know what it means. Also, make sure you understand your data, because (sometimes) only you know the best way to query it, and it might make sense to override the optimzer and force a certain execution plan based on your knowledge.

What is the difference between data manipulation language and data definition language?

DDL or Data Definition Language is used to define the database and other related functions like creating tables, views, indexes etc. Some commands in DDL are:

  • CREATE TABLE
  • ALTER TABLE
  • CREATE VIEW
  • DROP TABLE
  • etc.

DML or Data Manipulation Language is used to modify the contents of the data in a database. Ex:

  • SELECT
  • INSERT
  • UPDATE
  • DELETE
  • ORDER BY
  • GROUP BY
  • etc.

DDL

Data Definition Language (DDL) statements are used to define the database structure or schema. Some examples:

  • CREATE - to create objects in the database
  • ALTER - alters the structure of the database
  • DROP - delete objects from the database
  • TRUNCATE - remove all records from a table, including all spaces allocated for the records are removed
  • COMMENT - add comments to the data dictionary
  • RENAME - rename an object
DML

Data Manipulation Language (DML) statements are used for managing data within schema objects. Some examples:

  • SELECT - retrieve data from the a database
  • INSERT - insert data into a table
  • UPDATE - updates existing data within a table
  • DELETE - deletes all records from a table, the space for the records remain
  • MERGE - UPSERT operation (insert or update)
  • CALL - call a PL/SQL or Java subprogram
  • EXPLAIN PLAN - explain access path to data
  • LOCK TABLE - control concurrency

In which os sql server works?

SQL server is a database developed by the Microsoft corporation. The database is built to exclusively work on Microsoft Operating systems like Windows XP, Windows 2000, Windows Vista etc.

It works on all Windows based platforms, but it does depend on the Edition of SQL Server you are going to implement. For example you can run SQL Server Express on Windows Server, but you cannot run SQL Server Enterprise on Windows XP. It will only run on Windows Server systems.

Data flow diagram for bus reservation system?

Data flow diagram of a bus reservation system will consists of pieces like customer , user screen, input , process , Output . These main entities will be interconnected by lines.

Difference between composite and primary key?

There are two types of keys in any database; composite and primary keys. Composite key differs from primary key in that it contains more than one column while primary key is composed of only one field and cannot have a null value.

How do you select all columns of all rows from a table?

You select all columns of all rows from a table with the select * from table_name sql statement. Be careful, this can potentially be a very expensive, poor performance, network intensive type of operation - it is better to select only the columns and rows needed.

Explain the difference between a heterarchical network and a hierarchical network?

DISH is a leading satellite TV & internet provider offering the best programming and technology at an unbeatable value. Dish delivers the best video anywere at anutime utlizing state-of-the-art equipment & technology & award-winning HD & DVR Technology! cutt.ly/oh42ktR

What does a 6633N SAP 10-50 CCMS mean?

6633N SAP 10-50 GC/MS is a Quest Labs designation for a standard urinalysis which tests for cannabinoids, amphetamines, opiates etc.

There is a 50ng/ml drug/metabolite cutoff level for the initial immunoassay screening with a 15ng/ml confirmation cutoff using Gas Chromotography/Mass Spectrometry (GC/MS) method.

Only specimens which fail the initial immunoassay screening, referred to as "presumptive positives", are sent for GC/MS confirmation at the more sensitive level.

During the initial immunoassay screening, tests for validity such as specific gravity, creatinine level, alduterant (additive) checks etc. nare performed to ensure that the specimen has not been tampered with and is actual human urine.

If a specimen passes intitial screening a "pass" is reported and no further testing is performed.

What is sqlite?

SQLite is an ACID-compliant embedded relational database management system contained in a relatively small (~225 KB[1]) C programming library. The source code for SQLite is in the public domain. Unlike client-server database management systems, the SQLite engine is not a standalone process with which the program communicates. Instead, the SQLite library is linked in and thus becomes an integral part of the program. It can also be called dynamically. The program uses SQLite's functionality through simple function calls, which reduces latency in database access as function calls within a single process are more efficient than inter-process communication. The entire database (definitions, tables, indices, and the data itself) is stored as a single cross-platform file on a host machine. This simple design is achieved by locking the entire database file at the beginning of a transaction. SQLite is embedded into a growing number of popular applications. For example, Mozilla Firefox stores a variety of configuration data, (bookmarks, cookies, etc.), in internally managed SQLite databases. As another example, Google's Android OS for cellphones and other small devices includes SQLite.

What is Difference between uncontrolled events and controlled events?

a controlled event is a variable that you can manipulate and change or do anything you want with you want. uncontrolled event is something you cannot help. in example, if you were doing something with eye colors, you just have to deal with the eye color the person has. you cannot change it.

Who are actors on the scene in DBMS?

SOURCE: http://jeenuutreja.blogspot.in/2012/07/actors-on-scene-in-dbms-in-this-topic.html

I'd copy paste this here but these guys have earned a visit!

What is Human capital vital records and databases supplies and equipment and systems are referred to collectively as?

These are collectively referred to as "physical capital" or "tangible assets." This includes resources such as buildings, machinery, technology, and tools that contribute to the production of goods and services. In contrast, "human capital" refers to the skills, knowledge, and experience of individuals that also contribute to the productivity and success of an organization.