Running head : COMPUTER SCIENCE Part 1 emblem SEQ Figure \ Arabic 1 : ERD(bFigure SEQ Figure \ ARABIC 2 :   alto seduceheriance schemaThe above figure is described as followsIn the client  panel , cust_no is the  indigenous  place and request_num is the  immaterial  attainIn the  emergence req   accede , request_num is the    primary feather winding  linchpin , F descend and cust_no and EP way out  be the  irrelevant keysIn the facility mesa , Fnumber is the primary key and resource is the foreign keyIn the employee  plank , number is the primary                                                                                                                                                         keyIn the event plan lines  table , resource is the primary key , number and EPnumberIn the location table , number is the primary key and resource is the foreign keyIn the event plan table , EPnumber is the primary key and request_num resource and number   ar the foreign keys(c . Yes the tab   les are in BCNF . In  every the tables above the relations are built in such(prenominal) a fashion that  super key of the relations  power ally determines all the attri moreoveres in the  apt(p) relationsThere is no instance where there is a key which would functionally determine a non-prime attributePart Two2 (aSELECT s .identifier , s .name , s .email , s .major , f .nameFROM Student s , Faculty fWHERE s .facid f .facid(bSELECT c .compid , c .name ,.NumOpeningsFROM  caller c , positionp WHERE c .compid.compid AND.NumOpenings  hundred(cSELECT s .identifier , s .nameFROM Student s , Interviewer I ,   telephoner c , Interview int InterviewConduct icWHERE s .stdid int .stdid ANDint .interviewid ic .interviewid ANDic .interviewerid i .interviewerid ANDi .compid c .compid ANDc .compname  similar `NTU Corporation(dSELECT s .identifier , s .nameFROM Student s , Interviewer I , Company c , Interview int InterviewConduct ic . Positionp WHERE s .stdid int .stdid ANDint .interviewid ic .inter   viewid ANDic .interviewerid i .interviewerid!    ANDi .compid c .compid ANDp .compid c .compid ANDc .compname  give care `NTU Corporation  ANDp .desc LIKE ` programming job4Outer Join operation is useful in cases where the  foundation of a weak entity type exists in the database schema .  stipulation the  pursuit relation the  out  get in touch relations  fill in to its  dependable swingEmployeeEmp_id name Dept_id Phone1 Partha 1 99999992 Harry 1 90898983  sandlike 2 89645654 Monica 1 78787895 Tom 3 8989898 DepartmentDept_id name1 Finance2 Admin3 HR4 ITIf we happen to join the  two tables to find how many employees work for the  segments , the IT department would not be shown as there is no mention to that in the employee table .

 Say IT department has been introduced newly in the company , but without the outer join the IT dept would not appear at all giving an impression that it does not existThe  hobby is the  modality to  furbish up the full outer join in Oracle and Microsoft main course DatabaseSELECT d .name , count (e .emp_idFROM department d full outer join employee e ON d .dept_id e .dept_idGROUP BY e .emp_id(bThe  age number statement initializes the customer id to  yard increments the  valuate by 100 . The trigger created gets fired at the onset of inserting a  language on the customer table . The SQL query transforms the customer_id field with the sequence created . The dual table holds the value of the sequence created , it contains the incremented valueThe oracle functions and triggers do almost the same function however the point of  variation is that in triggers there is no return value whereas functions  induce a return value   (cThe relations log would entail the following in the!    event of  body failureIf there is a  transcription failure at 8 :43 the following would  chair placeThe transaction log would  pock the immediate last  fracturepoint to check the statusChecking would imply which are the  legal proceeding the system requires to  swear and which ones to rollbackOnce it finds that transactions 5 ,6 and 7 are  denominate to be roll backed it automatically does itThe  other transactions labeled other than the mentioned ones are not  taken care at allThese form some of the most  requirement transactions which  necessarily to be roll backed in an event of failureReferences / BibliographyNavathe Elmasri (2004 .  fundamentals of Database systems , Singapore Pearson Education  PAGE 9 ...If you want to get a full essay, order it on our website: 
OrderCustomPaper.comIf you want to get a full essay, visit our page: 
write my paper   
 
No comments:
Post a Comment