.

Monday, November 4, 2013

Computer Science

Running head : COMPUTER SCIENCE Part 1 emblem SEQ Figure \ Arabic 1 : ERD(bFigure SEQ Figure \ ARABIC 2 : alto seduceheriance schemaThe above figure is described as followsIn the client panel , cust_no is the indigenous place and request_num is the immaterial attainIn the emergence req accede , request_num is the primary feather winding linchpin , F descend and cust_no and EP way out be the irrelevant keysIn the facility mesa , Fnumber is the primary key and resource is the foreign keyIn the employee plank , number is the primary keyIn the event plan lines table , resource is the primary key , number and EPnumberIn the location table , number is the primary key and resource is the foreign keyIn the event plan table , EPnumber is the primary key and request_num resource and number ar the foreign keys(c . Yes the tab les are in BCNF . In every the tables above the relations are built in such(prenominal) a fashion that super key of the relations power ally determines all the attri moreoveres in the apt(p) relationsThere is no instance where there is a key which would functionally determine a non-prime attributePart Two2 (aSELECT s .identifier , s .name , s .email , s .major , f .nameFROM Student s , Faculty fWHERE s .facid f .facid(bSELECT c .compid , c .name ,.NumOpeningsFROM caller c , positionp WHERE c .compid.compid AND.NumOpenings hundred(cSELECT s .identifier , s .nameFROM Student s , Interviewer I , telephoner c , Interview int InterviewConduct icWHERE s .stdid int .stdid ANDint .interviewid ic .interviewid ANDic .interviewerid i .interviewerid ANDi .compid c .compid ANDc .compname similar `NTU Corporation(dSELECT s .identifier , s .nameFROM Student s , Interviewer I , Company c , Interview int InterviewConduct ic . Positionp WHERE s .stdid int .stdid ANDint .interviewid ic .inter viewid ANDic .interviewerid i .interviewerid! ANDi .compid c .compid ANDp .compid c .compid ANDc .compname give care `NTU Corporation ANDp .desc LIKE ` programming job4Outer Join operation is useful in cases where the foundation of a weak entity type exists in the database schema . stipulation the pursuit relation the out get in touch relations fill in to its dependable swingEmployeeEmp_id name Dept_id Phone1 Partha 1 99999992 Harry 1 90898983 sandlike 2 89645654 Monica 1 78787895 Tom 3 8989898 DepartmentDept_id name1 Finance2 Admin3 HR4 ITIf we happen to join the two tables to find how many employees work for the segments , the IT department would not be shown as there is no mention to that in the employee table .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines!    All custom essays are written by professional writers!
Say IT department has been introduced newly in the company , but without the outer join the IT dept would not appear at all giving an impression that it does not existThe hobby is the modality to furbish up the full outer join in Oracle and Microsoft main course DatabaseSELECT d .name , count (e .emp_idFROM department d full outer join employee e ON d .dept_id e .dept_idGROUP BY e .emp_id(bThe age number statement initializes the customer id to yard increments the valuate by 100 . The trigger created gets fired at the onset of inserting a language on the customer table . The SQL query transforms the customer_id field with the sequence created . The dual table holds the value of the sequence created , it contains the incremented valueThe oracle functions and triggers do almost the same function however the point of variation is that in triggers there is no return value whereas functions induce a return value (cThe relations log would entail the following in the! event of body failureIf there is a transcription failure at 8 :43 the following would chair placeThe transaction log would pock the immediate last fracturepoint to check the statusChecking would imply which are the legal proceeding the system requires to swear and which ones to rollbackOnce it finds that transactions 5 ,6 and 7 are denominate to be roll backed it automatically does itThe other transactions labeled other than the mentioned ones are not taken care at allThese form some of the most requirement transactions which necessarily to be roll backed in an event of failureReferences / BibliographyNavathe Elmasri (2004 . fundamentals of Database systems , Singapore Pearson Education PAGE 9 ...If you want to get a full essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment