Professional Documents
Culture Documents
3.Define report
A database report is a formatted presentation of data from a database that
provides structured information for decision-making. Database reports are
specifically meant to convey information in a way that is easy to understand by
human beings.
1. Strong Entity
A Strong Entity is a type of entity that has a key Attribute. Strong Entity does not
depend on other Entity in the Schema. It has a primary key, that helps in identifying
it uniquely, and it is represented by a rectangle. These are called Strong Entity
Types.
2. Weak Entity
An Entity type has a key attribute that uniquely identifies each entity in the entity
set. But some entity type exists for which key attributes can’t be defined. These are
called Weak Entity types.
For Example, A company may store the information of dependents (Parents,
Children, Spouse) of an Employee. But the dependents don’t have existed without
the employee. So Dependent will be a Weak Entity Type and Employee will be
Identifying Entity type for Dependent, which means it is Strong Entity Type.
A weak entity type is represented by a Double Rectangle. The participation of weak
entity types is always total. The relationship between the weak entity type and its
identifying strong entity type is called identifying relationship and it is represented
by a double diamond.
3. Multivalued Attribute
An attribute consisting of more than one value for a given entity. For example,
Phone_No (can be more than one for a given student). In ER diagram, a multivalued
attribute is represented by a double oval.
4. Derived Attribute
An attribute that can be derived from other attributes of the entity type is known as
a derived attribute. e.g.; Age (can be derived from DOB). In ER diagram, the derived
attribute is represented by a dashed oval.
For example: Center entity offers the Course entity act as a single entity in the
relationship which is in a relationship with another entity visitor. In the real world,
if a visitor visits a coaching center then he will never enquiry about the Course
only or just about the Center instead he will ask the enquiry about both.
9.Types of DBMS keys?
2. Better Data Security: The more accessible and usable the database, the
more it is prone to security issues. As the number of users increases, the
data transferring or data sharing rate also increases thus increasing the
risk of data security. It is widely used in the corporate world where
companies invest money, time, and effort in large amounts to ensure data
is secure and is used properly. A Database Management System (DBMS)
provides a better platform for data privacy and security policies thus,
helping companies to improve Data Security.
Primary Key
There can be more than one candidate key in relation out of which one can be
chosen as the primary key. For Example, STUD_NO, as well as STUD_PHONE,
are candidate keys for relation STUDENT but STUD_NO can be chosen as
the primary key (only one out of many candidate keys).
It is a unique key.
It cannot be NULL.
Super Key
The set of attributes that can uniquely identify a tuple is known as Super Key.
For Example, STUD_NO, (STUD_NO, STUD_NAME), etc. A super key is a
group of single or multiple keys that identifies rows in a table. It supports NULL
values. (1)Adding zero or more attributes to the candidate key generates the
super key.(2)A candidate key is a super key but vice versa is not true.(3)Super
Key values may also be NULL.
Foreign Key:
If an attribute can only take the values which are present as values of some
other attribute, it will be a foreign key to the attribute to which it refers. The
relation which is being referenced is called referenced relation and the
corresponding attribute is called referenced attribute the relation which refers to
the referenced relation is called referencing relation and the corresponding
attribute is called referencing attribute.
Codd presents his 13 rules for a database to test the concept of DBMS against his
relational model, and if a database follows the rule, it is called a true relational
database (RDBMS). These 13 rules are popular in RDBMS, known as Codd's 12
rules.
15.Data manipulation?
Data manipulation is the process of organizing or arranging data in order to
make it easier to interpret. Data manipulation typically requires the use of a type
of database language called data manipulation language (DML).Meanwhile, the
three different types include manual, semi automated and fully automated.
17.discuss about the first second and third normal form with example
A relation is in 1NF if it contains an atomic value. A relation will be in 2NF if it is
in 1NF and all non-key attributes are fully functional dependent on the primary
key. A relation will be in 3NF if it is in 2NF and no transition dependency exists. A
stronger definition of 3NF is known as Boyce Codd's normal form.