Premium Essay

Database Questions Pg.80

In:

Submitted By swanney
Words 943
Pages 4
Alex Swan
Mr. Davis
9/18/12
Homework Review Questions
3.1 Define the following terms as they apply to the relational model of data: Domain – Set of atomic (indivisible) values. Attribute – it describes a component of the database, such as a table or a field. N-tuple – in mathematics, an ordered set of n elements called its components or coordinates. Relation Schema – It is representation of database highlighting relationships that we have created. Relation State – set of tuples that have the same attributes. Degree of a relation – number of attributes n of its relation schema. Relational Database Schema – Tables, columns and relationships that make up a relational database. Relational database state – is a union of all the individual relation states, whenever the database is changed a new state arise.
3.2 Why are tuples in a relation not ordered? - A Relation is defined as a set of tuples. Mathematically, elements of a set have no order among them: tuples in a relation do not have any particular order. In other words, a relation is not sensitive to the ordering of tuples. Tuple ordering is not part of a relation definition because a relation attempts to represent facts at a logical or abstract level.
3.3 Why are duplicate tuples not allowed in a relation? - Duplicate tuples are not allowed in a relation because it violates the specifications of the relational integrity constraints, particularly the key constraint which states that no two tuples can have the same values for their attributes at any relation state of a database.
3.4 What is the difference between a key and a superkey? - Superkey is any subset of attributes that uniquely identifies the tuples of a relation. This subset need not be minimal, that is, one can remove some attributes from it and it is still uniquely identifying. If all redundant attributes are removed you

Similar Documents

Free Essay

Database Questions Pg.80

...[Second Class Upper]     Ekiti State University, Ado-Ekiti (formerly University of Ado-Ekiti)   Ekiti State, Nigeria.   SSCE [2002] Senior School Certificate Examination Victory Royal College, Aramoko-Ekiti, Ekiti State, Nigeria. TRAINING CERTIFICATIONS PROGRAM: [2012] Certification in Sun Java Programming: Anthiis Integrated System Limited  Ado-Ekiti, Ekiti State, Nigeria. [2011] Certification in VB.net Programming: Topstock Computer Technology Offa, Kwara State, Nigeria. PERSONAL SKILLS: • Software Developer: Writing programming code such as Vb.net, Java and PHP. • Excellent knowledge of computer like Microsoft word, Excel, Access, Database computation and internet. WORK EXPERIENCES: NYSC [2012] National Youth Service Corps. Department of Planning, Research & Statistics, Ministry of Information: Uyo, Akwa-Ibom State, Nigeria.  Job Responsibilities: Research, evaluate and recommend new                       technologies for service delivery and improvement.                        Also Design, develop, program, install, implement, conduct research                       and...

Words: 480 - Pages: 2

Free Essay

Database Questions Pg.80

...This document has been...

Words: 480 - Pages: 2

Premium Essay

Electoral College

...Caden Jenkins English 2010 February 21, 2016 Annotated Bibliography Berns, Walter. “Should The Current Electoral College Be Preserved?” Congressional Digest, 80. (2001): pg.16. EBSCOhost. Web. 21 February 2016. From being one of my databases I thought that it would be a good idea to have both sides of the argument, so that is why I selected to put another pro of the electoral college. The reason for this is to simply receive more credibility from my audience that I have looked at all sides of this and from all of this information was able to draw my own conclusion. Furthermore the audience is always pleased with the fact that you do not simply hammer on the topic but show the good things about it as well. It answers key questions as to why it should be kept what good things it does for the smaller states in giving them power. It argues that if we were to take it away it would mean that the smaller states would then become more over powered by the larger ones. Durbin, Richard J. “College System Be Preserved?” Congressional Digest, 80. (2001): pg.17. EBSCOhost. Web. 21 February 2016. This article is a little bit older being published in 2001 but it still holds very good information on whether or not the college should be preserved or not. This is a very credible source to me simply because it comes from a man who has been working in politics for quite sometime. The audience would be pleased reading about this as well because they will be able to receive the opinion of a man...

Words: 1242 - Pages: 5

Premium Essay

United States Air Force Research Paper

...United States Air Force Research Report February 7, 2011 Executive Summary The United States Air Force has been able to carry on a great tradition of air supremacy and advanced technology. They were born in September 1947, when they separated from the Army Air Core, and became their own unit (www.peterson.af.mil). Providing for the troops that serve always has been a top priority of the Air Force. The Air Force is run in management form, just like any large organization, or small business. It has a rank structure, where tasks are delegated down from the ranking Officers through the Enlisted Core. After significant evaluation, I have researched and identified the following six categories necessary for the Air Force to preserve satisfaction and success from their troops: 1. Declare existing organizational goals through a firm mission statement. 2. Maintain the highest ethical standards. 3. Uphold communication through the rank structure through surveys. 4. Reinforce the importance of training for top performance. 5. Maintain the Air Force’s principal focus on the Airmen’s well-being. 6. Constantly improve from research methods to stay a premier organization. The first and second groups support a proven successful vision that has worked for more than 64 years. The Air Force’s Core Values are what helps to keep their Mission Statement so pertinent and gives them a strong backbone to sustain the high ethical...

Words: 2109 - Pages: 9

Free Essay

I(Robot) Think Therfore I Am

...Introduction Questions of our future have often been raised about our ability to share this world with what is known as “Artificial Intelligence.” Will they really make our lives easier or will they put the human race completely out of work? Will they ever become smart enough to learn and think for themselves or is it possible that they’ll become “too smart” and one day and take over the world as we know it? Many pieces of literature have been written, and many movies have been released, prophesying the demise of the human race and our damned fate into slavery to the very machines that we’ve created. Though there is a very thin line between the world of science fiction and the presence of science in “our world”, there are a lot of fears that are conceived due to speculations of the unknown and not enough hope in all of the things that we do know! The idea that humans are imperfect and have made mistakes consistently since the beginning of time, of course, isn’t comforting when considering that should we succumb to this ill fate it will be because of our own doing. However, the proven ability of our race being capable of recognizing, analyzing, correcting and improving upon our mistakes is exactly what has gotten us this far. From wars to medicine, from politics to parenting, sometimes we fail but eventually… we always succeed; so I wouldn’t be so quick to count us out of the game just yet. AI: The Beginning The word computer, in a nutshell, “refers to an object...

Words: 2284 - Pages: 10

Premium Essay

The Development of Computers

...Introduction Today, it is incredible to consider that in 1969 men landed on the moon using a computer with a 32-kilobyte memory, that was only programmable by the use of punch cards. In 1973, Astronaut Alan Shepherd participated in the first computer "hack" while orbiting the moon in his landing vehicle, as two programmers back on Earth attempted to "hack" into the duplicate computer, to find a way for Shepherd to convince his computer that a catastrophe requiring a mission abort was not happening; the successful hack took 45 minutes to accomplish, and Shepherd went on to hit his golf ball on the moon. Today, the average computer sitting on the desk of a suburban home office has more computing power than the entire U.S. space program that put humans on another world (Rheingold, 2000, p. 4). Computer science has affected the human condition in many radical ways. Throughout its history, its developers have striven to make calculation and computation easier, as well as to offer new means by which the other sciences can be advanced. Modern massively-paralleled super computers help scientists with previously unfeasible problems such as fluid dynamics, complex function convergence, finite element analysis and real time weather dynamics. Likewise, our daily lives are increasingly affected by computers, not only alleviating us from menial tasks but making it possible for us to accomplish more (Rheingold, 2000, p. 7). The personal computer (PC) has revolutionized business and...

Words: 1809 - Pages: 8

Free Essay

Evidence

...QUESTION- 1) Bincangkan bagaimanakah pengecaman (identification) seseorang suspek boleh dibuat menurut Seksyen 9 (Akta Keterangan 1950). 2) Nyatakan juga permasalahan dan cabaran-cabaran (jika ada) yang terdapat dalam teknik pengecaman tersebut dengan merujuk kepada autoriti yang relevan. Identification of Person a)Identification by fingerprint Fingerprint Identification is the method of identification using the impressions made by the minute ridge formations or patterns found on the fingertips. No two persons have exactly the same arrangement of ridge patterns, and the patterns of any one individual remain unchanged throughout life. Fingerprints offer an infallible means of personal identification. Other personal characteristics may change, but fingerprints do not. By comparing fingerprints at the scene of a crime with the fingerprint record of suspected persons, officials can establish absolute proof of the presence or identity of a person. Fingerprint is a biometric modality that is often used in a security setting. Fingerprint databases are in use worldwide for the purposes of personal identification, border control as well as to facilitate criminal forensic investigation. Many countries have multiple fingerprint databases, with each database serving a specific purpose. In Malaysia, there are at least 4 different fingerprint databases; namely PDRM-MAFIS (Polis Di Raja Malaysia- Malaysian Automated Fingerprint Identification System), PDRM-BIOFIS (Polis...

Words: 9471 - Pages: 38

Free Essay

Usability and Security

...Running Head: USABLE SECURITY THE IMPLEMENTATION Usable Security the Implementation Name Institution Abstract This project was about usability security and its implementation. It involved the designing and development of a suitable human computer interface to provide a log on module for the Kuwait armed forces computer system. The development focused on relieving the user from the load of creating, remembering and maintaining their passwords for the login process. Based on the fact that the Kuwait information and communication technology literacy levels are still in their infancy stage, the conventional authentication system was proved unfriendly to the user. This system was developed with this in mind. This proposed system relies on the user logging in to the system after identifying five pictures they uploaded earlier from among a grid of twenty five pictures. By selecting the five correct pictures which they uploaded, the system was able to successfully authenticate the user. Using these pictures greatly reduced the mental load on a user who was required to remember strong passwords that ended up being compromised (Badre 2002). The use of pictures or graphical images for authentication or access control is a practice called biometrics that is gaining popularity in establishing system security today. Due to the need to deliver a solution in the shortest time possible the...

Words: 17373 - Pages: 70

Free Essay

Windows 2008 Server

...Chapter 2: Introduction to Routers Check your Understanding Styron, Quinton Pgs. 77-80 1. Which statement best describes CLI? A. It is a graphical user interface allowing easy “point-and-click” configuration. B. It is an access point for ROM Monitor configuration. C. IT is a text-based interface using a keyboard. D. IT is required for remote management of routers. 2. When scrolling through output from a terminal session, the –More—prompt indicates which of the following? (Choose two.) A. Press the Enter or Return key for the next page. B. Press the Spacebar for the next page. C. Press the Spacebar for the next line. D. Press the Enter or Return key for the next line. 3. Which of the following statement are true about the different EXEC levels of access to a router? (Choose three.) A. User EXEC mode allows configuration changes to the router. B. Privileged EXEC mode permits commands that can change the router’s operation. C. Central Office# is an example of privileged mode prompt. D. Central Office(config)# is an example of privileged mode prompt. E. Central Office> is an example of a user mode prompt. F. User EXEC mode is also known as enable mode. 4. Which two commands ask the router to display a list of valid syntax to follow the word “show”? A. Show? B. Show help C. Sh? D. Sh ? 5. What is the likely reason for the following output from a router? Central Office# config...

Words: 871 - Pages: 4

Premium Essay

Integrating Dental Informatics in Planning an Effective Oral Health Information System in India - Need of an Hour

...INTERNATIONAL JOURNAL OF MEDICAL AND APPLIED SCIENCES E‐ISSN:2320‐3137  Review Article INTEGRATING DENTAL INFORMATICS IN PLANNING AN EFFECTIVE ORAL HEALTH INFORMATION SYSTEM IN INDIA - NEED OF AN HOUR Eshani Saxena*1, Pankaj Goel2 , Chandrashekar BR3, Sudheer Hongal 4 , 1. P.G Student , Dept of public health dentistry ,Peoples dental academy , Bhopal 2. HOD, dept of Public health dentistry AIIMS Bhopal 3. Dept of Public health dentistry, People’s dental academy , Bhopal 4. Reader, Dept of Public health dentistry, People’s dental academy , Bhopal Corresponding author: Dr. Eshani Saxena , P.G Student , Dept of public health dentistry ,Peoples dental academy , Bhopal . Received on 16 Jan 2014, Published on 2 feb 2014 ABSTRACT Technology in dentistry is a novel science and it will continue to grow in future. The research field that study dentistry from a technical perspective is dental informatics. Dental informatics engrosses every discipline in dentistry. To review the existing literature on dental informatics in public health practice and discuss the feasibility of integrating dental informatics in planning effective oral health information system in India. A thorough search for the literature on dental informatics and oral health information system was made in biomedical data bases using the search engine for two weeks by one investigator. The retrieved literature was then organized into primary and secondary sources, softwares in clinical dentistry, softwares for...

Words: 4941 - Pages: 20

Premium Essay

Cmmkfgdk

...EDITION INTERVIEW 150 programming interview questions and solutions Plus: • Five proven approaches to solving tough algorithm questions • Ten mistakes candidates make -- and how to avoid them • Steps to prepare for behavioral and technical questions • Interviewer war stories: a view from the interviewer’s side CODING GAYLE LAAKMANN Founder and CEO, CareerCup.com CRACKING THE CODING INTERVIEW CRACKING THE INTERVIEW 150 Programming Interview Questions and Solutions CODING GAYLE LAAKMANN Founder and CEO, CareerCup.com CareerCup, LLC Seattle, WA CRACKING THE CODING INTERVIEW, FOURTH EDITION Copyright © 2008 - 2010 by Gayle Laakmann. All rights reserved. Published by CareerCup, LLC, Seattle, WA. Version 3.21090410302210. Visit our website at: www.careercup.com. No part of this book may be used or reproduced in any manner without written permission except in the case of brief quotations in critical articles or reviews. For more information, contact support@careercup.com. Printed in United States of America 978-1-450-59320-5 9781450593205 (ISBN 13) Table of Contents Foreword Introduction Behind the Scenes The Microsoft Interview The Amazon Interview The Google Interview The Apple Interview The Yahoo Interview Interview War Stories Before the Interview Resume Advice Behavioral Preparation Technical Preparation The Interview and Beyond Handling Behavioral Questions Handling Technical Questions Five Algorithm Approaches The Offer and Beyond...

Words: 47808 - Pages: 192

Premium Essay

Final Strategic Plan

...Final Strategic Plan Bus/475 09/19/11 Matthew Nosbisch Introduction Effective cross-functional teaming is vital to the success of a company. Successful companies possess common traits in how its employees execute on tactics. A common trait employees at properious companies have is the ability to collaborate and work well with other employees in different departments that they rely upon for support or assistance to complete a common goal or objective. “Functional tactics are the key, routine activities that must be undertaken in each functional area—marketing, finance, production/operations, R&D, and human resource management—to provide the business’s products and services” (Pearce & Robinson, 2009, p. 309, para 4). Functional managers who provide clear functional tactics enable their employees. Clear functional tactics and direction enable employees to understand what they need to do in their day-to-day work and thereby strengthens accountability. In a present scenario, strategic direction plays a vital role in the overall success or failure of a business organization (Joyce & Woods, 2001). Key strategic elements guide the strategic direction of the organization. Alignment between strategic direction and business activities is essential to ensure the attainment of vision and mission. Strategic Objective According to the vision and mission of Mapua (spring) water company, the main objective of the company is to gain highest shares of the market by providing...

Words: 3042 - Pages: 13

Premium Essay

Mr. Michael

...1 TEACHING - LEARNING METHODS IN ACCOUNTING EDUCATION - AN EMPIRICAL RESEARCH IN THE BRAZILIAN SCENARIO Prof. Edson Luiz Riccio, Ph.D. - e-mail: elriccio@usp.br BSc. Marici Cristine Gramacho Sakata - e-mail: mcsakata@usp.br Affiliation: University of São Paulo - Brazil Faculty of Economics, Administration and Accountancy Department of Accountancy and Actuary Av. Prof. Luciano Gualberto 908 - FEA3 05508-900 – Sao Paulo – Brasil FAX: 55-11- 813 01 20 PHONE: 55-11- 3818 58 20 ABSTRACT The Teaching of Accounting is facing nowadays a significant challenge. Reason is that it aims educating youngster that are going to work in companies that use advanced Information Technologies and endeavor promoting continuous organizational changes. Those changes require constant attention and continuous adaptation from both academics and practitioners. To succeed, a neophyte has to be prepared on how to deal with these changes. It means not only receiving the necessary knowledge but also the abilities to adapt himself. In general, it is accepted that if a Course provides the student with proper knowledge utilization skills, and necessary abilities the student will be able to adapt to the difficulties of a changing environment. It is recognized that the teaching method can influence in the development of several abilities such as: cooperation, leadership, responsibility, self-confidence, independence, and ability to decision making and communication skills. The purpose of this work is to study the...

Words: 3783 - Pages: 16

Free Essay

Times of India

...the cause of sales-stickiness of Times of India published Bengali news daily Ei Samay " is hereby approved as a certified study in management carried out and presented in a manner satisfactory to warrant its acceptance as a prerequisite for the award of Post-Graduate Diploma in Management for which it has been submitted. It is understood that by this approval the undersigned do not necessarily endorse or approve any statement made, opinion expressed or conclusion drawn therein but approve the Summer Project Report only for the purpose it is submitted. Summer Project Report Examination Committee for evaluation of Summer Project Report Name Signature 1. Faculty Examiner _______________________ ___________________ 2. PG Summer Project Co-coordinator _______________________ ___________________ Certificate from Summer Project Guides This is to certify that Mr. /Ms. Saswata Biswas, a student of the Post-Graduate Diploma in Management, has worked under our guidance and supervision. This Summer Project Report has the requisite standard and to the best of our knowledge no part of it has been reproduced from any other summer project, monograph, report or book. Dr. Soma Arora Rupak Sengupta Assistant Professor AGM,RMD IMT, Ghaziabad Times Group...

Words: 1786 - Pages: 8

Premium Essay

Police Brutality

...minorities? A research paper submitted advocating the issues among police agencies in North America. This paper analyzes the protocol that determines the appropriate procedures for a safer community for the victimized minorities through use -of- force incidents. HSB4U1 December 11/12/2015 Summative Report Mrs. Kim By: Julianne Silva Table of Contents Introduction……………………………………………………………………………………Pg. 3 Chapter one: Police Issues American CCPSA Fixing Problems…………………………………………………………Pg. 4 America’s Flawed System……………………………………………………………………Pg. 6 Controlling the Police…………………………………………………………………………Pg. 7 Chapter two: Police Solutions The Debate over Body Cameras…………………………………………………………….Pg. 9 Changing Policies and Regulations...……………………………………………………….Pg. 10 Chapter Three: Community and Behaviour Police Subculture……………………………………………………………………………….Pg.12 Impact on Minorities…………………………………………………………………………….Pg.12 Conclusion……………………………………………………………………………………….Pg.14 Works Cited………………………………………………………………………………………Pg.15 Appendix A: Julianne Silva Survey Summary………………………………………………..Pg.17 Appendix B-1: ………………………………………………………………………………….... Appendix B-2……………………………………………………………………………………... Introduction One of the most controversial topics in police enforcement throughout history has been the issue between racial minorities and the misconduct of police officials. Throughout North America, high incidents involving police use of force has led racial minorities to mistrust the police and...

Words: 6747 - Pages: 27