Questions from Database Systems


Q: Consider the relation, r, shown in Figure 5.22

Consider the relation, r, shown in Figure 5.22. Give the result of the following query:

See Answer

Q: Suppose you were asked to define a class Meta Display in Java

Suppose you were asked to define a class Meta Display in Java, containing a method static void print Table(String r); the method takes a relation name r as input, executes the query “select * from r”,...

See Answer

Q: Repeat Exercise 5.13 using ODBC, defining void print Table

Repeat Exercise 5.13 using ODBC, defining void print Table (char *r) as a function instead of a method.

See Answer

Q: Consider an employee database with two relations / Where the

Consider an employee database with two relations Where the primary keys are underlined. Write a function avg salary that takes a company name as an argument and finds the average salary...

See Answer

Q: Consider the relational schema / / Where the primary

Consider the relational schema Where the primary-key attributes are underlined. A tuple (p1, p2, 3) in the subpart relation denotes that the part with part id p2 is a direct subpart of the part with p...

See Answer

Q: Consider the relational schema from Exercise 5.16. Write a

Consider the relational schema from Exercise 5.16. Write a JDBC function using non recursive SQL to find the total cost of part “P-100”, including the costs of all its subparts. Be sure to take into ac...

See Answer

Q: Redo Exercise 5.12 using the language of your database system

Redo Exercise 5.12 using the language of your database system for coding stored procedures and functions. Note that you are likely to have to consult the online Documentation for your system as a refe...

See Answer

Q: Hackers may be able to fool you into believing that their web

Hackers may be able to fool you into believing that their web site is actually a web site (such as a bank or credit card web site) that you trust. This may be done by misleading email, or even by brea...

See Answer

Q: Suppose there are two relations r and s, such that the

Suppose there are two relations r and s, such that the foreign key B of r references the primary key A of s. Describe how the trigger mechanism can be used to implement the on delete cascade option wh...

See Answer

Q: Explain the difference between two-tier and three-tier application

Explain the difference between two-tier and three-tier application architectures. Which is better suited for web applications? Why?

See Answer