
Define each of the following terms:
- data definition language
- data manipulation language
- referential integrity constraint
- relational DBMS (RDBMS)
- schema
(a)

Define Data Definition Language.
Explanation of Solution
Data Definition language (DDL) is a computer language which is used for creating and modifying databases and schemas. The commonly used DDL commands are CREATE, ALTER, and DROP.
- CREATE command is used to create a new table with the following syntax
- ALTER command is used to modify the existing table. The syntax is:
- DROP command is used to delete a table. The syntax is:
Create table: Table name (Column definitions).
Alter table: Table name add new column.
Drop table: Table name
(b)

Define Data Manipulation Language.
Explanation of Solution
Data Manipulation Language is a computer language used in data structures to modify the data in the databases. The most commonly used data manipulation commands are INSERT, DELETE and UPDATE.
- INSERT command is used to add records in the database. The syntax for INSERT command is:
- DELETE command is used to delete records from the table according to the condition. Syntax is:
- UPDATE command is used to update the records in the database. Syntax is:
Insert into table Table name (columns) values (values)
Delete from table Table name where (condition)
Update Table name set (column = value) where (condition)
(c)

Define referential integrity constraint
Explanation of Solution
Refential Integrity constraint is the concept used in a relational database which ensures that the tables in the database are in a consistent state. This statement means that if there is any foreign key used in the database, it must be agreed with the primary key which is referenced from that foreign key. Any changes in the primary key must be updated in the foreign key as well.
(d)

Define Relational DBMS
Explanation of Solution
Relational Database Management System (RDBMS) is a type of DBMS which is used for the data stored in relational databases in the form of tables (combination of rows and columns). RDBMS is mainly used to store the data related to manufacturing, finance, logistic, and other applications. It uses SQL commands to access the databases.
(e)

Define Schema
Explanation of Solution
Schema is a structure or architecture of the database which is supported by the DBMS. It is considered as the blueprint of how the database is constructed. The schema is stored in the data dictionary generally by the database. It defines the objects in the databases.
Want to see more full solutions like this?
Chapter 5 Solutions
Pearson eText for Modern Database Management -- Instant Access (Pearson+)
Additional Engineering Textbook Solutions
Concepts Of Programming Languages
INTERNATIONAL EDITION---Engineering Mechanics: Statics, 14th edition (SI unit)
Modern Database Management
Degarmo's Materials And Processes In Manufacturing
Java: An Introduction to Problem Solving and Programming (8th Edition)
Database Concepts (8th Edition)
- Please solve and show all steps. True or false? Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one-half of the last congestion window.arrow_forwardPlease solve and show all work. What are the purposes of the SNMP GetRequest and SetRequest messages?arrow_forwardPlease solve and show all steps. Three types of switching fabrics are discussed in our course. List and briefly describe each type. Which, if any, can send multiple packets across the fabric in parallel?arrow_forward
- Please solve and show steps. List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.arrow_forwardPlease solve and show all work. What is the advantage of web caches, and how does it work?arrow_forwardPlease solve and show steps. Consider a DASH system for which there are N video versions (at N different rates and qualities) and N audio versions (at N different rates and qualities). Suppose we want to allow the player to choose at any time any of the N video versions and any of the N audio versions. If we create files so that the audio is mixed in with its matched-rate video and the server sends only one media stream at a given time, how many files will the server need to store (each with a different URL)? If the server instead sends the audio and video streams separately and has the client synchronize the streams, how many files will the server need to store?arrow_forward
- Please solve and show all work. Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer?arrow_forwardPlease solve and show all work. Compute the checksum of the words 1011 1001, 1001 1110, and 0111 1011. Show all work.arrow_forwardPlease solve and show all work. Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explainarrow_forward
- Please solve and show all work. Thank you. Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 120; the second has sequence number 170. How much data is in the first segment? Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B sends to Host A, what will be the acknowledgment number?arrow_forwardIn Matlab script, how would you compute a Reimann sum to approximate the area under the y=sin(x) from a =0 to b = p1/2 with n=6 subintervals using left-endpoints. Use for loop. Assign the result to Lsum.arrow_forwardplease solve using the first step i did which was c(n,n) = 1/C(5,5) = 1. <n=5> P(n,n) = n!/p(8,8)= 8! <n=8>arrow_forward
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningA Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology Ptr





