Database System Concepts
Database System Concepts
7th Edition
ISBN: 9789332901384
Author: Henry F. Korth & S. Sudarshan Abraham Silberschatz
Publisher: MCGRAW-HILL HIGHER EDUCATION
Expert Solution & Answer
Book Icon
Chapter 3, Problem 21E

Explanation of Solution

a.

Query:

select memb_no, name from member natural join borrowed where isbn in (select isbn from book where publisher=’McGraw-Hill’);

Explanation:

Explanation of Solution

b.

Query:

Select memb_no, name from member m where not exists

(select isbn from book where publisher=’McGraw-Hill’ except (select isbn from member natural join borrowed where m.memb_no=memb_no));

Explanation:

The above query is get the “memb_n...

Explanation of Solution

c.

Query:

Select memb_no, name from member natural join borrowed natural join book group by memb_no, name, publisher having count (isbn)>5...

Explanation of Solution

d.

Query:

select sum(num_of_books)/ count(memb_no) from (select memb_no, (select count(*) from borrowed where member.memdber_no=borrowed...

Explanation of Solution

e.

Query:

create table participated (report_number char(20) primary key, license char(20) references car, driver_id char(20) references driver, damage_amount dec(6,2) )

Explanation:

The above query is used creat...

Blurred answer
Students have asked these similar questions
1. Complete the routing table for R2 as per the table shown below when implementing RIP routing Protocol? (14 marks) 195.2.4.0 130.10.0.0 195.2.4.1 m1 130.10.0.2 mo R2 R3 130.10.0.1 195.2.5.1 195.2.5.0 195.2.5.2 195.2.6.1 195.2.6.0 m2 130.11.0.0 130.11.0.2 205.5.5.0 205.5.5.1 R4 130.11.0.1 205.5.6.1 205.5.6.0
Analyze the charts and introduce each charts by describing each. Identify the patterns in the given data. And determine how are the data points are related.   Refer to the raw data (table):
3A) Generate a hash table for the following values: 11, 9, 6, 28, 19, 46, 34, 14. Assume the table size is 9 and the primary hash function is h(k) = k % 9. i) Hash table using quadratic probing ii) Hash table with a secondary hash function of h2(k) = 7- (k%7) 3B) Demonstrate with a suitable example, any three possible ways to remove the keys and yet maintaining the properties of a B-Tree. 3C) Differentiate between Greedy and Dynamic Programming.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education