EBK DATABASE CONCEPTS
EBK DATABASE CONCEPTS
7th Edition
ISBN: 9780133544886
Author: AUER
Publisher: PEARSON CUSTOM PUB.(CONSIGNMENT)
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 5, Problem 5.34RQ

Explanation of Solution

Intersection Table:

  • Relational database system will not allow the user to implement a direct many-to-many relationship. So, the many-to-many relationship will break into two one-to-many relationships by using third table, it is called as “intersection table”.
  • The intersection table contains primary key of the two tables as a foreign key.

Recursive many-to-many relationship (N:M):

  • Recursive many-to-many relationship is one of the types of recursive binary relationship that refer to the relationship between two entities which means many fields or records in a table are associated with many fields or records in another table in recursive manner.
  • Let us consider the example:
    • The “Agent” can buy or sell the property to any other agent in recursive manner.

Explanation:

  • The “Agent_ID” is a primary key of the “Agent” table. The “Agent_for_Agent” is the intersection table which contains “Client_Agent_ID” and “Selling_Agent_ID” as the foreign keys.
  • “Client_Agent_ID” contains the “Agent_ID” of the agent buying the property and “Selling_Agent_ID” contains the “Agent_ID” of the agent acting as the selling agent...

Blurred answer
Students have asked these similar questions
3.[20 pts] Find the minimum equivalent circuit for the one shown below (show your work): DAB 0 f(A,B,C,D)
Suppose your computer is responding very slowly to information requests from the Internet. You observe that your network gateway shows high levels of network activity even though you have closed your e-mail client, Web browser, and all other programs that access the Internet. What types of malwares could cause such symptoms? What steps can you take to check whether malware has gained access to your system? What tools can you use at each step? If you identify malware, what ways might it have entered your system? How can you restore your PC to safe operation, including the special software tools you may use?
R language
Knowledge Booster
Background pattern image
Computer Engineering
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-engineering and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L