High-level classifications of constraints on data models

Assignment Help Basic Computer Science
Reference no: EM132225204

There are three very high-level classifications of constraints on data models in database conceptual design: inherent, explicit, and semantic.

Inherent means that the constrain can be fulfilled in the data model implicity.

Explicit means the constraint is fulfilled through a specific "Schema" of the model.

Semantic means the constraint would be fulfilled through application logic and cannot be satisfied within the model itself or any schema of the model.

These make sense in definition but I would appreciate some examples of each and an explanation of why the constrain can be made at the level where it is applied and not at the others.

Reference: https://cs.uwaterloo.ca/~tozsu/courses/CS338/lectures/3%20Constraints.pdf

This link provides a few examples but does not really explain the "Why" for each.

From the link

Constraints - Restrictions on the permitted values in a database state

  • Derived from the rules in the miniworld that the database represents
  1. Inherent model-based constraints or implicit constraints • Inherent in the data model • e.g., duplicate tuples are not allowed in a relation
  2. Schema-based constraints or explicit constraints • Can be directly expressed in schemas of the data model • e.g., films have only one director
  3. Application-based or semantic constraints • Also called business rules • Not directly expressed in schemas • Expressed and enforced by application program • e.g., this year's salary increase can be no more than last year's

Reference no: EM132225204

Questions Cloud

Preconditions and postconditions as comments : Rewrite the function pentagonal using recursion and add preconditions and postconditions as comments. Then prove by induction that the recursive function
Discuss the role of the supervisor in handling grievances : Discuss the role of the supervisor in handling grievances. Discuss how the role of you as a leader can help ensure a safe workplace.
Identify the nine areas entrepreneur : Identify the nine areas an entrepreneur should consider in choosing a legal form of organization.
Robert do with respect to board composition-board training : What would you recommend that Robert do with respect to board composition and board training?
High-level classifications of constraints on data models : There are three very high-level classifications of constraints on data models in database conceptual design: inherent, explicit, and semantic.
Two pieces of federal legislation governing compensation : Identify any two pieces of federal legislation governing compensation and the benefits for each:
How does it apply to lifespan human development : PSY278: Assignment - Course Project: Lifespan Development Project Deliverable: The Saying. How does it apply to lifespan human development
What does access control lists mean : What does access control lists mean? And what is its significance in an organization?
Order for the assignment to be completed : You must respond to three peers in order for the assignment to be completed. Please review this rubric for evaluation criteria.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Obtaining actual timing data for various values of n

Determine the running times of each algorithm, and implement all three obtaining actual timing data for various values of N.

  Value of a car is a linear function of time

Assume the value of a car is a linear function of time.  When new the car is worth $26,300; 20 years later the car is worth $1,500.  How much will the car be worth 7 years after purchase?

  How to implement in des

How to implement in DES?

  What is a singular matrix

Suppose Ax = b ≠ 0 is a linear system and A is a square, singular matrix. How many solutions is it possible for the system to have?

  Class template for the class set given

Implement the following Set class. A set is a collection of items with no duplicates. The following class implements a set of integers.

  Different types of session hijacking

Question 1: Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session hijacking was successfully used to perform an attack against a system. Include references in your a..

  What is the utilization of the cpu and disk b

If the utilization of disk B is 10%, what is the average response time when there are 20 users on the system?

  Product that relied solely on public relations

Can you think of any other product that relied solely on public relations? What was it about its unique selling proposition that made this feasible.

  Memory or many bits of data transmission speed

In computing literature, the value represented by the prefixes kilo, mega, giga and so on can vary depending on whether they are describing

  Osi model presentation

Develop a 6- to 8-slide presentation with detailed speaker notes in which you do the following: Explain the layers of the OSI Model and how data flows through the model.

  What is which an event viewer and performance monitor

What is which an event viewer and performance monitor? How can these tools improve the management of our network environment?

  Determine subgame-perfect equilibrium

Targeting again one of the surviving gangsters. Survivors split money equally. Determine subgame-perfect equilibrium.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd