Reflect upon the desirable characteristics of a primary key

Assignment Help Database Management System
Reference no: EM131094344

Database Applications Discussion

Reflect upon the desirable characteristics of a primary key (below) that were presented in this week's lecture. (150-300 words) Choose one characteristic and discuss why you believe it would be undesirable if this were not a characteristic of a primary key. Please do not repeat (or re-word) the thoughts of another student. Respond to both discusion posts shown below the lecure. (50-100 words each)

Lecure on primary keys

The primary key of a table is how we identify data in the table, so it is especially important to choose a proper primary key. There are several characteristics that are considered desirable in a primary key.

First, a primary key should be unique. It can never have a duplicate. This should be obvious since we are using the keys for identification of specific information. This is also one reason why we typically don't consider names good choices for primary keys, since two or more people can have the same name.

Next, a primary key should be stable, meaning it should never change. This is another reason why names are not considered good primary keys. Names do change: marriage, divorce, and adoption are three circumstances that readily spring to mind that might cause a name change.

Additionally a primary key should be minimal. It should use the fewest number of attributes possible. Also, it should be accessible, meaning it's available as soon as the data is created.

Furthermore, a primary key should be "factless." It should contain no information that has meaning. Meeting this characteristic helps ensure the key is security-compliant, because if the key is factless it will not contain any personally identifiable information such Social Security Numbers.

When taken together, these characteristics point to the desirability of a numeric key for the primary key. Because of this we often use a surrogate key for the primary key. We can generate a numeric surrogate key with each record, which results in the primary key meeting all the desirability characteristics. While there are occasional instances where a surrogate key is not the best choice, for the purposes of this class it will be a good idea to get into the habit of using a surrogate key for the primary key.

John's Discusion Post

When it comes to a primary key the main thing that was mentioned was that if the information could be changed not to use it as a primary key. It also mentioned that a good primary key should be numerical like an employee identification number since that is a self generated number that isn't utilizing personal information like the last 4 digits of a social security number. I think the one characteristic that is important is keeping the number stable. Ensuring that the one thing that will tie in all the information for that particular person or item will never change and will access all data from all fields in different databases as well.

Tony's Discusion Post

Within the book a primary key is a column value used to identify each row therefore the values in this column must be unique. So if I understand this right the primary key is set up to help identify the information that you put into that column. when putting in that information you want that primary key to be unique to you so you can protect your information. so creating a unquie primary key can help you protect your information. If this is correct let me know that I am on the right track with this primary key stuff.

Reference no: EM131094344

Questions Cloud

How many credits toward social security : • As part of your planning, how can you estimate what you can expect from Social Security as a contribution to your retirement income? Find this answer by going to http://www.ssa.gov/retire2. Using the menus at this site, find out your retirement ..
Explain who is liable for injuries suffered by pedestrian : Develop an understanding of the legal implications of a principal-agent business relationship. Apply this understanding to a hypothetical business situation where the agent enters into a contract and causes an injury to a third party.
How concerned are you about your individual privacy : How concerned are you about your individual privacy and your online activities? How are your personal data protected by companies that collect customer data? As an individual, what steps do you take to maintain your individual privacy?
What are valid defenses against a breach of contract claim : Review the defenses to breach of contract below and write about an instance where you employed or considered using one of these methods and explain what happened.
Reflect upon the desirable characteristics of a primary key : Reflect upon the desirable characteristics of a primary key (below) that were presented in this week's lecture. (150-300 words) Choose one characteristic and discuss why you believe it would be undesirable if this were not a characteristic of a pr..
Boris pasternak awarded the nobel prize : In 1958, Russian poet and novelist Boris Pasternak was awarded the Nobel Prize for literature, but negative Soviet reaction forced him to refuse the honor. For which novel was Boris Pasternak awarded the Nobel Prize?
Compute the break-even point in units : 1. Airy Window Units sells air conditioners for $125 per unit, and the variable cost to produce them is $87. The owner estimates that the fixed costs are $4,186,000.
Would bee liability insurance pay in this situation : Ms. Bumble Bee operates a florist shop. During a particularly busy day, she allowed one of her employees, Barry, to use her (Bee's) personal car to assist with deliveries. Barry had just obtained his driver's license. Barry was involved in an ..
Enhanced bio availability of buspirone : Enhanced Bioavailability of Buspirone  From Reservoir-Based Transdermal Therapeutic System, Optimization of Formulation Employing Box–Behnken Statistical  Design

Reviews

Write a Review

Database Management System Questions & Answers

  Identify the functional dependencies

Given the following table, identify the functional dependencies: In the table provided below, fill in the following data such that it is completely un-normalized.  That is, it is not even in 1NF

  Database management system and database design

To what extent should end users be involved in the selection of a database management system and database design

  Develop a database in ms access and support business

Customers can be friends of other customers, and view comments on wish list of their friends.

  Developing a report listing the problems with the data model

Reviewed the data model below and correct to a normal form. Developing a report listing the problems with the data model below and provide a correct data model and an accompanying data dictionary for the system based on the information about the ..

  Triangle classification specification

Consider the triangle classification specification. The system reads in three positive values from the standard input. The three values A,B, and C are interpreted as representing the lengths of the sides of a triangle.

  Information on production capacities for the market

Information applies to questions 13 thru 18: Consider the following information on production capacities for the market for a (commodity) metal and its associated marginal costs (all other costs have been sunk). Please select the correct answer and t..

  Draw dependency diagram after identifying all dependencies

Draw the dependency diagram after identifying all dependencies in this data structure. See Lecture 6, Slide 27 for dependency diagram and convert this data structure to a set of 3NF relations. Clearly showing each step

  Use an implicit cursor and a sql function to calculate

Use an implicit cursor and a SQL function to calculate the number of cars belonging to the particular car model and assign that value to the OUT parameter. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

  How protocol ensures serializability and deadlock freedom

To lock any other vertex, the transaction must have visited all the parents of that vertex and must be having a lock on one of the parents of the vertex. Show that the protocol ensures serializability and deadlock freedom.

  Characteristics of database

Describe the database and describe the four characteristics of the database? Explain the Relational Database and generate a relational database for five employees.

  Draw relational schema and show functional dependencies

Draw relational schema and show functional dependencies Comprehensive schema that shows existing PK and all functional, partial and transitive dependencies Detailed schema that shows existing PK and most functional, partial and transitive dependen..

  What are the typical departments in a data center

What techniques would you use to effectively manage a team of system administrators (network, database, application, etc.) working in your data center?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd