Alter table command, Database Management System

Assignment Help:

ALTER TABLE Command: This command is used for variation of existing structure of the table in the given situation:

  • When a new column is to be added to the table structure.
  • When the existing column definition has to be altered, i.e., changing the width of the data type or the data type itself.
  • When integrity constraints have to be dropped or included.
  • When a constraint has to be allowed or not allowed.

Syntax

ALTER TABLE

ADD ( ...); ALTER TABLE
MODIFY ( ...);

ALTER TABLE

ADD CONSTRAINT < constraint type>(field name);

ALTER TABLE

DROP;

ALTER TABLE

ENABLE/DISABLE ;

You require to put many constraints like that the database integrity is not compromised.

 


Related Discussions:- Alter table command

Mention constraints to create command ddl, Mention the type of constraints ...

Mention the type of constraints we can specify in the CREATE command of DDL. The type of constraints that can be specified are as follows:- PRIMARY KEY, NOT NULL, UNIQUE, FOR

What are the four main characteristics of the database, What are the four m...

What are the four main characteristics of the database approach? The four major characteristics of the database approach are: 1. Self-describing nature of a database system. 2.

Strong entity set and weak entity set, Strong entity set and weak entity se...

Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.

Multi-key file organisation, Multi-Key File Organisation In this part, ...

Multi-Key File Organisation In this part, we will introduce two basic file Organisation schemes that permit records to be accessed by more than one key field, therefore, allowi

Describe dynamic model, Describe Dynamic Model. The dynamic model speci...

Describe Dynamic Model. The dynamic model specifies allowable sequences of changes to the objects from an object model. It contains event trace diagrams describing scenarios. A

Compute the closure set, Compute the closure (F+) for the following set of ...

Compute the closure (F+) for the following set of the functional dependencies defined on R(a,b,c,d), where F - {c→ a, ab → d, a → b, d → c}, i.e. what are all of the FDs implied b

The concurrent transactions, The Concurrent Transactions  Almost every ...

The Concurrent Transactions  Almost every commercial DBMS support multi-user environment. Therefore, allowing multiple transactions to proceed concurrently. The DBMS must make

Entity relationship, how to write tables and drow E-R diagrams for hosiptal...

how to write tables and drow E-R diagrams for hosiptal management system and how to normalize and cardinalities?

There are two major types of fragmentation, There are two major types of fr...

There are two major types of fragmentation: Horizontal& Vertical. Horizontal fragments, as the name suggests are subsets of tuples and vertical fragments are subsets of attributes

What is candidate key, What is candidate key? Candidate Key - A candi...

What is candidate key? Candidate Key - A candidate key of an entity set is a minimal superkey, which uniquely identifies each row in the relation.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd