Attributes and tuple, Database Management System

Assignment Help:

Before we talk about the relational model in more detail, let us first define some very basic terms used in this model.

Tuple

Every row in a table shows a record and is called a tuple. A table containing 'n' attributes in a record is called n-tuple.

Attribute

 The name of every column in a table is used to interpret its meaning and is known as an attribute. Every table is called a relation.

For instance, Figure shows a relation PERSON. The columns NAME, PERSON_ID, AGE and ADDRESS are the attributes of PERSON and every row in the table represents a separate tuple (record).

 

Relation Name:  PERSON

PERSON_ID

NAME

AGE

ADDRESS

TELEPHONE

1

Sanjay Prasad

35

b-4,Modi Nagar

011-25347527

2

Sharad Gupta

30

Pocket 2, Mayur Vihar.

023-12245678

3

Vibhu Datt

36

c-2, New Delhi

033-1601138

Figure: An extended PERSON relation


Related Discussions:- Attributes and tuple

Insert - referential integrity, The insertion of a tuple in the aim of refe...

The insertion of a tuple in the aim of reference does not cause any destruction. Though, insertion of a tuple in the relation in which, we has the foreign key, for instance, in ASS

What are the comparison operator in sql, What are the comparison operator i...

What are the comparison operator in SQL?  Comparison operator in SQL are =, LIKE and BETWEEN

What is data definition language, What is data definition language? Explain...

What is data definition language? Explain it in detail? The SQL DDL allows specification of not only a set of relations, but also information after each relation, containing

State the technique of converting the state diagram to code, The technique ...

The technique of converting the state diagram to code a) Identify all major control paths. Start from initial state; choose a path across the diagram that corresponds to normal

Complexity- drawbacks of data distribution, Complexity : A distributed DBMS...

Complexity : A distributed DBMS that is available, reliable, and secure is inherently more difficult than a centralised DBMS. Though, adequate data replication is essential to have

Explain the shadow paging recovery technique, Explain the shadow paging rec...

Explain the shadow paging recovery technique.  Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i

Define the two phase locking protocol, Define the Two Phase Locking Protoco...

Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u

Security-drawbacks of data distribution, Security: In a centralised system...

Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many

How does the two phase protocol ensure serializability, How does the two ph...

How does the two phase protocol ensure serializability in database schedules?   Ans:  A transaction is termed to follow the two-phase locking protocol if all locking operations

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd