Creating views with check option-data control, Database Management System

Assignment Help:

Creating views with check option: This option limits those updates of data values that cause records to go off the view. The following instance tells this in more detail:

Example: To produce a view for employees of Department = 30, such that user cannot alter the department number from the view:

CREATE OR REPLACE VIEW EMPD30 AS

SELECT EMPNO EMPL_NUM, ENAME NAME, SAL SALARY FROM EMP

WHERE DEPTNO=30

WITH CHECK OPTION;

 

Now the user cannot alter the department number of any record of view EMPD30. If this change is permitted then the record in which the change has been made will go off the view as the view is only for department-30. This restricted due to use of WITH CHECK OPTION clause

 


Related Discussions:- Creating views with check option-data control

What are the factors into account when choosing a raid level, What are the ...

What are the factors to be taken into account when choosing a RAID level? A) Monetary cost of extra disk storage requirements. B) Performance requirements in terms of number

A table joined with itself is called, A table joined with itself is called ...

A table joined with itself is called ? A table joined with itself is known as self join table. Normal 0 false false false EN-IN X-NONE X-NONE

Shared lock or read lock, Shared lock or Read Lock It is requested ...

Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock

Define the terms - physical schema and logical schema, Define the terms  1)...

Define the terms  1) physical schema 2) logical schema.  Physical schema:  The physical schema explains the database design at the physical level, which  is  the  lowest  lev

What are the constituents of file, What are the Constituents of File? Also ...

What are the Constituents of File? Also elaborates all the possible file operations? A file is organised logically as sequence of record. These records are mapped onto disk blo

Objectives-distributed and client server databases, Objectives diff...

Objectives differentiate DDBMS and conventional DBMS; Describe Network topology for DDBMS; Describe the concepts of horizontal and vertical fragmentation; Descr

NORRMALIZATION, Home based assignment Consider an ORDER table with the foll...

Home based assignment Consider an ORDER table with the following attributes: • Order Number (ONo),Customer Number (CNo),Customer Name (CNa),Item Number (INo),Unit Price (UP), Quant

Mis, explain various steps uses in evaluation and maintenance of MIS.

explain various steps uses in evaluation and maintenance of MIS.

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

E-r model uses this symbol to represent weak entity set, E-R model uses thi...

E-R model uses this symbol to represent weak entity set ? A Doubly outlined rectangle symbol is used to represent weak entity set.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd