Define entity integrity and referential integrity, Database Management System

Assignment Help:

Define entity integrity and referential integrity.  How does SQL allow specification of  these?

Ans: Entity Integrity Rule- If the attribute A of relation R is a prime attribute of R after that A cannot accept null values. 

Referential Integrity Rule- In referential integrity, it is made sure that a value that appears in one relation for a given set of attributes as well appears for a particular set of attributes in another relation.

 In SQL, referential integrity and entity integrity rules are implemented as constraints on the relation known as reference Key constraint and primary Key constraint correspondingly.

 These constraints can be fixed with relation at the time of creation of the relations or after the creation of the relations by altering the definition of the relations. For instance:

 

600_Define entity integrity and referential integrity.png

 


Related Discussions:- Define entity integrity and referential integrity

Hello, Java program for horrizontal fragmentation in distributed database

Java program for horrizontal fragmentation in distributed database

Explain the aggregation implies concurrency, Explain the Aggregation implie...

Explain the Aggregation implies concurrency Concurrency actually is: This in objects can be identified by the way they change state. Present objects can change state independen

Explain sequential file organization, Question 1 What do you mean by datab...

Question 1 What do you mean by database management system? Question 2 Write a note on Object-Oriented Model Question 3 Explain Sequential File Organization Question

Describe the menu based interfaces for web clients browsing, Describe the M...

Describe the Menu based interfaces for web clients or browsing? Menu-Based Interfaces for Web Clients or Browsing - These interfaces present the user along with lists of option

Need website hacking security test, We want have a website; we need to test...

We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like

Explain the query processing, Explain the Query Processing  Data Query ...

Explain the Query Processing  Data Query Processing permits a user to report or analyze structured and unstructured data pulled from multiple data sources.

Mixed fragmentation, Mixed fragmentation: Sometimes, horizontal fragmentati...

Mixed fragmentation: Sometimes, horizontal fragmentation or vertical fragmentation of a database schema by itself is insufficient to sufficiently distribute the data for some appli

Database recovery and security, Database Recovery And Security Introdu...

Database Recovery And Security Introduction In this part we will introduce two main issues relating to database management systems. A computer system suffers from dissi

Sql select employee from table with at least one department, Consider emplo...

Consider employee (e_no, e_name, e_salary, d_code), dept (d_code, d_name) and dependent (depndt_name, e_no, relation). Show the names of employees in purchase and accounts departm

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd