Define entity integrity and referential integrity, Database Management System

Assignment Help:

Define entity integrity and referential integrity.  How does SQL allow specification of  these?

Ans: Entity Integrity Rule- If the attribute A of relation R is a prime attribute of R after that A cannot accept null values. 

Referential Integrity Rule- In referential integrity, it is made sure that a value that appears in one relation for a given set of attributes as well appears for a particular set of attributes in another relation.

 In SQL, referential integrity and entity integrity rules are implemented as constraints on the relation known as reference Key constraint and primary Key constraint correspondingly.

 These constraints can be fixed with relation at the time of creation of the relations or after the creation of the relations by altering the definition of the relations. For instance:

 

600_Define entity integrity and referential integrity.png

 


Related Discussions:- Define entity integrity and referential integrity

Foreign keys , Foreign Keys and NULL Let us take the relation:         ...

Foreign Keys and NULL Let us take the relation:                 DEPT DEPT ID DNAME BUDGET D1 M

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Define decision tree classifiers, Define decision tree classifiers? As ...

Define decision tree classifiers? As the name suggests decision tree classifiers use a tree: Every leaf node has an associated class, and every internal node has a predicate as

Define the attribute inheritance, Define the Attribute Inheritance The ...

Define the Attribute Inheritance The attributes of a higher level entity set are inherited through a lower level entity set made by specialization-generalization hierarchy. Nam

Determine the Disadvantages of file based systems, Determine the Disadvanta...

Determine the Disadvantages of file based systems Some of the disadvantages of file based systems are like this: Data redundancy and inconsistency: the dissimilar applic

Abap/4 statements to access internal tables without header, What should be ...

What should be declared explicitly in the corresponding ABAP/4 Statements to access internal tables without header lines & why? Work Area. This is needed as the Work Area is

What is repository?, Problem 1 Why are the operational system keys not ...

Problem 1 Why are the operational system keys not recommended for forming data warehouse primary keys? Give any two examples 2 Explain the following performance tuning techn

Database life cycle, Enumerate or state the steps in creating a relevant da...

Enumerate or state the steps in creating a relevant database of a shop.

Explain the deadlock avoidance, Define deadlock avoidance. An alternat...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s

Why like predicate used for, Why Like predicate used for? LIKE predicat...

Why Like predicate used for? LIKE predicate: The LIKE predicate searches for strings in which have a certain pattern.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd