Describe integrity constraints, Database Management System

Assignment Help:

Describe integrity constraints?

Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of incorrect information. An integrity constraint is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. If a database instance satisfies all the integrity constraints specified on the database schema, it is a legal instance. A DBMS enforces integrity constraints, in that it permits only legal instances to be stored within the database.

Integrity constraints are specified and enforced at various times:

When the DBA or end user describes a database schema, he or she specifies the integrity constraints which must carry on any instance of this database. While a database application is run, the DBMS checks for violations and disallows changes to the data in which violate the specified integrity constraints. Several types of integrity constraints can be specified in the relational model, such as, Not Null, Check, Unique, Primary Key, etc.


Related Discussions:- Describe integrity constraints

Differentiate between a subquery and a join, Differentiate between a subque...

Differentiate between a subquery and a join If we need to acquire information from one or more tables after that either subquery or join can be used. If the columns which are t

Explain the advantages of dbms over file oriented system, Explain the main ...

Explain the main advantages of DBMS over File Oriented System ?

Explain briefly concurrent task by taking an example, Explain briefly concu...

Explain briefly concurrent task by taking an example. Concurrent Task- The concurrent occurrence of more than one event is called concurrent task. Operating systems can handl

Illustrate the deployment diagram, Illustrate the Deployment Diagram A...

Illustrate the Deployment Diagram A deployment diagram shows all nodes on network, their processor execution and interconnections. In a dynamic model, this is used to represen

Explain thomas write rule, Explain Thomas' Write rule.  Show how it is diff...

Explain Thomas' Write rule.  Show how it is different from timestamp ordering protol Ans: In timestamp-based concurrency control the thomas Write rule is a rule. Given a Timest

Inconsistent analysis-problems of concurrent transactions, Inconsistent Ana...

Inconsistent Analysis : The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of s

What is the meaning of recovery, What is the meaning of Recovery? In d...

What is the meaning of Recovery? In deferred update methods, if a transaction fails before arriving its commit point, it will not have altered the database in any way, so UNDO

Describe the static hash file with buckets and chaining, Describe the stati...

Describe the static hash file with buckets and chaining and show how insertion, deletion and modification of a record can be performed. In static hash file organization, the wo

Express the properties of strings, Express the properties of Strings? ...

Express the properties of Strings? Strings can be case sensitive (or not) which can change the outcome of string operations. You can evaluate whole strings \ just part

What is known as a search key, What is known as a search key? An attrib...

What is known as a search key? An attribute or set of attributes used to look up records in a file is known as a search key.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd