Describe integrity constraints, Database Management System

Assignment Help:

Describe integrity constraints?

Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of incorrect information. An integrity constraint is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. If a database instance satisfies all the integrity constraints specified on the database schema, it is a legal instance. A DBMS enforces integrity constraints, in that it permits only legal instances to be stored within the database.

Integrity constraints are specified and enforced at various times:

When the DBA or end user describes a database schema, he or she specifies the integrity constraints which must carry on any instance of this database. While a database application is run, the DBMS checks for violations and disallows changes to the data in which violate the specified integrity constraints. Several types of integrity constraints can be specified in the relational model, such as, Not Null, Check, Unique, Primary Key, etc.


Related Discussions:- Describe integrity constraints

Confirming.., I just purchased a document for you guys and wanted to confir...

I just purchased a document for you guys and wanted to confirm that it will be send within an hour or 2 to my email or where will document be sent to?

desirable properties of decomposition, Desirable Properties Of Decompositi...

Desirable Properties Of Decomposition Decomposition is a process of dividing a relation into its projections that will not be disjoint. Please remind the Relational projection

Explain normalization, What is Normalization? Database normalization is...

What is Normalization? Database normalization is a data design and organization method applied to data structures based on rules that help building relational databases. In rel

How does the two phase protocol ensure serializability, How does the two ph...

How does the two phase protocol ensure serializability in database schedules?   Ans:  A transaction is termed to follow the two-phase locking protocol if all locking operations

Define access time, Define access time. Access time is the time from wh...

Define access time. Access time is the time from when a read or write request is issued to when data transfer starts.

ENTITY DIAGRAMS IN FIRST NORMAL FORM, CAN SOMEONE HELP ME WITH ENTITY DIAGR...

CAN SOMEONE HELP ME WITH ENTITY DIAGRAMS IN FIRST NORMAL FORM?

Datawarehouse, How to define a job scheduling strategy that will meet busin...

How to define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a

Explain the attribute inheritance, Explain the Attribute inheritance An...

Explain the Attribute inheritance Ans: Throughout the rendering of the objects in a view, attribute sets of objects higher in the view hierarchy are inherited via objects below

Short note on mid square method of hashing, Short Note on mid Square Method...

Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s

What are the types of indices, Normal 0 false false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd