Determine the strong and weak entity, Database Management System

Assignment Help:

Determine the Strong and Weak Entity

Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and an entity not having a primary key of its own. In such a case, the entity having its own primary key is known as a strong entity and the entity not having its own primary key is known as a weak entity. Whenever we need to relate a strong and a weak entity together, the ERD would alter just a little.

Say, for instance, we have a statement "A Student lives in a Home." STUDENT is obviously a strong entity having a primary key Roll. But HOME might not have a unique primary key, as its only attribute Address may be shared by a lot of homes (what if it is a housing estate?). HOME is a weak entity in this case.

 


Related Discussions:- Determine the strong and weak entity

Cartisian product, Explain the cartesian product in Database Management Sys...

Explain the cartesian product in Database Management System

Triggers and Stored Procedures, 10A.53 Code an Oracle Database trigger to e...

10A.53 Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department. 10A.54 Code an Oracle Database trigger to allow the delet

Create a database schema, Consider a database schema consisting of four rel...

Consider a database schema consisting of four relations, whose schemas are: Product (maker, model, type) PC (model, speed, ram, hd, price) Laptop (model, speed, ram, hd, s

Estimate the transaction states, Suppose an instruction takes 1 nanosecond ...

Suppose an instruction takes 1 nanosecond to execute (on average), a page fault takes 20 microseconds of processor time, and it takes 300 microseconds of disk time to read or write

Functional dependency, Functional Dependency Consider a relation R that...

Functional Dependency Consider a relation R that has 2 attributes A and B. The attribute B of the relation is functionally dependent on the attribute A if and only if for every

Data integrity, You are required to implement integrity constraints within ...

You are required to implement integrity constraints within the database to enforce the following requirements:  For Projects: Start date must be supplied. Start date cannot be i

Define lock, Define lock? Lock is the most common used to execute the r...

Define lock? Lock is the most common used to execute the requirement is to permit a transaction to access a data item only if it is currently holding a lock on that item.

Example of ancestry database , Ancestry database records information about ...

Ancestry database records information about family trees . Following information is recorded about each person: FIRSTNAME first name SURNAME surname MNAME maiden name (if

C PROBLEMS, how to solve the C type problems?

how to solve the C type problems?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd