Discuss the types of integrity constraints with example, Database Management System

Assignment Help:

Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples.

Insert operation can violet any of the subsequent four constraints:

1) Domain constraints could be violated if given attribute value does not appear within corresponding domain.
2) Key constraints could be violated if given attribute value does not appear within corresponding domain.
3) Entity integrity can be violated if the primary key of the latest tuple t is NULL.
4) Referential integrity can be violated if value of any foreign key in t refers to a tuple in which does not exist in referenced relation.

Delete operation can violate only referential integrity constraints, if the tuple being deleted is referenced through the foreign keys from other tuples within the database.


Related Discussions:- Discuss the types of integrity constraints with example

Which steps must designer take to adjust inheritance, In object oriented de...

In object oriented design, which steps must designer take to adjust inheritance? To readjust inheritance following steps should be taken: i)  Rearrange and adjust the classe

What is dml query langauge, What is DML Query Langauge? Data Manipulati...

What is DML Query Langauge? Data Manipulation Language (DML) - A data manipulation language is a language in which enables users to access or manipulate data as organized throu

Database models, why are older data models are being replaced by new data m...

why are older data models are being replaced by new data models

Data aggregation, Q.   Explain  data aggregatio n and discuss differen...

Q.   Explain  data aggregatio n and discuss different design constraints. Sol. Aggregation   One limitation of the E-R model is that it cannot express relationships amon

In which format database schema is written, In which format database schema...

In which format database schema is written ? Data base schema is written in the DDL format.

What are the different approaches for database design, What are the differe...

What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att

Hardware failure-database recovery and security, Hardware failure :  Hardwa...

Hardware failure :  Hardware failures are the failures when some disk or hardware chip fails. This may result in loss of data. One such trouble can be that a disk gets damaged and

Describe graphical user interface, Describe Graphical User Interface? ...

Describe Graphical User Interface? Graphical User Interfaces (GUIs) - A GUI typically displays a schema to the user in diagrammatic form. The user can then specify a query th

Strong entity set and weak entity set, Strong entity set and weak entity se...

Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd