Discuss the types of integrity constraints with example, Database Management System

Assignment Help:

Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples.

Insert operation can violet any of the subsequent four constraints:

1) Domain constraints could be violated if given attribute value does not appear within corresponding domain.
2) Key constraints could be violated if given attribute value does not appear within corresponding domain.
3) Entity integrity can be violated if the primary key of the latest tuple t is NULL.
4) Referential integrity can be violated if value of any foreign key in t refers to a tuple in which does not exist in referenced relation.

Delete operation can violate only referential integrity constraints, if the tuple being deleted is referenced through the foreign keys from other tuples within the database.


Related Discussions:- Discuss the types of integrity constraints with example

Query to delete constraint from alter table, A constraint named less_than_2...

A constraint named less_than_20 was defined on the field date_of_birth of table student. Delete this constraint. ALTER TABLE student DROP CONSTRAINT less_than_20;

Managing databases, 10A.53 Code an Oracle Database trigger to enforce the...

10A.53 Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department. 10A.54 Code an Oracle Database trigger to allow the

Designing the hierarchy of a ldb?, What sorts of tables one can se in desig...

What sorts of tables one can se in designing the hierarchy of a LDB? Tables, which are having Foreign Key relations.

List the reg-no of vehicles owned in relational algebra, Given the followin...

Given the following relations Vehicle (Reg_no, make, colour) Person(eno, name, address) Owner(eno, reg_no) Write expressions in the relational algebra to answer the following

Explain the uses of deadlock, Explain the uses of deadlock It will lea...

Explain the uses of deadlock It will lead to deadlock since this is the only place where incoming acknowledgements are processed. Without this code, sender will keep timing ou

Describe the static hash file with buckets and chaining, Describe the stati...

Describe the static hash file with buckets and chaining and show how insertion, deletion and modification of a record can be performed. In static hash file organization, the wo

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Hass, waht is a repeating group?

waht is a repeating group?

Explain the term- signal-to-noise ratio, Explain the term- signal-to-noise ...

Explain the term- signal-to-noise ratio A signal-to-noise ratio of 20 dB means that S/N = 100. As log2101 is around 6.658, the Shannon limit is around 19.975 kbps. The Nyquist

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd