Discuss the types of integrity constraints with example, Database Management System

Assignment Help:

Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples.

Insert operation can violet any of the subsequent four constraints:

1) Domain constraints could be violated if given attribute value does not appear within corresponding domain.
2) Key constraints could be violated if given attribute value does not appear within corresponding domain.
3) Entity integrity can be violated if the primary key of the latest tuple t is NULL.
4) Referential integrity can be violated if value of any foreign key in t refers to a tuple in which does not exist in referenced relation.

Delete operation can violate only referential integrity constraints, if the tuple being deleted is referenced through the foreign keys from other tuples within the database.


Related Discussions:- Discuss the types of integrity constraints with example

Log, what is the need of a log in dbms

what is the need of a log in dbms

Using column aliases-data manipulation language, Using Column aliases E...

Using Column aliases Example: To print column names as NAME and ANNUAL SALARY SELECT ENAME "NAME", SAL*12 "ANNUAL SALARY" FROM EMP;

Design a database table, A database named yourusernameFMA has been set up f...

A database named yourusernameFMA has been set up for you to use for this assignment.  For the FMA you must create the required tables and run the queries using this database.  If y

Explain the isa relationship, Explain the ISA relationship Answer: IS...

Explain the ISA relationship Answer: ISA relationship - ISA notation is employed in generalization/ specialization to depict relationship among lower and higer level entity s

Express the properties of strings, Express the properties of Strings? ...

Express the properties of Strings? Strings can be case sensitive (or not) which can change the outcome of string operations. You can evaluate whole strings \ just part

Transaction states, The following variant of the primary copy asynchronous-...

The following variant of the primary copy asynchronous-update replication protocol has been proposed for totally replicated systems. (a)  A transaction executing at site A updat

Update anomaly-data redundancy, Update Anomaly : This anomaly is occurred d...

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014

Explain the term- inheritance, What is inheritance? Inheritance is an ...

What is inheritance? Inheritance is an object orientation concept that allows reusability of code / design. Basic sense of inheritance is that if one class is predefined than a

Describe substring comparison in sql, Describe substring comparison in SQL....

Describe substring comparison in SQL. For the relation Person (name, address), write a SQL query that retrieves the names of people whose name starts along with ‘A' and address co

Include the create database command, Submit the SQL Statements necessary to...

Submit the SQL Statements necessary to create your database according to the following guidelines: Your SQL statements should exactly mirror your ERD. All primary keys,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd