Entity identifier key attributes, Database Management System

Assignment Help:

An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.

Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.

  • EXAMPLE: The Student entity has a key attribute RollNo which uniquely recognized it, hence is a strong entity.

Attributes

Let us first answer the question:

What is an attribute?

An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.

For example, a student entity may be defined by the student's name, address, age, course, etc.

An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:

RollNo: 1234

Name: Supriya

Age: 18

Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)


Related Discussions:- Entity identifier key attributes

User error-database errors, User error :  This contains errors in the progr...

User error :  This contains errors in the program (e.g., Logical errors) with errors made by online users of database.  These types of errors can be avoided by applying some check

There are two major types of fragmentation, There are two major types of fr...

There are two major types of fragmentation: Horizontal& Vertical. Horizontal fragments, as the name suggests are subsets of tuples and vertical fragments are subsets of attributes

Failure controlling methods, Failure Controlling Methods: Failures can be h...

Failure Controlling Methods: Failures can be handled using different recovery methods that are talk about later in the unit. But the first question is doing we really require recov

Field, examples of fields in a database

examples of fields in a database

Deadlock prevention, Deadlock Prevention One of the easiest approaches ...

Deadlock Prevention One of the easiest approaches for avoiding a deadlock would be to obtain all the locks at the begin of the transaction. Though, this approach restricts conc

What type of view of total database content, What type of view of total dat...

What type of view of total database content? Data base content Conceptual view of total database contain.

What is object oriented model, What is Object Oriented model? This mod...

What is Object Oriented model? This model is based on collection of objects. An object has values stored in instance variables with in the object. An object also having bodies

What is icr, What is ICR? A. ICR (Intelligent Character Recognition) is...

What is ICR? A. ICR (Intelligent Character Recognition) is a technology that gives scanning and imaging systems the ability to identify images of hand-printed or script charact

Define hash files organization, Define Hash files organization a. Hashi...

Define Hash files organization a. Hashing includes computing the address of a data item by calculating a function on the search key value.   b. A hash function h is a functi

Complete replication-data replication, Complete replication: It implies ma...

Complete replication: It implies maintaining of a whole copy of the database at every site. Thus, the reliability & availability and performance for query response are maximized.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd