Entity identifier key attributes, Database Management System

Assignment Help:

An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.

Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.

  • EXAMPLE: The Student entity has a key attribute RollNo which uniquely recognized it, hence is a strong entity.

Attributes

Let us first answer the question:

What is an attribute?

An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.

For example, a student entity may be defined by the student's name, address, age, course, etc.

An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:

RollNo: 1234

Name: Supriya

Age: 18

Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)


Related Discussions:- Entity identifier key attributes

Entity integrity, Before defines the second type of integrity constraint, v...

Before defines the second type of integrity constraint, viz., Entity Integrity, we should be well-known with the concept of NULL. Mostly, NULL is intended as a basis for dealing

What is hash file organization, What is hash file organization? What are t...

What is hash file organization? What are the causes of bucket overflow within a hash file organization? What can be completed to decrease the occurrence of bucket overflow?

Find the employee name, Example -Find the employee name, salary, department...

Example -Find the employee name, salary, department number and average salary of his/her department, for those employees whose salary is more than the average salary of that depart

Define about the stored procedure, Define about the Stored Procedure - ...

Define about the Stored Procedure - It's a set of T-SQL statements combined together to perform a single task formed by combining numerous small tasks. - When you essentiall

Computing the closure of a set of functional dependency, What is meant by c...

What is meant by computing the closure of a set of functional dependency? The closure of F denoted by F + is the set of functional dependencies logically implied by F.

What are the several forms of identity, What are the several forms of ident...

What are the several forms of identity? a) Value b) Name c) Built-in

Normalise data to third normal form, A software contract and consultancy fi...

A software contract and consultancy firm maintains details of all the various projects in which its employees are currently involved. These details comprise: Employee Numbe

Benefits abd drawback of hashed file organisation, Benefits of Hashed file ...

Benefits of Hashed file Organisation 1.      Insertion or search on hash-key is quick. 2.      Best if equality search is required on hash-key. Drawbacks of Hashed file

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd