Entity identifier key attributes, Database Management System

Assignment Help:

An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.

Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.

  • EXAMPLE: The Student entity has a key attribute RollNo which uniquely recognized it, hence is a strong entity.

Attributes

Let us first answer the question:

What is an attribute?

An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.

For example, a student entity may be defined by the student's name, address, age, course, etc.

An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:

RollNo: 1234

Name: Supriya

Age: 18

Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)


Related Discussions:- Entity identifier key attributes

Explain an attributes, What are attributes? Give examples. An entity is...

What are attributes? Give examples. An entity is shown by a set of attributes. Attributes are descriptive properties possessed by every member of an entity set. Example: pos

Databases and data warehouses , Databases and data warehouses both are data...

Databases and data warehouses both are databases and both contains number of rows and columns of tables containing data. Data warehouse is really different from databases because d

Mapping, external and internal mapping with examples

external and internal mapping with examples

Explain the management of data store, Explain the Management of Data Store ...

Explain the Management of Data Store Every system irrespective of its nature of application requires storing permanent data for consequent use in problem solving. Some objects

Relationship between security and integrity, Relationship between Security ...

Relationship between Security and Integrity: Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually

Define the division operation of relational algebra, Define the Division Op...

Define the Division Operation of Relational Algebra Let R be a relation comprising attributes (A1,...Ap,Ap+1,...An) and S comprising attributes (Ap+1,...An)  DEF: Division

Approach to implement traffic data management, There are many simple and co...

There are many simple and complex approaches to implement. These reports are based on some views or certain query. The following number of reports can be built. 1. The averag

Functional dependencies, 1. Staff (staffID --> availabilityID) 2. Servic...

1. Staff (staffID --> availabilityID) 2. Services (servicesID --> itemBasedID --> timedBasedID) 3. TimedBased (timedbasedID--> priceid) 4. Clients (clientId, serviceId-->

What is the use of sub queries, What is the use of sub queries? A sub q...

What is the use of sub queries? A sub query is a select-from-where expression that is nested with in another query. A common use of sub queries is to do tests for set membershi

Explain how you can define an object model of a system, Explain how you can...

Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system.   Different use

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd