Entity identifier key attributes, Database Management System

Assignment Help:

An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.

Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.

  • EXAMPLE: The Student entity has a key attribute RollNo which uniquely recognized it, hence is a strong entity.

Attributes

Let us first answer the question:

What is an attribute?

An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.

For example, a student entity may be defined by the student's name, address, age, course, etc.

An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:

RollNo: 1234

Name: Supriya

Age: 18

Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)


Related Discussions:- Entity identifier key attributes

What is a database, What is a database? Database - Basically in simpl...

What is a database? Database - Basically in simple terms A database is a collection of inter related data and/or information stored so which it is available to several users

Data dictionary, The database is to record information about artists for a ...

The database is to record information about artists for a (music) production company. An artist is the name of a singer or band; the name of the artist, the year the artist started

What is dml compiler, What is DML compiler? DML Compiler: Translates DM...

What is DML compiler? DML Compiler: Translates DML statements in a query language within low level instructions understandable through the query evaluation engine. Attempts to

What are the two methods for dealing deadlock problem, What are the two met...

What are the two methods for dealing deadlock problem? The two procedures for dealing deadlock problem is deadlock detection and deadlock recovery.

Example-revoke all on emp from mca12, Example:  //REVOKE ALL ON EMP FROM MC...

Example:  //REVOKE ALL ON EMP FROM MCA12;                              (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-

Describe queries with complex types, Describe queries with complex types? ...

Describe queries with complex types? The present extension of the SQL query language deal with the complex type Let us start with the simple example: Find the title and t

Objectives-distributed and client server databases, Objectives diff...

Objectives differentiate DDBMS and conventional DBMS; Describe Network topology for DDBMS; Describe the concepts of horizontal and vertical fragmentation; Descr

What is predictive modelling, Question : (a) Data mining is one of the...

Question : (a) Data mining is one of the best ways to analyse data and using software method, hidden and unexpected patterns and relationships in sets of data can be extracte

Develop and evaluate partial systems, Part 1: Security Plan Consider th...

Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd