Entity integrity, Database Management System

Assignment Help:

Before defines the second type of integrity constraint, viz., Entity Integrity, we should be well-known with the concept of NULL.

Mostly, NULL is intended as a basis for dealing with the trouble of missing information. This type of situation is frequently encountered in the actual world. For instance, historical records sometimes have entries such as "Date of birth unknown", or police records may contain the entry "Present whereabouts unknown." Therefore it is necessary to have some way of dealing with such concepts in database systems.

Therefore Codd proposed an approach to this issue that creates use of special markers known as NULL to show such missing information.

A given attribute in the relation may or may not be allowed to include NULL. However, can the Primary key or any of its components (in case of the primary key is a composite key) contain a NULL? To answer this Query an Entity Integrity Rule states: No component of the primary key of a relation is permitted to accept NULL. In different words, the definition of each attribute involved in the primary key of any basic relation have to explicitly or implicitly contain the specifications of NULL NOT ALLOWED.


Related Discussions:- Entity integrity

Using column aliases-data manipulation language, Using Column aliases E...

Using Column aliases Example: To print column names as NAME and ANNUAL SALARY SELECT ENAME "NAME", SAL*12 "ANNUAL SALARY" FROM EMP;

What is the main goal of raid technology, What is the main goal of RAID tec...

What is the main goal of RAID technology? Describe the levels 1 through 5. RAID stands for Redundant Array of Inexpensive (or sometimes "Independent")Disks. RAID is a met

Provide examples of different types of time and date formats, Provide Examp...

Provide Examples of different types of Time and Date formats.  It's most common store dates using a dash (-) as a colon (:)and the delimiter as the time delimiter. The given fo

Idea for fyp, want a idea for final year project

want a idea for final year project

Describe the grant function and explain security, Describe the GRANT functi...

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce

Attributes, Attributes and its types explain?

Attributes and its types explain?

Define canonical cover, Define canonical cover? A canonical cover Fc fo...

Define canonical cover? A canonical cover Fc for F is a set of dependencies like F logically implies all dependencies in FC and Fc logically shows all dependencies in F.

Nested query, what is correlation in nested query

what is correlation in nested query

Which data manipulation command combines the records, Which data manipulati...

Which data manipulation command combines the records from one or more tables ? JOIN data manipulation command combines the records from one or more tables.

Briefly describe concurrency execution, Briefly describe concurrency execut...

Briefly describe concurrency execution? Lock - based protocols Locks There are several modes in which a data item may be locked in this section we restrict our attention

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd