Key constraint - relational constraints, Database Management System

Assignment Help:

This constraint shows that the key attribute value in each tuple must be unique, i.e., no two tuples have the similar value for the key attribute. This is because the value of the primary key is used to recognize the tuples in the relation.

 

Example: If A is the key attribute in the following relation R than A1, A2 and A3 must be unique.

 

A

 

B

 

A1

 

B1

 

A3

 

B2

 

A2

 

B2

 

Example: In relation PERSON, PERSON_ID is primary key so PERSON_ID cannot be given as the similar for two persons.

Integrity Constraint

There are two kinds of integrity constraints:

  • Entity Integrity Constraint
  • Referential Integrity Constraint

Related Discussions:- Key constraint - relational constraints

Create a database, Project: Microsoft Access You have been asked by the ...

Project: Microsoft Access You have been asked by the ABC Tanning Salon to create a database that can be used to track the salon's customers.  You are to create a table in Access

Define cardinality and participation constraints, Define cardinality and pa...

Define cardinality and participation constraints on a relationship type, completeness constraint on generalization.        Ans: Cardinality defines the number of entities to wh

Differance between internal and external schema, Differance between interna...

Differance between internal and external schema? Internal and external schema: Internal Schema • Describes the physical storage structure • Uses a physical data model External

Views, what is view?explain

what is view?explain

What are the disadvantages of file processing system, What are the disadvan...

What are the disadvantages of file processing system? The drawbacks of file processing systems are a) Data redundancy and inconsistency b) Complexity in accessing data

Sequences-data control, Sequences Sequences: Automatically produ...

Sequences Sequences: Automatically produce unique numbers Are sharable Are typically used to make a primary key value Replace application code Speed up t

Field, examples of fields in a database

examples of fields in a database

What is a shadow copy scheme, What is a shadow copy scheme? It is simpl...

What is a shadow copy scheme? It is simple, but efficient, scheme known as the shadow copy schemes. It is based on making copies of the database called shadow copies that singl

Control as a state machine engine, Control as a State Machine Engine F...

Control as a State Machine Engine First let us define the state machine: "the state machine is a machine which is an object but not an application object. It is a part of lang

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd