Key constraint - relational constraints, Database Management System

Assignment Help:

This constraint shows that the key attribute value in each tuple must be unique, i.e., no two tuples have the similar value for the key attribute. This is because the value of the primary key is used to recognize the tuples in the relation.

 

Example: If A is the key attribute in the following relation R than A1, A2 and A3 must be unique.

 

A

 

B

 

A1

 

B1

 

A3

 

B2

 

A2

 

B2

 

Example: In relation PERSON, PERSON_ID is primary key so PERSON_ID cannot be given as the similar for two persons.

Integrity Constraint

There are two kinds of integrity constraints:

  • Entity Integrity Constraint
  • Referential Integrity Constraint

Related Discussions:- Key constraint - relational constraints

Define the traditional system analysis and design, Define the Traditional S...

Define the Traditional System Analysis and Design Traditional System Analysis and Design (SAD) have three basic life cycle models. A typical software lifecycle consists of the

What is a recovery scheme, What is a recovery scheme? An integral part ...

What is a recovery scheme? An integral part of a database system is a recovery scheme that can restore the database to the reliable state that existed before the failure.

Anomalies, define anomalies and different types of anomalies with example

define anomalies and different types of anomalies with example

Writing a pl/sql program, Problem 1. Create a PL/SQL program to insert ...

Problem 1. Create a PL/SQL program to insert data into student table and display the details of the student having Reg.No 1010 Writing a PL/SQL program to Insert data

Explain the cartesian product, Explain the Cartesian product:  The Cart...

Explain the Cartesian product:  The Cartesian product operation does not need relations to union-compatible.  The meaning of this is that the involved relations may have dissim

Describe deductive databases and relational databases, Problem : (b) A ...

Problem : (b) A deductive database system is essentially the outcome of applying mathematics logic to database management, where logic is used for both data representation and

What is deadlock, What is deadlock? Neither of the transaction can ever...

What is deadlock? Neither of the transaction can ever proceed with its normal implementation. This situation is known as deadlock.

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd