Key constraint - relational constraints, Database Management System

Assignment Help:

This constraint shows that the key attribute value in each tuple must be unique, i.e., no two tuples have the similar value for the key attribute. This is because the value of the primary key is used to recognize the tuples in the relation.

 

Example: If A is the key attribute in the following relation R than A1, A2 and A3 must be unique.

 

A

 

B

 

A1

 

B1

 

A3

 

B2

 

A2

 

B2

 

Example: In relation PERSON, PERSON_ID is primary key so PERSON_ID cannot be given as the similar for two persons.

Integrity Constraint

There are two kinds of integrity constraints:

  • Entity Integrity Constraint
  • Referential Integrity Constraint

Related Discussions:- Key constraint - relational constraints

What is a heterogeneous distributed database, What is a heterogeneous distr...

What is a heterogeneous distributed database? In a heterogeneous distributed database, dissimilar sites may use different schemas, and dissimilar dbms s/w. The sites may not be

ER diegrams, How to draw an ER diagram to a finance companz

How to draw an ER diagram to a finance companz

What is persistency, What is persistency? Persistency ensures which dat...

What is persistency? Persistency ensures which data is stored and that after the object is no longer available (program stops running) the data will be available to other users

Cluster analysis project, (a) Data Mining Process : In the context of t...

(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P

Hierarchical model is also known by, Hierarchical model is also known by? ...

Hierarchical model is also known by? A hierarchical model is also known as a Tree structure.

Relational database implementation, You must implement the entity relations...

You must implement the entity relationship model provided in the model solution to Assignment 1. The model solution will be released on the course website approximately TWO (2) we

The maximum no of key fields that can be used in a header, The Maximum no o...

The Maximum no of key fields that can be used in a header is?? 50

What is a shadow copy scheme, What is a shadow copy scheme? It is simpl...

What is a shadow copy scheme? It is simple, but efficient, scheme known as the shadow copy schemes. It is based on making copies of the database called shadow copies that singl

Describe the most important classes of parallel machines, Question 1 Discu...

Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd