List two restrictions that are applied on the modification, Database Management System

Assignment Help:

List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view. 

Ans: The two restrictions are:

1. If a view does not consist of primary key and/or at least one of the attributes along with the NOT NULL constraint which do not have default values specified, is not updatable. This restriction is needed because if we are inserting any row in the view than all attributes not included in view of the base relation are will be denoted by the NULLs if any default value is not specified. In this type of case, if any attribute is set as NOT NULL or primary key, then it should not be NULL, and the insertion will be violating the constraints.

2. If a view defined by using grouping and/or aggregate functions, is not updatable. This restriction is also needed because, if we want to modify the base relation by view then we are not in the position to identify that tuple(s) will be modified in the group in what way.


Related Discussions:- List two restrictions that are applied on the modification

Data base design for a museum information system, In this practical assignm...

In this practical assignment, we will run through a complete database application development cycle, starting with the schema design, from an initial data import to database applic

Create database for car application, The Database MySQL scripts cars_f...

The Database MySQL scripts cars_for_sale.sql and car_details.sql containing the data to use for this task have been supplied. To complete this task, you need to first create

Explain the timestamp ordering protocol, Timestamp Ordering Protocol A ...

Timestamp Ordering Protocol A timestamp is a tag that can be attached to any transaction or any data item, which indicates a specific time on which the transaction or data item

What is the error handling, What is the error handling Traditionally, b...

What is the error handling Traditionally, bits have been sent over line lacking any error correcting scheme in physical layer. The presence of the CPU in each modem makes it po

Differentiate sub-class and super-class, Differentiate sub-class and super-...

Differentiate sub-class and super-class? The specialization of a class is known as subclasses.eg: employee is a subclass of person and teller is a subclass of employee. Convers

What is document scanning and imaging, What is document scanning and imagin...

What is document scanning and imaging? Document scanning and imaging, or digital archiving, is the method of scanning a document into a digital image to archive and retrieve a

Describe in brief about object oriented design, Describe about Object orien...

Describe about Object oriented design Object oriented design is concerned with developing an object oriented model of a software system to implement known requirements. Many OO

Define hash files organization, Define Hash files organization a. Hashi...

Define Hash files organization a. Hashing includes computing the address of a data item by calculating a function on the search key value.   b. A hash function h is a functi

Goals, what are the purposes of dbms in details

what are the purposes of dbms in details

What is a hash index, What is a hash index? A hash index organizes the ...

What is a hash index? A hash index organizes the search keys, with their associated pointers, into a hash file structure.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd