Referential integrity constraint - relational constraints, Database Management System

Assignment Help:

It defines that the tuple in one relation that refers to another relation must refer to an existing tuple in that relation. This constraint is states on two relations (not essentially distinct). It uses a concept of foreign key and has been dealt with in more factors in the next unit.

Example

 

1599_referential integrity constraint.png

In the example given above, the value of C^ in every R tuple is matching with the value of C# in some S tuple. If a tuple has values (A6, B2, and C4) is added then it is invalid as referenced relation S doesn't contain C4. Therefore, it will be a violation of referential integrity constraint.


Related Discussions:- Referential integrity constraint - relational constraints

State about the tables- DBMS, State about the Tables- DBMS Data is sto...

State about the Tables- DBMS Data is stored in columns and rows (much like a spreadsheet -main difference is how data is organised). Every row in a table is known as a record

What is the difference between link and reference, What is the difference b...

What is the difference between link and reference? The fundamental difference between links and references is that links are symmetrical on the other hand references refer only

What is called a query -execution engine, What is called a query -execution...

What is called a query -execution engine? The query implementation engine takes a query evaluation plan, implements that plan, and returns the answers to the query.

What are the various states of transaction process, What are the various st...

What are the various states through which a transaction passes through in its lifetime?  Briefly discuss all the events that causes transition from one state to another.   Ans:

How does query tree represent relational algebra expression, How does a que...

How does a query tree represent a relational algebra expression?  Discuss any three rules for query optimisation, giving example as to when should each rule be applied.     Ans

Sources of utilities for a dbms, There are three main sources of utilities ...

There are three main sources of utilities and applications for a DBMS: a. Vendor applications and utilities are given for working with or maintaining the database, and generally

What are audit trails, What are audit trails? An audit trail is a log o...

What are audit trails? An audit trail is a log of all alters to the database along with information like which user performed the change and when the alter was performed.

What is a candidate key, What is a candidate key? Minimal super keys ar...

What is a candidate key? Minimal super keys are known as candidate keys.

When it is better to use files than a dbms, When It is better to use files ...

When It is better to use files than a DBMS? It is better to use files than a DBMS when Multiple users wish to access the data.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd