Relational database integrity, Database Management System

Assignment Help:

A database is a set of data. But, is the data kept in a database trustworthy? To answer that query we must first answer the question. What is integrity?

Integrity simply means to keep the consistency of data. Therefore, integrity constraints in a database make sure that changes made to the database by authorised users do not compromise data consistency. Therefore, integrity constraints do not permit damage to the database.

There are primarily two integrity constraints: the referential integrity constraint and the entity integrity constraint. In order to describe these two, let us first describe the term Key with respect to a Database Management System.


Related Discussions:- Relational database integrity

Explain five duties of database administrator, Explain five duties of Datab...

Explain five duties of Database Administrator? 1. DBA administers the three stages of the database and, in consultation along with the whole user community, sets up an defin

Use the relational algebra to formulate query, Consider the following datab...

Consider the following database schema: STAFF(StaffNo, fName, lName, Position, sex, dob, branchNo) BRANCH(BranchNo, Street, City) Assume the following for the above database

Weak entity, An example of a weak entity is Staff because the availabilityI...

An example of a weak entity is Staff because the availabilityID cannot be uniquely identified unless it is used in conjunction with the foreign key known as availabilityID in the A

Economics, Economics: It is now usually accepted that it costs less to make...

Economics: It is now usually accepted that it costs less to make a system of smaller computers with the equivalent power of a one large computer. It is more cost-effective to get s

Describe participation constraints, Describe Participation Constraints? ...

Describe Participation Constraints? Participation Constraints - The participation constraint exacts whether the existence of an entity depends on its being related to another

Describe the grant function and explain security, Describe the GRANT functi...

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Which steps must designer take to adjust inheritance, In object oriented de...

In object oriented design, which steps must designer take to adjust inheritance? To readjust inheritance following steps should be taken: i)  Rearrange and adjust the classe

Urgent need tutoring in conjunction with help on assignment!, Hi is anyone ...

Hi is anyone well versed in accounting information systems available now to help me work through an important assignment due tomorrow at noon?

Illustrate the diagram - association as a cache, Association as a cache ...

Association as a cache This association must be updated when any new element is added to it, but testing for overlap using association is more efficient.    Figure:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd