Unit database integrity, Database Management System

Assignment Help:

Relations create the database. They must satisfy various properties, like no duplicate tuples, no ordering of tuples, and atomic attributes, etc. Relations that satisfy these basic needs may still have some undesirable characteristics such as data redundancy, and anomalies.

What are these undesirable characteristics and how can we eliminate them from the database system? This part is an attempt to answer this question. Though, please note that most of these undesirable properties do not arise if the database modelling has been carried out very carefully using some method like the Entity-Relationship Model. It is still important to use the methods in this unit to check the database that has been acquired and ensure that no mistakes have been made in modeling.

The central thought in these discussions is the concept of Database integrity, the notion of functional dependency, which rely on understanding the semantics of the data and which deals with what information in a relation is dependent on what other information in the relation. Our prime objective in this section is to describe the concept of data integrity, functional dependence and then describes normal forms using functional dependencies and using other types of data dependencies.

OBJECTIVES

After reading this section you should be able to

  • Explain the concept of entity integrity;
  • Define relational database referential integrity constraints;
  • Explain the concept of functional dependency, and
  • show how to use the dependencies information to decompose relations; whenever essential to obtain relations that have the desirable properties that we want without losing any of the information in the original relations.

 


Related Discussions:- Unit database integrity

Guidelines for creation of table, Guidelines for creation of table: ...

Guidelines for creation of table: Table name should begin with an alphabet. In table name, single quotes and blank spaces are not allowed. Reserve words of that DBM

Explain discretionary access control, Problem: (a) Given the following ...

Problem: (a) Given the following relation: Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints: (i) User

Explain interfaces for parametric users, Explain Interfaces for parametric ...

Explain Interfaces for parametric Users? Interfaces for Parametric Users - Parametric users, such as bank tellers, frequent have a little set of operations in which they must p

Describe the host language, Describe the host language? Host Language:...

Describe the host language? Host Language: You could write applications along with SQL statements embedded inside a host language. The SQL statements give the database inter

Differentiate between horizontal and mixed partitioning, Question: In r...

Question: In relation to distributed database answer the following questions: (i) Give a brief definition of distributed database. Support your answer with an appropriate di

Unrepeatable reads-problems of concurrent transactions, Unrepeatable reads ...

Unrepeatable reads : Assume T7 reads X twice during its implementation. If it did not update X itself it could be very disturbing to see a dissimilar value of X in its next read. B

Datawarehouse, 1) Define a job scheduling strategy that will meet business ...

1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict

What are the various states of transaction process, What are the various st...

What are the various states through which a transaction passes through in its lifetime?  Briefly discuss all the events that causes transition from one state to another.   Ans:

Database incident table, The Incident table, with an auto-incrementing in...

The Incident table, with an auto-incrementing incident number, etc, looks like: incident_num reporter date time incide

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd