Update operations in dbms - insert operation, Database Management System

Assignment Help:

Update Operations and Dealing with Constraint Violations

There are three basic operations to be executes on relations:

  • Insertion
  • Deletion
  • Update

The INSERT Operation:

The insert operation permits us to insert a new tuple in a relation. When we try to insert a new record, then any of the following four types of constraints can be violated:

 

  • Key constraint: If the value of the key attribute in new tuple t is the similar as in the existing tuple in relation R.
  • Domain constraint: If the value given to an attribute lies outside the domain of that attribute.
  • Referential Integrity constraint: If the value of the foreign key in t refers to a tuple that doesn't show in the referenced relation.

 • Entity Integrity constraint: If the primary key attribute value of new tuple t is given as null.


Related Discussions:- Update operations in dbms - insert operation

What are the various symbols used to draw an e-r diagram, What are the vari...

What are the various symbols used to draw an E-R diagram? Explain with the help of an example how weak entity sets are represented in an E-R diagram. Various symbols used to d

What are the different approaches for database design, What are the differe...

What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att

Database incident table, The Incident table, with an auto-incrementing in...

The Incident table, with an auto-incrementing incident number, etc, looks like: incident_num reporter date time incide

Describe the types of attributes, Describe the types of attributes? Ty...

Describe the types of attributes? Types of attributes: An attribute's category determines the type of values that are permitted in the attribute. For instance, the value vers

Hashed file organisation, Hashed File Organisation Hashing is the most ...

Hashed File Organisation Hashing is the most common form of purely random access to a database or file. It is also used to access columns that do not have an index as an optimi

Mappings between levels and data independence, Mappings between Levels and ...

Mappings between Levels and Data Independence The 3 levels of abstraction in the database do not exist separately of each other. There must be some correspondence, or mapping

HRM, is Chipo carrying his baby

is Chipo carrying his baby

What function divides one numeric expression, What function divides one num...

What function divides one numeric expression by another and returns the remainder? MOD function divides one numeric expression by another and returns the remainder.

Managing database, 10A.53 Code an Oracle Database trigger to enforce the ...

10A.53 Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department. 10A.54 Code an Oracle Database trigger to allow the

Information system fundamentals, A full discription of the new, a discripti...

A full discription of the new, a discription of its components, and the bebefit it will provide a company. A disscussion of the information usedin the system. A disscussion of any

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd