Reflect upon the desirable characteristics of a primary key

Assignment Help Database Management System
Reference no: EM131094344

Database Applications Discussion

Reflect upon the desirable characteristics of a primary key (below) that were presented in this week's lecture. (150-300 words) Choose one characteristic and discuss why you believe it would be undesirable if this were not a characteristic of a primary key. Please do not repeat (or re-word) the thoughts of another student. Respond to both discusion posts shown below the lecure. (50-100 words each)

Lecure on primary keys

The primary key of a table is how we identify data in the table, so it is especially important to choose a proper primary key. There are several characteristics that are considered desirable in a primary key.

First, a primary key should be unique. It can never have a duplicate. This should be obvious since we are using the keys for identification of specific information. This is also one reason why we typically don't consider names good choices for primary keys, since two or more people can have the same name.

Next, a primary key should be stable, meaning it should never change. This is another reason why names are not considered good primary keys. Names do change: marriage, divorce, and adoption are three circumstances that readily spring to mind that might cause a name change.

Additionally a primary key should be minimal. It should use the fewest number of attributes possible. Also, it should be accessible, meaning it's available as soon as the data is created.

Furthermore, a primary key should be "factless." It should contain no information that has meaning. Meeting this characteristic helps ensure the key is security-compliant, because if the key is factless it will not contain any personally identifiable information such Social Security Numbers.

When taken together, these characteristics point to the desirability of a numeric key for the primary key. Because of this we often use a surrogate key for the primary key. We can generate a numeric surrogate key with each record, which results in the primary key meeting all the desirability characteristics. While there are occasional instances where a surrogate key is not the best choice, for the purposes of this class it will be a good idea to get into the habit of using a surrogate key for the primary key.

John's Discusion Post

When it comes to a primary key the main thing that was mentioned was that if the information could be changed not to use it as a primary key. It also mentioned that a good primary key should be numerical like an employee identification number since that is a self generated number that isn't utilizing personal information like the last 4 digits of a social security number. I think the one characteristic that is important is keeping the number stable. Ensuring that the one thing that will tie in all the information for that particular person or item will never change and will access all data from all fields in different databases as well.

Tony's Discusion Post

Within the book a primary key is a column value used to identify each row therefore the values in this column must be unique. So if I understand this right the primary key is set up to help identify the information that you put into that column. when putting in that information you want that primary key to be unique to you so you can protect your information. so creating a unquie primary key can help you protect your information. If this is correct let me know that I am on the right track with this primary key stuff.

Reference no: EM131094344

Questions Cloud

How many credits toward social security : • As part of your planning, how can you estimate what you can expect from Social Security as a contribution to your retirement income? Find this answer by going to http://www.ssa.gov/retire2. Using the menus at this site, find out your retirement ..
Explain who is liable for injuries suffered by pedestrian : Develop an understanding of the legal implications of a principal-agent business relationship. Apply this understanding to a hypothetical business situation where the agent enters into a contract and causes an injury to a third party.
How concerned are you about your individual privacy : How concerned are you about your individual privacy and your online activities? How are your personal data protected by companies that collect customer data? As an individual, what steps do you take to maintain your individual privacy?
What are valid defenses against a breach of contract claim : Review the defenses to breach of contract below and write about an instance where you employed or considered using one of these methods and explain what happened.
Reflect upon the desirable characteristics of a primary key : Reflect upon the desirable characteristics of a primary key (below) that were presented in this week's lecture. (150-300 words) Choose one characteristic and discuss why you believe it would be undesirable if this were not a characteristic of a pr..
Boris pasternak awarded the nobel prize : In 1958, Russian poet and novelist Boris Pasternak was awarded the Nobel Prize for literature, but negative Soviet reaction forced him to refuse the honor. For which novel was Boris Pasternak awarded the Nobel Prize?
Compute the break-even point in units : 1. Airy Window Units sells air conditioners for $125 per unit, and the variable cost to produce them is $87. The owner estimates that the fixed costs are $4,186,000.
Would bee liability insurance pay in this situation : Ms. Bumble Bee operates a florist shop. During a particularly busy day, she allowed one of her employees, Barry, to use her (Bee's) personal car to assist with deliveries. Barry had just obtained his driver's license. Barry was involved in an ..
Enhanced bio availability of buspirone : Enhanced Bioavailability of Buspirone  From Reservoir-Based Transdermal Therapeutic System, Optimization of Formulation Employing Box–Behnken Statistical  Design

Reviews

Write a Review

 

Database Management System Questions & Answers

  Create a database design

Create a database design (schema) based on the following problem description.

  Create the preliminary database tables

Use a Microsoft Access database to create the preliminary database tables, columns with data types, primary keys, and relationships

  Write sql statements to calculate average salary

Write SQL statements that do the following: Calculate the average salary for all employees. Calculate the maximum salaries for exempt and non-exempt employees.

  Identify super key of r based on functional dependencies

Identify the Functional Dependencies in R. Be sure to maximize the number of attributes on the right hand side (RHS) and minimize the number of attributes on the left hand side (LHS) of each FD. You should exclude any trivial FDs in your answer.

  Baxter aviation database

ER diagram for the Baxter Aviation database

  Implement a program to query and update the text database

Implement a program to query and update the text database for a library using a client/server model allowing multiple clients safe access to the database, and using a producer-consumer model to control the inventory of each item.

  Decompose the table into a set of 3nf tables.

Draw a dependence diagram. There are examples in the reading assignments of dependence diagrams.

  Creating erd containing order and customer entity

Create ERD containing Order and Customer entity types connected by 1-M relationship from Customer to Order. Select suiatble relationship name using your common knowledge of intersection.

  Expressions in tuple relational calculus and domain relation

Consider the relational database described in Problem Give expressions in tuple relational calculus and domain relational calculus for each of the following queries: Find all the companies that have offices in all the cities in which company C2..

  Explain what information is available in relational database

Explain what information is available from relational database containing one relation with attributes Name, Employee identification number, and Address which is not available.

  Computer crime has become a serious matter for your

computer crime has become a serious matter for your discussion board post consider the followingdo you think computer

  When you add a calculated field to a query it creates a new

When you add a calculated field to a query it creates a new

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd