Deletion operation - update operations, Database Management System

By using the delete operation some consisting records can be deleted from a relation. To delete some definite records from the database a condition is also specified based on which records can be taken for deletion.

Constraints that can be violated during deletion

Only one type of constraint can be violated during deletion, it is referential integrity constraint. It can happen when you want to delete a record in the table where it is referenced by the foreign key of another table.  Please read the example given below very carefully.

Posted Date: 3/6/2013 5:38:26 AM | Location : United States

Related Discussions:- Deletion operation - update operations, Assignment Help, Ask Question on Deletion operation - update operations, Get Answer, Expert's Help, Deletion operation - update operations Discussions

Write discussion on Deletion operation - update operations
Your posts are moderated
Related Questions
Explain the difference between the three storage types - volatile, non volatile and stable.             Ans: Volatile storage: if storage media loses data while power goes off,

what is file organization? what are file organization techniques.explain in detail? explain random file organization technique, multikey file organization technique?what is indexin

Association as a cache This association must be updated when any new element is added to it, but testing for overlap using association is more efficient.    Figure:

How to create a table from existing table? Create table as e.g, To create a new table ‘N_emp' with employee names and their identification numbers only from employee ta

What are the three data anomalies that are similarly to take place as a result of data redundancy?  Can data redundancy be completely eliminated in database approach?  Why or why n

Using Column aliases Example: To print column names as NAME and ANNUAL SALARY SELECT ENAME "NAME", SAL*12 "ANNUAL SALARY" FROM EMP;

What are the benefits of document scanning? Document scanning, in addition to being cost-efficient, also enhances productivity. This service enhances security as you set the pa

1. Will you advise that your organization uses open source software and why? 2. Why is it important for business managers to have a basic understanding of the software development

What is known as clustering file organization? In the clustering file organization, records of several dissimilar relations are stored in the similar file.