Describe entity referential integrity and integrity, Database Management System

Assignment Help:

Describe entity referential integrity and integrity. Give an example of each.

Entity Integrity Rule - If there is a attribute A of relation R is a prime attribute of R then A cannot accept null values.

Referential Integrity Rule - In referential integrity, it is ensured in which a value in which appears in one association for a given set of attributes also appears for a certain set of attributes in another relation.

For example:

286_Student details.png

Roll No is the primary key within the relation STUDENT and Roll No + Course is the primary key of the relation GRADE. (Entity Integrity)
Roll No in the relation GRADE (child table) is a foreign key, which is referenced from the relation STUDENT (parent table). (Referential Integrity).


Related Discussions:- Describe entity referential integrity and integrity

Explain the term- inheritance, What is inheritance? Inheritance is an ...

What is inheritance? Inheritance is an object orientation concept that allows reusability of code / design. Basic sense of inheritance is that if one class is predefined than a

Get details of employee working on both comp354 and comp345, Consider the r...

Consider the relations EMPLOYEE(emp#, name) ASSIGNED_TO(project#, emp#) PROJECT(project#, project_name, chief) Express the subsequent queries in Relational Algebra (i) Ge

Reasons for the growing popularity of data mining, Question: Data Minin...

Question: Data Mining is the process of extracting knowledge hidden from large volumes of raw data. (a) Using a suitable example, illustrate how Data Mining can be useful t

Define average latency time, Define average latency time. The average l...

Define average latency time. The average latency time of the disk is one-half the time for a full rotation of the disk.

Which steps must designer take to adjust inheritance, In object oriented de...

In object oriented design, which steps must designer take to adjust inheritance? To readjust inheritance following steps should be taken: i)  Rearrange and adjust the classe

List the armstrong axioms for functional dependencies, List the Armstrong's...

List the Armstrong's axioms for functional dependencies.  What do you understand by soundness and completeness of these axioms?      Ans: The Armstrong's axioms are: F1:

Create table, What are the advantages of creating a table from existing tab...

What are the advantages of creating a table from existing table?

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

Explain the exec statement in sql, Explain the EXEC statement in SQL  A...

Explain the EXEC statement in SQL  Ans: All statements which start with EXEC SQL are embedded SQL database statements. High level languages such as C can be employed to write a

Define the two phase locking protocol, Define the Two Phase Locking Protoco...

Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd