Describes the several relationship constraints, Database Management System

Describes the several relationship constraints through giving suitable example?

Constraints on relationships: There are two kinds of constraints on relationships.

1) Mapping cardinalities or cardinality ratios express the number of entities to that another entity can be associated through a relationship set. For a binary relationship set among entities A and B. The mapping cardinality may be any one of the subsequent:

a) One to One: An entity in A is related along with at most one entity in B and an entity in B is related with at most one entity in A.
b) One to Many: An entity in A can be related with any number in B but an entity in B is associated with at most one in A.
c) Many to one: An entity in A is related with at most one in B but an entity in B is associated with any number in A.
d) Many to Many: An entity in A and B can be associated along with any number of entities in the other entity set.

2) Participation constraints: The participation of an entity set E in a relationship set R is said to be total if every entity in E participates within at least one relationship in R. If only a few entities in E participation of entity set E in relationship R is said to be partial.

Posted Date: 5/13/2013 2:21:12 AM | Location : United States







Related Discussions:- Describes the several relationship constraints, Assignment Help, Ask Question on Describes the several relationship constraints, Get Answer, Expert's Help, Describes the several relationship constraints Discussions

Write discussion on Describes the several relationship constraints
Your posts are moderated
Related Questions
Describe the algorithm to draw the dependency graph?   Ans: Algorithm to draw Precedence Graph is like this: a.  For every transaction T i participating in schedule S, make

define anomalies and different types of anomalies with example

What is a SELECT operation? The select operation selects tuples that please a given predicate. We use the lowercase letter σ to denote selection.

why shadow copy technique is used?

Mention the various user privileges All privileges directly granted to the user or role. All privileges granted to roles that have been granted to the user or role.

Redo Logs: Any database must have minimum two redo logs. These are the rules for the database; the redo logs record all modifies to the system objects or user objects. If any type

What are the advantages of Logical Databases? It offers a simple-to-use selection screens.  You can change the pre-generated selection screen to your needs.  It offers check f

Question : Mr. Smith Harry has a car manufacturing company which has recently integrated management information system. He wishes to obtain more information on ethics and socia

An example of a weak entity is Staff because the availabilityID cannot be uniquely identified unless it is used in conjunction with the foreign key known as availabilityID in the A

Define check point and its impact on data base recovery.                  Ans:  There could be hundreds of transactions handled per minute, in a large on-line database system.