Domain constraint, Database Management System

Assignment Help:

Domain Constraint

It shows that each attribute in a relation has to contain an atomic value only from the corresponding domains. The data types associated with commercial RDBMS domains include:

1) Real numbers (double precision floats, float,)

2) Standard numeric data types for integer (such as integer, short- integer,  long integer)

3)  Characters

4)  Fixed length strings and variable length strings.

Therefore, domain constraint shows the condition that we want to put on every instance of the relation. So the values that show in each column must be drawn from the domain associated with that column.

For instance, consider the relation:

STUDENT

 

ROLLNO

 

NAME

 

LOGIN

 

AGE

 

4677

 

Kanu

[email protected]

 

20

 

3677

 

Shikha

 

[email protected]

 

20

 

In the relation above, AGE of the relation STUDENT always relates to the integer domain within a specified range (if any), and not to strings or any other domain. Within a domain non-atomic values should be avoided. This much time cannot be checked by domain constraints. For instance, a database which has area code and phone numbers as two dissimilar fields will take phone numbers as-

 

Area code

 

Phone

 

11

 

29534466

A non-atomic value in this case for a phone can be 1129534466, Though, this value can be accepted by the Phone field.


Related Discussions:- Domain constraint

What is a transaction, What is a Transaction? A transaction is an even...

What is a Transaction? A transaction is an event which happens on the database. Generally a transaction reads a value from the database or writes a value to the database. If y

Define aggregate functions, Define Aggregate functions and what aggregate f...

Define Aggregate functions and what aggregate functions supported by the MySQL To calculate a summary value from a set of individual values and uses one of the functions known

What is system log, What is system log?  What are the entries?       An...

What is system log?  What are the entries?       Ans:  The system log that is generally written on stable storage contains the redundant data required to recover from volatile

Dml precompiler in database management system, DML Precompiler All th...

DML Precompiler All the DBMS have two basic sets of Languages - Data Definition Language (DDL) that have the set of commands needed to define the format of the data that is b

Wait-die scheme -deadlock prevention, Wait-die" scheme : The idea is based ...

Wait-die" scheme : The idea is based on non-preventive method. It is based on a simple rule:                                 If Ti requests a database resource that is held by T

Define average seek time, Define average seek time. The average seek ti...

Define average seek time. The average seek time is the average of the seek times, calculated over a sequence of random requests.

Benefits and drawbacks of heap files, Benefits of heap files 1.   This i...

Benefits of heap files 1.   This is a easy file Organisation method. 2.   Insertion is somehow capable. 3.   Good for bulk-loading data into a table. 4.   Best if file

Adding redundant associations for efficient access, Adding Redundant Associ...

Adding Redundant Associations for Efficient Access Redundant associations do not add any type of information, therefore during design we should actually examine structure of o

Data analyzing and desing, Critically explained the benefits and limit...

Critically explained the benefits and limitations of different database technologies with proper examples

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd