Domain constraints, Database Management System

Domain Constraints

Domain constraints are primarily formed for defining the logically correct values for an attribute of a relation. The relation allows attributes of a relation to be confined to a range of values, for instance, values of an attribute age can be restricted as Zero to 150 or a definite type like integers, etc.

                                                      REDUNDANCY AND ASSOCIATED PROBLEMS

Let us take the subsequent relation STUDENT

Enrolment no

Sname

Address

Cno

Cname

Instructor

Office

050112345

Rahul

D-27, main Road

Ranchi

MCS-011

Problem

Solution

Nayan

Kumar

102

050112345

Rahul

D-27, Main Road

Ranchi

MCS-012

Computer

Organisation

Anurag

Sharma

105

050112345

Rahul

D-27, Main Road

Ranchi

MCS-014

SSAD

Preeti

Anand

103

050111341

Aparna

B-III, Gurgaon

MCS-014

SSAD

Preeti

Anand

103

                                                                           Figure: A state of STUDENT relation

The above relation satisfies the properties of a relation and is said to be in first normal form (or 1NF). Theoretically it is convenient to have all the information in one relation as it is then likely to be simpler to query the database. But the relation over has the following undesirable kinds:

Posted Date: 3/7/2013 1:41:24 AM | Location : United States







Related Discussions:- Domain constraints, Assignment Help, Ask Question on Domain constraints, Get Answer, Expert's Help, Domain constraints Discussions

Write discussion on Domain constraints
Your posts are moderated
Related Questions
Problem: ‘Users and Information system specialists need to spend inordinate amounts of time locating and gathering data' (Watson and Hal, 1998) Recent developments in the ar

Data Redundancy -A lot of information is being repeated in the relation. For instance, the information that MCS-014 is named SSAD is repetitive, address of Rahul is "D- 27, Main ro

Explain data abstraction? Data abstraction Data abstraction is a methodology in which enables us to isolate how a compound data object is utilized from the details of how it is

What are the different kinds of database end users? Discuss the major activities of each? End-Users - End-users are the people whose jobs need access to the database for que

Define the Traditional System Analysis and Design Traditional System Analysis and Design (SAD) have three basic life cycle models. A typical software lifecycle consists of the

Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra

Which file organization provides very fast access to any arbitrary record of a file? Hashed file organization provides very fast access to any arbitrary record of a file.

What are the different strategies of implementation of the Statecharts?  There are two strategies for implementation of state charts: i)   Basic Implementation Strategy

Vertical Fragmentation- Vertical fragmentation groups together only those attributes in a relation that are used jointly by various important transactions. A vertical fragment is d

Which types of data supported by MySQL for Time and Date formats?  MySQL supports a number of time and date column formats: Some of them are 1) DATE 2) DATETIME 3) TIM