N-ary relationship, Database Management System

For every n-ary relationship type R where n>2, we make a new table S to represent R. We contain as foreign key attributes in s the primary keys of the relations that show the participating entity types. We also contain any easy attributes of the n-ary relationship type (or easy components of complete attributes) as attributes of S. The primary key of S is generally a combination of all the foreign keys that reference the relations showing the participating entity types. Figure  is a special case of n-ary relationship: a binary relation.

Posted Date: 3/6/2013 6:28:06 AM | Location : United States







Related Discussions:- N-ary relationship, Assignment Help, Ask Question on N-ary relationship, Get Answer, Expert's Help, N-ary relationship Discussions

Write discussion on N-ary relationship
Your posts are moderated
Related Questions
Components of database manager The above functions are reached by the database manager. The major elements of a database manager are: Authorisation control: This mod


The Internal or Physical Level The collection of files permanently stored on secondary storage devices is called as the physical database. The internal or physical level is t

What Command You Use What Day of the week were you born

What are segments in oracle? Segments - Each table has single field of disk space, known as segment, set aside for it in the tablespace. Segments consist of contiguous sections

The C_Artist  application will be developed using the C language (C99 standards) and will be able to compile without warnings and link and run in the Swinburne computer laboratorie

Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.

Explain the use of constraints in functional model with suitable example. A constraint shows relationship between two objects at same time, or   among various values of the sam

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

What is key ? Key - A single attribute or a combination of two or more attributes of an entity set which is used to recognize one or more instances (rows) of the set (table) is