Referential integrity constraint - relational constraints, Database Management System

It defines that the tuple in one relation that refers to another relation must refer to an existing tuple in that relation. This constraint is states on two relations (not essentially distinct). It uses a concept of foreign key and has been dealt with in more factors in the next unit.

Example

 

1599_referential integrity constraint.png

In the example given above, the value of C^ in every R tuple is matching with the value of C# in some S tuple. If a tuple has values (A6, B2, and C4) is added then it is invalid as referenced relation S doesn't contain C4. Therefore, it will be a violation of referential integrity constraint.

Posted Date: 3/6/2013 5:33:35 AM | Location : United States







Related Discussions:- Referential integrity constraint - relational constraints, Assignment Help, Ask Question on Referential integrity constraint - relational constraints, Get Answer, Expert's Help, Referential integrity constraint - relational constraints Discussions

Write discussion on Referential integrity constraint - relational constraints
Your posts are moderated
Related Questions
I want an iPad app that is a simple 1 page form to complete with text. The Objective is to allow a few dozen people of the same organization (they're all on iPad) to open the app,

please give me introduction to full data in D B M S in a short assignment

Describe the storage structure of indexed sequential files and their access method.  Ans:   Storage structure of Indexed Sequential files and their access: To achieve fast rand

Law Associates is a large legal practice based in Sydney. You have been asked to design a data model for the practice based upon the following specification: The practice employs

entity relationship diagram about finance

What is Asterisk in SQL? Asterisk (*): In SQL, the columns for all the tables and views in the FROM clause will be displayed.

What is Relational Algebra? Relational algebra is a Procedural query Language?

There are three main sources of utilities and applications for a DBMS: a. Vendor applications and utilities are given for working with or maintaining the database, and generally

Authorisation Authorisation is the culmination of the administrative policies of the organisation.  As the name shows, authorisation is a set of rules that can be used to verif

What are stored-procedures? And what are the advantages of using them? Stored procedures are database objects that perform a user defined operation. A stored procedure can have