Unit database integrity, Database Management System

Relations create the database. They must satisfy various properties, like no duplicate tuples, no ordering of tuples, and atomic attributes, etc. Relations that satisfy these basic needs may still have some undesirable characteristics such as data redundancy, and anomalies.

What are these undesirable characteristics and how can we eliminate them from the database system? This part is an attempt to answer this question. Though, please note that most of these undesirable properties do not arise if the database modelling has been carried out very carefully using some method like the Entity-Relationship Model. It is still important to use the methods in this unit to check the database that has been acquired and ensure that no mistakes have been made in modeling.

The central thought in these discussions is the concept of Database integrity, the notion of functional dependency, which rely on understanding the semantics of the data and which deals with what information in a relation is dependent on what other information in the relation. Our prime objective in this section is to describe the concept of data integrity, functional dependence and then describes normal forms using functional dependencies and using other types of data dependencies.

OBJECTIVES

After reading this section you should be able to

  • Explain the concept of entity integrity;
  • Define relational database referential integrity constraints;
  • Explain the concept of functional dependency, and
  • show how to use the dependencies information to decompose relations; whenever essential to obtain relations that have the desirable properties that we want without losing any of the information in the original relations.

 

Posted Date: 3/6/2013 6:29:08 AM | Location : United States







Related Discussions:- Unit database integrity, Assignment Help, Ask Question on Unit database integrity, Get Answer, Expert's Help, Unit database integrity Discussions

Write discussion on Unit database integrity
Your posts are moderated
Related Questions
1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict

What is Multivalued Attribute? Multivalued Attribute - Multivalued attribute might have more than one value for an entity. For instance, PreviousDegrees of a STUDENT.

Define Deadlock prevention These protocols make sure that the system will never enter a deadlock state. There are two methods to deadlock prevention. One approach makes sure t

Niles Video Inc. wants to create a website for online sales of movies (DVD and videotapes). People will be allowed to register as customers on the website and to update their store

it can be possible to create any table without primary key

Example : Search the name, department number and salary of employees drawing minimum salary in that department. SELECT ENAME, SAL, DEPTNO  FROM EMP WHERE SAL IN (SELECT MI

Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i

Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica


Need for Client Server Computing- Client/Server (C/S) architecture includes running the application on multiple machines in which every machine with its component software tackles