What are referential integrity constraints, Database Management System

What are referential integrity constraints?

A value that appears in single relation for a given set of attributes also appears for a particular set of attributes in another relation.


Posted Date: 6/1/2013 4:04:50 AM | Location : United States

Related Discussions:- What are referential integrity constraints, Assignment Help, Ask Question on What are referential integrity constraints, Get Answer, Expert's Help, What are referential integrity constraints Discussions

Write discussion on What are referential integrity constraints
Your posts are moderated
Related Questions
Draw the precedence graph of the following schedule and determine whether the schedule is serializable. (Note that all instructions, except lock and unlock, are omitted. We assume

What is meant by mean time to failure? The mean time to failure is the amount of time that the system could run continuously without failure.

List any eight applications of DBMS. a) Universities b) Airlines c) Banking d) Credit card transactions e) Tele communication f) Sales g)Finance h) Manufac

What are the two methods for dealing deadlock problem? The two procedures for dealing deadlock problem is deadlock detection and deadlock recovery.

What is a hash index? A hash index organizes the search keys, with their associated pointers, into a hash file structure.

Define Deadlock recovery measures                   To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac

(a) Data warehouse can be defined as "a subject-oriented, integrated, time-variant, non-volatile collection of data" in support of management's decision making process. Explain ea

Explain the Check Clause The CHECK clause is employed to at the end of a CREATE TABLE statement specify table constraints. This is known as table-based constraint because it ap

What do you mean by an execution plan? Why is it used? How will you view it? a.) An execution plan can be known as a road map which textually or graphically illustrates the dat

Explain the Log Based Recovery Method? The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failu