Advantages and disadvantages of using generated keys

Assignment Help Basic Computer Science
Reference no: EM131054246

Recent changes in privacy laws have disallowed organizations from using Social Security numbers to identify individuals unless certain restrictions are satisfied. As a result, most U.S. universities cannot use SSNs as primary keys (except for financial data). In practice, Student_id, a unique identifier assigned to every student, is likely to be used as the primary key rather than SSN since Student_id can be used throughout the system.

a. Some database designers are reluctant to use generated keys (also known as surrogate keys) for primary keys (such as Student_id) because they are artificial. Can you propose any natural choices of keys that can be used to identify the student record in a UNIVERSITY database?

b. Suppose that you are able to guarantee uniqueness of a natural key that includes last name. Are you guaranteed that the last name will not change during the lifetime of the database? If last name can change, what solutions can you propose for creating a primary key that still includes last name but remains unique?

c. What are the advantages and disadvantages of using generated (surrogate) keys?

Reference no: EM131054246

Questions Cloud

Journal reports the asked price for the bond : A government bond with a coupon rate of 8% makes semiannual coupon payments on January 9 and July 9 of each year. The Wall Street Journal reports the asked price for the bond on January 24 at 100:17. What is the invoice price of the bond? The coup..
Write a python program to demonstrate a theme for your robot : Write a Python program to demonstrate a theme for your robot. Your team must think of something fc your robot to do using the sensors and/or motors.
What is the present value : What is the present value of $13,750 to be received 4 years from today if the discount rate is 4.75 percent?
Differences between it and operational planning : What is Strategic planning it's traits what it involves and the main differences between it and operational planning.
Advantages and disadvantages of using generated keys : What are the advantages and disadvantages of using generated (surrogate) keys?
Cost of healthcare services : How might the ways in which we produce, deliver, and pay for care be changed in order to increase access, improve quality, and the the cost of healthcare services?
Different legal forms for a firm : Question: You want to compare the earnings from two different legal forms for a firm: Corporate and Proprietor. Your pre-tax income is $500,000 in both. However there is a difference in the taxes you pay.
What aspect would you consider most critical or important : What do you find unusual or of interest as a forensic or crime scene investigator working in today's technological environment? What in your opinion was mishandled in this case based upon what you have read regarding the case in your text?
Initial cash flow for new prroject : Samson's now wants to tear down the original structure and build a new strip mall on the site at an estimated cost of $2.3 million. What amount should be used as the initial cash flow for new prroject?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the specific needs of the help desk

In addition to the other elements of the planned strategic IT operation there will be a need to develop and implement an IT Help Desk to better facilitate the support of Northwest Georgia Auto Parts' internal IT issues

  Cubic maximum subsequence sum algorithm performs

The inner loop of the cubic maximum subsequence sum algorithm performs N(N+1)(N+2)/6 iterations of the innermost code. The quadratic version performs N(N + 1)/2 iterations.

  4 bit binary representation using excess 7

Assuming a 4 bit binary representation using excess 7 list all bit sequences for integers -7 to +8

  Draw a finite-state machine for tennis scoring

Draw a finite-state machine for tennis scoring. The rules of tennis are as follows. To win, you need at least four points and you must have at least two points more than your opponent.

  The technologies used to implement them

Q1: Describe WMANs, the technologies used to implement them, and where they are predominantly used Q2: What should be included in the narrative of a site survey report? Q3: Explain how an attacker can force a renegotiation to capture an SSID, even th..

  Distinguish between concurrent study and simultaneous

Q - Distinguish between concurrent study and simultaneous. A single processor can execute two or more programs concurrently but not simultaneously. Why ?

  What is the difference between cdma and lte

What is the difference between CDMA and LTE? Is one technology better than the other?

  Explain java data streams

Explain Java data streams. How do we move different types of data from one place to another in Java. What different types of data streams are there?

  The cloud service to become operational again

Over the past 3 years, a cloud service has been unavailable for a total of 36 hours, primarily due to a denial of service attacks. Additionally, the physical server hosting the cloud service crashed once. It took the cloud provider 4 days to replace ..

  Write the definition of the function

Write the definition of the function, leavesCount, that takes as a parameter a pointer to the root node of a binary tree and returns the number of leaves in a binary tree. Add this function to the class binaryTreeType and create a program to test ..

  How do we make jar files

How do we make Jar files? What is a Jar file? How do we control what is in them? How do we make a Jar file executable?

  Explain d-s access control list gives p full rights

Suppose that d's access control list gives p full (read, write, append, and execute) rights to d. In which ring(s) should p execute for following to occur?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd