Reflect upon the desirable characteristics of a primary key

Assignment Help Database Management System
Reference no: EM131094344

Database Applications Discussion

Reflect upon the desirable characteristics of a primary key (below) that were presented in this week's lecture. (150-300 words) Choose one characteristic and discuss why you believe it would be undesirable if this were not a characteristic of a primary key. Please do not repeat (or re-word) the thoughts of another student. Respond to both discusion posts shown below the lecure. (50-100 words each)

Lecure on primary keys

The primary key of a table is how we identify data in the table, so it is especially important to choose a proper primary key. There are several characteristics that are considered desirable in a primary key.

First, a primary key should be unique. It can never have a duplicate. This should be obvious since we are using the keys for identification of specific information. This is also one reason why we typically don't consider names good choices for primary keys, since two or more people can have the same name.

Next, a primary key should be stable, meaning it should never change. This is another reason why names are not considered good primary keys. Names do change: marriage, divorce, and adoption are three circumstances that readily spring to mind that might cause a name change.

Additionally a primary key should be minimal. It should use the fewest number of attributes possible. Also, it should be accessible, meaning it's available as soon as the data is created.

Furthermore, a primary key should be "factless." It should contain no information that has meaning. Meeting this characteristic helps ensure the key is security-compliant, because if the key is factless it will not contain any personally identifiable information such Social Security Numbers.

When taken together, these characteristics point to the desirability of a numeric key for the primary key. Because of this we often use a surrogate key for the primary key. We can generate a numeric surrogate key with each record, which results in the primary key meeting all the desirability characteristics. While there are occasional instances where a surrogate key is not the best choice, for the purposes of this class it will be a good idea to get into the habit of using a surrogate key for the primary key.

John's Discusion Post

When it comes to a primary key the main thing that was mentioned was that if the information could be changed not to use it as a primary key. It also mentioned that a good primary key should be numerical like an employee identification number since that is a self generated number that isn't utilizing personal information like the last 4 digits of a social security number. I think the one characteristic that is important is keeping the number stable. Ensuring that the one thing that will tie in all the information for that particular person or item will never change and will access all data from all fields in different databases as well.

Tony's Discusion Post

Within the book a primary key is a column value used to identify each row therefore the values in this column must be unique. So if I understand this right the primary key is set up to help identify the information that you put into that column. when putting in that information you want that primary key to be unique to you so you can protect your information. so creating a unquie primary key can help you protect your information. If this is correct let me know that I am on the right track with this primary key stuff.

Reference no: EM131094344

Questions Cloud

How many credits toward social security : • As part of your planning, how can you estimate what you can expect from Social Security as a contribution to your retirement income? Find this answer by going to http://www.ssa.gov/retire2. Using the menus at this site, find out your retirement ..
Explain who is liable for injuries suffered by pedestrian : Develop an understanding of the legal implications of a principal-agent business relationship. Apply this understanding to a hypothetical business situation where the agent enters into a contract and causes an injury to a third party.
How concerned are you about your individual privacy : How concerned are you about your individual privacy and your online activities? How are your personal data protected by companies that collect customer data? As an individual, what steps do you take to maintain your individual privacy?
What are valid defenses against a breach of contract claim : Review the defenses to breach of contract below and write about an instance where you employed or considered using one of these methods and explain what happened.
Reflect upon the desirable characteristics of a primary key : Reflect upon the desirable characteristics of a primary key (below) that were presented in this week's lecture. (150-300 words) Choose one characteristic and discuss why you believe it would be undesirable if this were not a characteristic of a pr..
Boris pasternak awarded the nobel prize : In 1958, Russian poet and novelist Boris Pasternak was awarded the Nobel Prize for literature, but negative Soviet reaction forced him to refuse the honor. For which novel was Boris Pasternak awarded the Nobel Prize?
Compute the break-even point in units : 1. Airy Window Units sells air conditioners for $125 per unit, and the variable cost to produce them is $87. The owner estimates that the fixed costs are $4,186,000.
Would bee liability insurance pay in this situation : Ms. Bumble Bee operates a florist shop. During a particularly busy day, she allowed one of her employees, Barry, to use her (Bee's) personal car to assist with deliveries. Barry had just obtained his driver's license. Barry was involved in an ..
Enhanced bio availability of buspirone : Enhanced Bioavailability of Buspirone  From Reservoir-Based Transdermal Therapeutic System, Optimization of Formulation Employing Box–Behnken Statistical  Design

Reviews

Write a Review

Database Management System Questions & Answers

  What is an example of a string constant

What is an example of a string constant? What is the assignment operator?  The symbols used to describe the logic of a program are known as _____

  Edinburgh airport case study

Discuss why a relational database would be suitable for the organisation in the case study and provide three reasons for this recommendation and discuss using three advantages that a database management system provides to an organisation.

  Explore the database to understand what it is about

explore the database to understand what it is about then close your Microsoft Access

  Sears competes using database warehouse and olap tools.

What can be done to overcome store managers' resistance to the use of data and analytical tools?

  Computing functional dependencies

Compute the functional dependencies which exist in following table. After determining the functional dependencies, transform this table to an equivalent collection of the tables which are in third normal form.

  Design and build a small database application

In Word, identify a potential database application. It should be based on data you understand well, such as student data (refer to text), a hobby (see Lesson 8), or a set of data you use on the job. When you have made your choice, proceed to Step ..

  Secure storage and retrieval process for healthcare data

Formulate a secure storage and retrieval process for healthcare data. Create a PowerPoint that highlights each of the topics below: Databases, Data dictionaries, data mining, and data warehouses and Characteristics of data quality

  Simple mobile database-replication and mobile database strat

For this assignment, you will create a simple mobile database application using any mobile database of your choice consisting of one or two tables. You may use the database you created in another unit or you may choose to create a new database to ..

  Database design in mysql with column names of client

The instrutions are given below: MySQL Server and MySQL Workbench. In this schema, create all the necessary tables, columns, and relationships to complete your database.

  Analyse a set of data and write a memo

To analyse a set of data, and write a memo, identifying and explaining your insights into the operation of Todd Restaurants.

  Explain relation schema and set of functional dependencies

Consider relation schema r(A,B,C,D,E, F) and a set of functional dependencies {A BCD,BCDE,BD,DA}. Calculate canonical cover for set of functional dependencies (show each step of your derivation with an explanation).

  Explain what information is available in relational database

Explain what information is available from relational database containing one relation with attributes Name, Employee identification number, and Address which is not available.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd