Attributes and tuple, Database Management System

Assignment Help:

Before we talk about the relational model in more detail, let us first define some very basic terms used in this model.

Tuple

Every row in a table shows a record and is called a tuple. A table containing 'n' attributes in a record is called n-tuple.

Attribute

 The name of every column in a table is used to interpret its meaning and is known as an attribute. Every table is called a relation.

For instance, Figure shows a relation PERSON. The columns NAME, PERSON_ID, AGE and ADDRESS are the attributes of PERSON and every row in the table represents a separate tuple (record).

 

Relation Name:  PERSON

PERSON_ID

NAME

AGE

ADDRESS

TELEPHONE

1

Sanjay Prasad

35

b-4,Modi Nagar

011-25347527

2

Sharad Gupta

30

Pocket 2, Mayur Vihar.

023-12245678

3

Vibhu Datt

36

c-2, New Delhi

033-1601138

Figure: An extended PERSON relation


Related Discussions:- Attributes and tuple

What is sql?, What Is Sql?  Structured Query Language (SQL) is a standa...

What Is Sql?  Structured Query Language (SQL) is a standard query language. It is usually used with all relational databases for data manipulation and definition. All the re

Explain the concept of deadlock, Question: In a multi-user database env...

Question: In a multi-user database environment, locking mechanisms can be used to solve the three basic problems of concurrency. On the other hand, however, locking may also le

What are the advantages of relational data model, What are the advantages o...

What are the advantages of relational data model? Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer

Explain optimistic locking and pessimistic locking, Explain the difference ...

Explain the difference between optimistic locking and pessimistic locking. Optimistic locking supposes no transaction conflict will occur and deals with the consequences if it

Need website hacking security test, We want have a website; we need to test...

We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like

Thid, describe objectivde of file organisation

describe objectivde of file organisation

Single valued normalisation, Single Valued Normalisation  Codd in the y...

Single Valued Normalisation  Codd in the year 1972 formed three normal forms (1NF, 2NF, and 3NF). These were based on functional dependencies between the attributes of a relati

How can you map null values to other values while display, How can you map ...

How can you map NULL values to other values while display? IF( ) , IFNULL( ) keywords are used to do so. They are 'LIMIT' is used for the following kinds of problems: 1) Ans

Perform an exploratory analysis on the entire dataset, Australian Bureau of...

Australian Bureau of Statistics (ABS) provides retail data for different groups and different states as well as the aggregate numbers. Table 11 " Retail Turnover, State by Industry

Locks, Locks: Serialisabilty is just a test whether a given interleaved sch...

Locks: Serialisabilty is just a test whether a given interleaved schedule is ok or has a concurrency related trouble. Though, it does not make sure that the interleaved concurrent

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd