Column constraints-on delete cascade, Database Management System

Assignment Help:

CREATE TABLE prodtrans

(

pno number (4)

ptype char (1) CHECK (ptype in ('I','R','S')), qty number (5)

FOREIGN KEY pno REFERENCES product (pno) ON DELETE CASCADE);

 

In the table so formed please reminder the referential constraint on the foreign key pno in prodtrans table to product table. Any product record if removed from the product table will trigger deletion of all the related records (ON DELETE CASCADE) in the prodtrans table.

 


Related Discussions:- Column constraints-on delete cascade

Many-to-many relationship, Many-to-many : Entities in A and B are related w...

Many-to-many : Entities in A and B are related with any number of entities from each other. Example: Taught_by Relationship among course and faculty. One faculty member ca

What are the basic merits of decomposition, The basic merits of decompositi...

The basic merits of decomposition. The Advantages of Decomposition 1.  Separate person can work on each subsystem. 2.  A particular software engineer can specialize in a

Discuss the count function, Discuss the count function? The COUNT funct...

Discuss the count function? The COUNT function used returns the number of tuples or values fixed in a query. The count function comprises two types of syntax: (1) COUNT (*)

The extract statement do in extract datasets, What does the extract stateme...

What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.

Develop a cards website, Project Description: I want to build a card pla...

Project Description: I want to build a card playing Website. The user should be able to 1. Login. 2. Have profile access. 3. Put money into the site. 4. Selects t

Generalization and specialization, design a generalization specialization h...

design a generalization specialization hierarchy for a motor vehicle sales company. the company sells motorcycles, passenger cars, vens and buses.

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Define deadlock term, a. Define the term "deadlock". There are four conditi...

a. Define the term "deadlock". There are four conditions that must hold before deadlock is possible. Name them. b. Outline an algorithm that detects whether there is a deadlock.

Explain the log based recovery method, Explain the Log Based Recovery Metho...

Explain the Log Based Recovery Method? The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd