Describe all integrity constraints which are violated, Database Management System

Assignment Help:

Consider the two relations given below

1064_table33.png


Given that A is the primary key of R, D is the primary key of S and there is a referential integrity among S.A and R.A, discuss all integrity constraints which are violated.

(i) Primary key of R contains the ‘null' value and the value ‘a1' is duplicated, therefore it violates the entity integrity constraint within the relation R.

(ii) In primary key of S, the value ‘d1' is duplicated; therefore it violates the entity integrity constraint within the relation S.

(iii) The foreign key S.A contains the value ‘a2', that is not available in the parent key R.A, thus it violates the referential integrity constraint within the relation S.

 


Related Discussions:- Describe all integrity constraints which are violated

Isolation or independence-transaction , Isolation or Independence : The iso...

Isolation or Independence : The isolation property shows that the updates of a transaction should not be visible till they are committed. Isolation assurance that the progresses of

Hashed file organisation, Hashed File Organisation Hashing is the most ...

Hashed File Organisation Hashing is the most common form of purely random access to a database or file. It is also used to access columns that do not have an index as an optimi

Explain embedding sql statements, Question 1 Explain the functions of t...

Question 1 Explain the functions of the following Storage Manager Buffer Manager Transaction Manager 2 Discuss about system catalog in a relational DBMS 3

Get details of employee working on both comp354 and comp345, Consider the r...

Consider the relations EMPLOYEE(emp#, name) ASSIGNED_TO(project#, emp#) PROJECT(project#, project_name, chief) Express the subsequent queries in Relational Algebra (i) Ge

Lack of standards and experience, Lack of standards and experience: The la...

Lack of standards and experience: The lack of standards has considerably limited the potential of distributed DBMSs. As well, there are no tools or methodologies to help users cha

The proliferation of object-oriented methods, The Proliferation of Object-O...

The Proliferation of Object-Oriented Methods The first few years of the 1990s saw blossoming of around fifty various object oriented methods. This proliferation is a sign of g

To eliminate duplicate rows-data manipulation language, To eliminate duplic...

To eliminate duplicate rows (distinct operator)  Example: SELECT DISTINCT DEPTNO FROM EMP;

What are the two main goals of parallelism, What are the two main goals of ...

What are the two main goals of parallelism? Load -balance multiple small accesses, so that the  throughput of such accesses enhances. Parallelize large accesses so that the res

Explain the togaf framework for enterprise architectures, Question: (a)...

Question: (a) With the help of a diagram, explain the TOGAF framework for enterprise architectures. (b) Where would you position enterprise architectures in an enterpri

Describe the host language, Describe the host language? Host Language:...

Describe the host language? Host Language: You could write applications along with SQL statements embedded inside a host language. The SQL statements give the database inter

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd