Describe all integrity constraints which are violated, Database Management System

Assignment Help:

Consider the two relations given below

1064_table33.png


Given that A is the primary key of R, D is the primary key of S and there is a referential integrity among S.A and R.A, discuss all integrity constraints which are violated.

(i) Primary key of R contains the ‘null' value and the value ‘a1' is duplicated, therefore it violates the entity integrity constraint within the relation R.

(ii) In primary key of S, the value ‘d1' is duplicated; therefore it violates the entity integrity constraint within the relation S.

(iii) The foreign key S.A contains the value ‘a2', that is not available in the parent key R.A, thus it violates the referential integrity constraint within the relation S.

 


Related Discussions:- Describe all integrity constraints which are violated

What is nested trigger, What is Nested Trigger? A trigger can also havi...

What is Nested Trigger? A trigger can also having INSERT, UPDATE and DELETE logic within itself, so when the trigger is fired because of data modification it can also cause ano

The structured query language, The Structured Query Language INTRODUCT...

The Structured Query Language INTRODUCTION Database is an organised set of information about an entity having controlled redundancy and serves numerous applications. DBMS

Max. no. of structures in a table or structure, What is the max. no. Of str...

What is the max. no. Of structures that can be included in a table or structure. Nine.

Which steps must designer take to adjust inheritance, In object oriented de...

In object oriented design, which steps must designer take to adjust inheritance? To readjust inheritance following steps should be taken: i)  Rearrange and adjust the classe

Er diagram, a publishing company produce scientific books on various subjec...

a publishing company produce scientific books on various subjects. the books are written by authors who specialize in one particular subject. the company employs editors who, not n

Abap/4 statements to access internal tables without header, What should be ...

What should be declared explicitly in the corresponding ABAP/4 Statements to access internal tables without header lines & why? Work Area. This is needed as the Work Area is

Define the boyce-codd normal form, Define the Boyce-Codd Normal Form with i...

Define the Boyce-Codd Normal Form with instance and also Compare BCNF and 3NF.  Ans: BCNF: For each functional dependency X->Y in a set F of functional dependencies over relati

What are the benefits of decomposing a system, What are the benefits of dec...

What are the benefits of decomposing a system? The benefits of decomposing a system into subsystems are that after decomposition, each individual component become smaller and e

What are the three types of data sources, What are the three types of data ...

What are the three types of data sources used with ODBC? An ODBC file data source is a file that can be shared between database users. An ODBC system data source is one that is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd