Describe all integrity constraints which are violated, Database Management System

Assignment Help:

Consider the two relations given below

1064_table33.png


Given that A is the primary key of R, D is the primary key of S and there is a referential integrity among S.A and R.A, discuss all integrity constraints which are violated.

(i) Primary key of R contains the ‘null' value and the value ‘a1' is duplicated, therefore it violates the entity integrity constraint within the relation R.

(ii) In primary key of S, the value ‘d1' is duplicated; therefore it violates the entity integrity constraint within the relation S.

(iii) The foreign key S.A contains the value ‘a2', that is not available in the parent key R.A, thus it violates the referential integrity constraint within the relation S.

 


Related Discussions:- Describe all integrity constraints which are violated

What are stand-alone procedures, What are stand-alone procedures? Proce...

What are stand-alone procedures? Procedures that are not part of a package are called as stand-alone because they independently defined. A good example of a stand-alone procedu

Need for distributed database systems, Need For Distributed Database System...

Need For Distributed Database Systems A distributed database is a set of database kept on multiple computers that appears to applications as a one database. As a result, an app

Define value set, Define value set? Value set: It is a set of values. Y...

Define value set? Value set: It is a set of values. You do not always need a user to enter junk free text within all the fields. Therefore, Oracle Apps uses value set to valida

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Explain what is to be done during defining problem statement, Briefly expla...

Briefly explain what is to be done during defining problem statement. To define Problem Statement of a system, define what is to be done and how you can go to implement that. Y

What is trigger, What is trigger Triggers are statements that are imple...

What is trigger Triggers are statements that are implemented automatically by the system as the side effect of a change to the database.

What are the different integrity constraints in rdbms, What are the differe...

What are the different integrity constraints in RDBMS? The various integrity constraints in RDBMS are as: Primary Key: primary key is a grouping of one or more attributes

What is first normal form, What is first normal form? The domain of att...

What is first normal form? The domain of attribute must contain only atomic (simple, indivisible) values.

Create an index for the table client, Create an index for the table Client,...

Create an index for the table Client, field CLIENT_NO of Q ? Command:   CREATE INDEX client_client_no ON client(client_no);

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd