Describe all integrity constraints which are violated, Database Management System

Assignment Help:

Consider the two relations given below

1064_table33.png


Given that A is the primary key of R, D is the primary key of S and there is a referential integrity among S.A and R.A, discuss all integrity constraints which are violated.

(i) Primary key of R contains the ‘null' value and the value ‘a1' is duplicated, therefore it violates the entity integrity constraint within the relation R.

(ii) In primary key of S, the value ‘d1' is duplicated; therefore it violates the entity integrity constraint within the relation S.

(iii) The foreign key S.A contains the value ‘a2', that is not available in the parent key R.A, thus it violates the referential integrity constraint within the relation S.

 


Related Discussions:- Describe all integrity constraints which are violated

Explain the concept of deadlock, Question: In a multi-user database env...

Question: In a multi-user database environment, locking mechanisms can be used to solve the three basic problems of concurrency. On the other hand, however, locking may also le

multiple-mode locks, Multiple-mode locks : It offers two locks: exclusive ...

Multiple-mode locks : It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that neve

Draw an erd for the above relational schema, The following relational datab...

The following relational database schema represents part of a simplified database used by a library: tblBook (BookID, Title, PublisherID, Category,Price) tblPublisher (Publishe

Define signal, Define Signal. It allows methods to respond to events tr...

Define Signal. It allows methods to respond to events triggered by themselves or by other processes. Each signal corresponds to an exacting event. A signal is represented in Sy

Define shadow paging, Define shadow paging. An alternative to log-based...

Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.

Linked list, what is difference between circular inked lust and grunded lin...

what is difference between circular inked lust and grunded linked list

Define the one-way associations, One-way Associations When an associat...

One-way Associations When an association is traversed only in the one direction, then it is implemented as a pointer i.e.an attribute which contains an object reference. If mu

Consistency-transaction , Consistency: This property makes sure that a com...

Consistency: This property makes sure that a complete transaction implementation takes a database from one consistent state to another consistent state. If the transaction fails e

Fragmentation, let us consider a table having 2200 records and the fixed si...

let us consider a table having 2200 records and the fixed size of the table to be considered as 25.then how many numbers of table is requredto perform horizontal fragmentation

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd