Describe integrity constraints, Database Management System

Assignment Help:

Describe integrity constraints?

Integrity Constraints - A database is just as excellent as the information stored in it, and a DBMS must therefore help avoid the entry of incorrect information. An integrity constraint is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. If a database instance satisfies all the integrity constraints specified on the database schema, it is a legal instance. A DBMS enforces integrity constraints, in that it permits only legal instances to be stored within the database.

Integrity constraints are specified and enforced at various times:

When the DBA or end user describes a database schema, he or she specifies the integrity constraints which must carry on any instance of this database. While a database application is run, the DBMS checks for violations and disallows changes to the data in which violate the specified integrity constraints. Several types of integrity constraints can be specified in the relational model, such as, Not Null, Check, Unique, Primary Key, etc.


Related Discussions:- Describe integrity constraints

Column constraints-on delete cascade, CREATE TABLE prodtrans ( pno ...

CREATE TABLE prodtrans ( pno number (4) ptype char (1) CHECK (ptype in ('I','R','S')), qty number (5) FOREIGN KEY pno REFERENCES product (pno) ON DELETE CASCADE);

How does query tree represent relational algebra expression, How does a que...

How does a query tree represent a relational algebra expression?  Discuss any three rules for query optimisation, giving example as to when should each rule be applied.     Ans

Sub query in the update command, Sub query in the UPDATE command : Exam...

Sub query in the UPDATE command : Example :  //Double  the  commission  for  employees,  who  have  got  at  least  2 increments. UPDATE EMP SET COMM = COMM * 2 WHERE

Which is another name for weak entity, Which is another name for weak entit...

Which is another name for weak entity? Child is another name of weak entity.

What is a phantom deadlock, What is a Phantom Deadlock? In distributed...

What is a Phantom Deadlock? In distributed deadlock detection, the delay in propagating local information might cause the deadlock detection algorithms to recognize deadlocks

Example of database optimisation, Create 1 experiment to demonstrate an asp...

Create 1 experiment to demonstrate an aspect of query optimisation by using access-path structures (indexes), decomposition, or denormalisation. Once satisfied with your experiment

What are the advantages of using a dbms, What are the advantages of using a...

What are the advantages of using a DBMS? The benefits of using a DBMS are a) Controlling redundancy b) Restricting unauthorized access c) Giving multiple user interfac

ER diagram in database, What is an ER diagram? Why is it used in Database m...

What is an ER diagram? Why is it used in Database management system (DBMS)?

Explain the reason for keeping legacy system, In order to keep pace with co...

In order to keep pace with competitors, Space Ltd has decided to implement an ERP system in order to replace its old legacy and manual systems. Management does not have much knowle

Single valued normalisation, Single Valued Normalisation  Codd in the y...

Single Valued Normalisation  Codd in the year 1972 formed three normal forms (1NF, 2NF, and 3NF). These were based on functional dependencies between the attributes of a relati

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd