Describe the composite key, Database Management System

Assignment Help:

Describe the Composite Key

Composite Key: Sometimes one key is not enough to uniquely recognize a row. E.g. in a single class Roll is enough to search a student, but in the whole school, merely searching by the Roll is not enough, because there could be 10 classes in the school and every one of them may have a certain roll no 5. To uniquely recognize the student we have to say something like "class VII, roll no 5". So, a combination of two or more attributes is combined to make a unique combination of values, such as Class + Roll.

 


Related Discussions:- Describe the composite key

Database, . Ashutosh Dubey who is the director of Gyan Gurukul want a three...

. Ashutosh Dubey who is the director of Gyan Gurukul want a three-level schema architecture for the Gyan Gurukul Company that provide better security also design a data abstraction

Differance between internal and external schema, Differance between interna...

Differance between internal and external schema? Internal and external schema: Internal Schema • Describes the physical storage structure • Uses a physical data model External

Hardware failure-database recovery and security, Hardware failure :  Hardwa...

Hardware failure :  Hardware failures are the failures when some disk or hardware chip fails. This may result in loss of data. One such trouble can be that a disk gets damaged and

What is horizontal fragmentation, What is horizontal fragmentation? Hor...

What is horizontal fragmentation? Horizontal fragmentation divides the relation by assuming every tuple of r to one or more fragments

Database, why are older data models are being replaced by new data models

why are older data models are being replaced by new data models

What is relational model feature, What is relational model feature? A r...

What is relational model feature? A relational model feature is much more data independence than some other database models.

Explain traditional programming languages, How persistent programming langu...

How persistent programming languages differ from traditional programming languages? Database languages vary from traditional programming languages in that they directly manipul

Explain transaction, What is transaction? Collections of operations tha...

What is transaction? Collections of operations that form a single logical unit of work are known as transactions.

Explain the integrity constraints, Explain the integrity constraints: Not N...

Explain the integrity constraints: Not Null,  Unique, Primary Key with an example each. Is the combination 'Not Null, Primary Key' a valid combination. Justify. Not Null - Shou

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd