Domain constraint, Database Management System

Assignment Help:

Domain Constraint

It shows that each attribute in a relation has to contain an atomic value only from the corresponding domains. The data types associated with commercial RDBMS domains include:

1) Real numbers (double precision floats, float,)

2) Standard numeric data types for integer (such as integer, short- integer,  long integer)

3)  Characters

4)  Fixed length strings and variable length strings.

Therefore, domain constraint shows the condition that we want to put on every instance of the relation. So the values that show in each column must be drawn from the domain associated with that column.

For instance, consider the relation:

STUDENT

 

ROLLNO

 

NAME

 

LOGIN

 

AGE

 

4677

 

Kanu

[email protected]

 

20

 

3677

 

Shikha

 

[email protected]

 

20

 

In the relation above, AGE of the relation STUDENT always relates to the integer domain within a specified range (if any), and not to strings or any other domain. Within a domain non-atomic values should be avoided. This much time cannot be checked by domain constraints. For instance, a database which has area code and phone numbers as two dissimilar fields will take phone numbers as-

 

Area code

 

Phone

 

11

 

29534466

A non-atomic value in this case for a phone can be 1129534466, Though, this value can be accepted by the Phone field.


Related Discussions:- Domain constraint

What is database files , The database files accept the actual data and ...

The database files accept the actual data and are typically the biggest in size. Depending on their shape, the tables for all the user operation can go in one database file-but

Weak entity, An example of a weak entity is Staff because the availabilityI...

An example of a weak entity is Staff because the availabilityID cannot be uniquely identified unless it is used in conjunction with the foreign key known as availabilityID in the A

Illustrate the view of software architecture, Illustrate the view of softwa...

Illustrate the view of software architecture A model is a semantically closed abstraction of system composes of elements. It can be visualized using any of the following five v

What is an object id, What is an object ID? Each class-derived table ha...

What is an object ID? Each class-derived table has an ID for primary key, one or more object IDs form primary key for association derived tables. An object ID is equivalent dat

Explain dynamic two-phase locking, Explain Dynamic Two-Phase Locking H...

Explain Dynamic Two-Phase Locking Here a transaction locks a data item instantly earlier than any operation is applied on the data item.  After finishing all the operations on

What is called as an n-way merge, What is called as an N-way merge? The...

What is called as an N-way merge? The merge operation is a generalization of the two-way merge used by the standard in-memory sort-merge algorithm. It merges N runs, so it is k

Describe the most important classes of parallel machines, Question 1 Discu...

Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.

Differentiate between a unique key and a primary key, Differentiate between...

Differentiate between a unique key and a primary key. - By default, clustered index on column are created by primary key while nonclustered index are created by unique key.

What are the several forms of identity, What are the several forms of ident...

What are the several forms of identity? a) Value b) Name c) Built-in

Hashing, how to implement mid square hashing?

how to implement mid square hashing?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd