Domain constraints, Database Management System

Assignment Help:

Domain Constraints

Domain constraints are primarily formed for defining the logically correct values for an attribute of a relation. The relation allows attributes of a relation to be confined to a range of values, for instance, values of an attribute age can be restricted as Zero to 150 or a definite type like integers, etc.

                                                      REDUNDANCY AND ASSOCIATED PROBLEMS

Let us take the subsequent relation STUDENT

Enrolment no

Sname

Address

Cno

Cname

Instructor

Office

050112345

Rahul

D-27, main Road

Ranchi

MCS-011

Problem

Solution

Nayan

Kumar

102

050112345

Rahul

D-27, Main Road

Ranchi

MCS-012

Computer

Organisation

Anurag

Sharma

105

050112345

Rahul

D-27, Main Road

Ranchi

MCS-014

SSAD

Preeti

Anand

103

050111341

Aparna

B-III, Gurgaon

MCS-014

SSAD

Preeti

Anand

103

                                                                           Figure: A state of STUDENT relation

The above relation satisfies the properties of a relation and is said to be in first normal form (or 1NF). Theoretically it is convenient to have all the information in one relation as it is then likely to be simpler to query the database. But the relation over has the following undesirable kinds:


Related Discussions:- Domain constraints

01a_ImportCasting.xlsx, 01a_Broadway_LastFirst_yyyy-mm-dd Capstone Exercise...

01a_Broadway_LastFirst_yyyy-mm-dd Capstone Exercises You work as a production assistant in the office of the Green Man Theatre. One of your duties is to maintain the company datab

Security-drawbacks of data distribution, Security: In a centralised system...

Security: In a centralised system, access to the data can be simply controlled. Though, in a distributed DBMS not only does access to replicated data have to be controlled in many

Project, write a database program for concurrency transaction in a bank

write a database program for concurrency transaction in a bank

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Property management database, You are to write a property management databa...

You are to write a property management database program that allows a real estate agent to view, add, search, and save property listings. The program is to do the following: 1.

Give detail explanation about cross-section of twisted pair, The cross-sect...

The cross-section of twisted pair The cross-section of each and every strand of the twisted pair is π/4 square mm. A 10-km length of this type of material, with two strands per

In a relational model how relations are termed, In a relational model how r...

In a relational model how relations are termed? In a relational model, relations are termed as tables. (The term ‘relation’ is the technical name of the ‘table’ in RDBMS)

What is first normal form, What is first normal form? The domain of att...

What is first normal form? The domain of attribute must contain only atomic (simple, indivisible) values.

Define boyce codd normal form, Define Boyce codd normal form A relation...

Define Boyce codd normal form A relation schema R is in BCNF with respect to a set F of functional dependencies if, for all functional dependencies in F + of the form.α ->β.

The basic 2pl-two phase locking (2pl), Normal 0 false false ...

Normal 0 false false false EN-US X-NONE X-NONE

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd