Entity identifier key attributes, Database Management System

Assignment Help:

An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be used to recognize each entity uniquely.

Strong entity set: The entity types having a key attribute are known as strong entity types or regular entity types.

  • EXAMPLE: The Student entity has a key attribute RollNo which uniquely recognized it, hence is a strong entity.

Attributes

Let us first answer the question:

What is an attribute?

An attribute is a property used to define the specific feature of the entity. So to define an entity entirely, a set of attributes is used.

For example, a student entity may be defined by the student's name, address, age, course, etc.

An entity will have a value for every of its attributes. For example for a specific student the following values can be assigned:

RollNo: 1234

Name: Supriya

Age: 18

Address: B-4, Mayapuri, Delhi. Course: B.Sc. (H)


Related Discussions:- Entity identifier key attributes

What is serializability, What is serializability? Explain its types? Th...

What is serializability? Explain its types? The data base system must control concurrent implementation of transactions, to ensure that the data base state remains consistent.

What is inheritance, What is inheritance? Define it in detail?  Inheri...

What is inheritance? Define it in detail?  Inheritance Inheritance can be at the levels of types, or at the level of tables we first consider inheritance of types, then i

How does query tree represent relational algebra expression, How does a que...

How does a query tree represent a relational algebra expression?  Discuss any three rules for query optimisation, giving example as to when should each rule be applied.     Ans

Explain the ansi sparc architecture, Explain the ANSI SPARC architecture ...

Explain the ANSI SPARC architecture The three-schema architecture is as well known as ANSI SPARC architecture. The aim of the three-schema architecture is to separate the user

Explain discretionary access control, Problem: (a) Given the following ...

Problem: (a) Given the following relation: Stats(Name,Sex,Children, Occupation, Salary, Tax, Audits) Write SQL code to define the following security constraints: (i) User

What is icr, What is ICR? A. ICR (Intelligent Character Recognition) is...

What is ICR? A. ICR (Intelligent Character Recognition) is a technology that gives scanning and imaging systems the ability to identify images of hand-printed or script charact

Discuss how the bi-directional implementations are made, Discuss how the bi...

Discuss how the bi-directional Implementations are made. In bi-directional implementation of the association, a pair of references must implement every link. The declarations a

What is a primary key, What is a primary key? Primary key is chosen by ...

What is a primary key? Primary key is chosen by the database designer as the principal means of identifying an entity in the entity set.

Requirements for your cache simulator, Using your cache simulator and using...

Using your cache simulator and using smalltex.din as your memory trace determine the total miss rate, compulsory miss rate, capacity miss rate, and conflict miss rate for the follo

Multi-list file organisation, Multi-list file Organisation Multi-list f...

Multi-list file Organisation Multi-list file organisation is a multi-index linked file organisation. A linked file organisation is a logical organisation where physical orderin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd