Explain cascade and restrict clauses of drop schema command, Database Management System

Assignment Help:

Explain several types of constraints that can be specified using CREATE TABLE command. Explain CASCADE and RESTRICT clauses of DROP SCHEMA command?

Constraint Description
PRIMARY KEY Determines that column(s) uniquely identifies each record. The primary key cannot be NULL, and the data value(s) must be unique.

FOREIGN KEY In a one-to-many relationship, the constraint is added to the "many" table. The constraint ensures which if a value is entered into a specified column, it must already exist in the "one" table, or the record is not added.

UNIQUE Ensures that all data values stored in a specified column are unique.
The UNIQUE constraint differs from the PRIMARY KEY constraint in which it permits NULL values.
CHECK Ensures in which a specified condition is true before the data value is added to a table. For example, an order's ship date cannot be previous than its order date.

NOT NULL Ensures in which a specified column cannon contain a NULL value. The NOT NULL constraint can just be created along with the column-level approach to table creation.

Prevents the DROP from taking place if any dependent objects exists (RESTRICT) or causes all dependent objects do also be dropped (CASCADE).


Related Discussions:- Explain cascade and restrict clauses of drop schema command

Develop a cards website, Project Description: I want to build a card pla...

Project Description: I want to build a card playing Website. The user should be able to 1. Login. 2. Have profile access. 3. Put money into the site. 4. Selects t

Write short notes on relational constraints, Write short notes on relationa...

Write short notes on relational constraints? Relational Constraints are: 1. NOT NULL 2. Unique 3. Primary key 4. Foreign key 5. Table check

What is dbms and what are functions of dbms, What is DBMS and what are func...

What is DBMS and what are functions of DBMS? DBMS consist of collection of integrated data and set of program to admission those data. The functions performed by a typical

Example-revoke all on emp from mca12, Example:  //REVOKE ALL ON EMP FROM MC...

Example:  //REVOKE ALL ON EMP FROM MCA12;                              (All permissions will be cancelled) You can also cancel only some of the permissions. Drop: A user-

Replicating data, Replicating Data One approach that may support effici...

Replicating Data One approach that may support efficient access to dissimilar applications as above may be to give access to every of the applications from dissimilar replicate

What is candidate key, What is candidate key? Candidate Key - A candi...

What is candidate key? Candidate Key - A candidate key of an entity set is a minimal superkey, which uniquely identifies each row in the relation.

State the step- implement software control designer, Implementing software ...

Implementing software control To implement software control designer must redesign strategy of state event model which is present in dynamic model. There are three basic ap

Which two files are used during operation of the dbms, Which two files are ...

Which two files are used during operation of the DBMS? Data dictionary and transaction log are two files used during operation of the DBMS.

What is icr, What is ICR? A. ICR (Intelligent Character Recognition) is...

What is ICR? A. ICR (Intelligent Character Recognition) is a technology that gives scanning and imaging systems the ability to identify images of hand-printed or script charact

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd