Explain cascade and restrict clauses of drop schema command, Database Management System

Assignment Help:

Explain several types of constraints that can be specified using CREATE TABLE command. Explain CASCADE and RESTRICT clauses of DROP SCHEMA command?

Constraint Description
PRIMARY KEY Determines that column(s) uniquely identifies each record. The primary key cannot be NULL, and the data value(s) must be unique.

FOREIGN KEY In a one-to-many relationship, the constraint is added to the "many" table. The constraint ensures which if a value is entered into a specified column, it must already exist in the "one" table, or the record is not added.

UNIQUE Ensures that all data values stored in a specified column are unique.
The UNIQUE constraint differs from the PRIMARY KEY constraint in which it permits NULL values.
CHECK Ensures in which a specified condition is true before the data value is added to a table. For example, an order's ship date cannot be previous than its order date.

NOT NULL Ensures in which a specified column cannon contain a NULL value. The NOT NULL constraint can just be created along with the column-level approach to table creation.

Prevents the DROP from taking place if any dependent objects exists (RESTRICT) or causes all dependent objects do also be dropped (CASCADE).


Related Discussions:- Explain cascade and restrict clauses of drop schema command

When are two schedules said to be view equivalent, When are two schedules s...

When are two schedules said to be view equivalent?     Ans: Two schedules that is denoted as S and S' are said to be view equivalent if the subsequent three conditions are met

Use inheritance as an implementation technique, Use inheritance as an imple...

Use inheritance as an implementation technique when you are going to use inheritance as an implementation technique, you can achieve same goal in a safer way by making one cla

Create table, What are the advantages of creating a table from existing tab...

What are the advantages of creating a table from existing table?

Create table to evaluating websites-reasoning, Have a look around the site,...

Have a look around the site, and at some of the sites they have featured. These are all examples of bad design, and also offer an explanation about why they fall into this category

Why are cursors necessary in embedded sql, Why are cursors necessary in emb...

Why are cursors necessary in embedded SQL? A cursor is an object used to store the output of a query for row-by-row processing through the application programs. SQL statements

What is a sub-query, (a) What is a Sub-Query? (b) What is the differen...

(a) What is a Sub-Query? (b) What is the difference between a scalar sub-query and a tabular sub-query? (c) Write an equivalent SQL statement to get the Name of Product wh

Create a view that finds the student name, Section A:  Use the following ta...

Section A:  Use the following tables to create a database called College.  Use SQL commands. Student stuid(primary) lastName firstName

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

Data warehousing and business intelligence, I need help with data warehousi...

I need help with data warehousing and business intelligence course project about designing a data warehouse for a jewelry company that does not have one

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd