Explain different types of keys and relational model., Database Management System

Assignment Help:

Relational Model: The relational model uses a collection of tables to represent both data and the relationships among those data. Each table has multiple columns and each column has a unique name. Figure presents a sample relational database comprising three tables: One shows details of bank customer, the second shows accounts belong to which customers. The relational is an example of a record based model. Record based models are so named because the database is structured in fixed format records of several types. Each table contains of a particular types. Each types defines a fixed number of fields or attributes. The relational data model is the most widely used data model, and a vast majority of current database systems are based on the relational model. The relational model is at a lower level of abstractions than the E-R model.

Other Data Models: The object- oriented data model is another data model that has seen increasing attention. The object- oriented model can be seen as extending the E-R model with notions of encapsulation, methods, and object identity. Historically, two other data models, the network data model and the hierarchical data model, preceded the relation of data model. These models were tied closely to the underlying implementation, and complicated the task of modeling data. Semi structured data models permit the specification of data where indivisible data items of the same type may have different sets of attributes. This is in contrast with the data models mentioned earlier, where every data item of a particular type must have the same set of attributes. The extensible markup language (XML) is widely used to represent semi- structured data.

Keys:

Superkey: It is a set of one or more attributes that taken collectively; allow us to identify an entity set. Candidate key: Superkeys from which no proper subset is a superkey. Such minimal superkeys are called candedate keys.

Primary key: Allows us to distinguish between different entities of set. It must be chosen s.t. its attributes are never or rarely changed.

Foreign Key: When relation schema say r1may include among its attributes the primary key of another relation schema say r2. This attribute is called foreign key from r1, referencing r2, we sometimes define a primary key and sometimes not but there also candidate key will exist. Two attributes taken together can make a key called as composite primary key.


Related Discussions:- Explain different types of keys and relational model.

Explain controlled redundancy, Explain controlled redundancy? Controll...

Explain controlled redundancy? Controlled redundancy : The replication of data within the data warehouse for the purposes of improved data access or understand ability.

Develop and evaluate partial systems, Part 1: Security Plan Consider th...

Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how

Clustering indexes, Clustering Indexes It may be an excellent idea to k...

Clustering Indexes It may be an excellent idea to keep data of the students in the order of the programme they have registered as most of the data file accesses may need studen

Explain derived and non-derived attribute, Explain Derived and Non-Derived ...

Explain Derived and Non-Derived Attribute? In few cases, two or more attribute values are related, for instance, Age and BirthDate attributes of a person. For specific person e

Define view? how it is related to data independence, A View may be defi...

A View may be defined of as a virtual table, that is, a table that does not really exist in its own right but is instead inferred from one or more underlying base data table. T

Discuss the different layers of ansi sparc architecture, Q.1 Briefly discus...

Q.1 Briefly discuss the different layers of ANSI SPARC architecture. Ans: The three layers of ANSI SPARC architecture are like this: 1. Internal view is at the lowest leve

Explain the integrity constraints, Explain the integrity constraints: Not N...

Explain the integrity constraints: Not Null,  Unique, Primary Key with an example each. Is the combination 'Not Null, Primary Key' a valid combination. Justify. Not Null - Shou

Explain the deadlock avoidance, Define deadlock avoidance. An alternat...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s

Describe disk manager and their work, Describe disk manager and their work?...

Describe disk manager and their work? Disk Manager: Responsible for fetching data regulated through file Manager from disk storage within Main memory and deciding what data to

File organization, what is file organization? what are file organization te...

what is file organization? what are file organization techniques.explain in detail? explain random file organization technique, multikey file organization technique?what is indexin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd