Explain different types of keys and relational model., Database Management System

Assignment Help:

Relational Model: The relational model uses a collection of tables to represent both data and the relationships among those data. Each table has multiple columns and each column has a unique name. Figure presents a sample relational database comprising three tables: One shows details of bank customer, the second shows accounts belong to which customers. The relational is an example of a record based model. Record based models are so named because the database is structured in fixed format records of several types. Each table contains of a particular types. Each types defines a fixed number of fields or attributes. The relational data model is the most widely used data model, and a vast majority of current database systems are based on the relational model. The relational model is at a lower level of abstractions than the E-R model.

Other Data Models: The object- oriented data model is another data model that has seen increasing attention. The object- oriented model can be seen as extending the E-R model with notions of encapsulation, methods, and object identity. Historically, two other data models, the network data model and the hierarchical data model, preceded the relation of data model. These models were tied closely to the underlying implementation, and complicated the task of modeling data. Semi structured data models permit the specification of data where indivisible data items of the same type may have different sets of attributes. This is in contrast with the data models mentioned earlier, where every data item of a particular type must have the same set of attributes. The extensible markup language (XML) is widely used to represent semi- structured data.

Keys:

Superkey: It is a set of one or more attributes that taken collectively; allow us to identify an entity set. Candidate key: Superkeys from which no proper subset is a superkey. Such minimal superkeys are called candedate keys.

Primary key: Allows us to distinguish between different entities of set. It must be chosen s.t. its attributes are never or rarely changed.

Foreign Key: When relation schema say r1may include among its attributes the primary key of another relation schema say r2. This attribute is called foreign key from r1, referencing r2, we sometimes define a primary key and sometimes not but there also candidate key will exist. Two attributes taken together can make a key called as composite primary key.


Related Discussions:- Explain different types of keys and relational model.

Dealing with constraints violation, If the deletion violates referential in...

If the deletion violates referential integrity constraint, then three alternatives are available: Default option: - refuse the deletion. It is the job of the DBMS to describ

Briefly describe concurrency execution, Briefly describe concurrency execut...

Briefly describe concurrency execution? Lock - based protocols Locks There are several modes in which a data item may be locked in this section we restrict our attention

Er diatgrams, Ask q“A database will be made to store information about pati...

Ask q“A database will be made to store information about patients in a hospital. On arrival, each patient’s personal details (name, address, and telephone number) are recorded wher

Back up files, what is the importance of back up files

what is the importance of back up files

Differences between structured data and unstructured data, Explain the diff...

Explain the differences between structured data and unstructured data. Structured data are facts concerning objects and events. The most significant structured data are numeric

Security and integrity, Security And Integrity After Reading the concep...

Security And Integrity After Reading the concepts of database recovery in the last section, let us now deal with a vital concept that helps in minimizing consistency errors in

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

Fragmentation, let us consider a table having 2200 records and the fixed si...

let us consider a table having 2200 records and the fixed size of the table to be considered as 25.then how many numbers of table is requredto perform horizontal fragmentation

What is a cascading update, What is a cascading update? Referential int...

What is a cascading update? Referential integrity constraints needs that foreign key values in one table correspond to primary key values in another. If the value of the primar

Explain trigger, Explain trigger? Trigger: A database trigger is proc...

Explain trigger? Trigger: A database trigger is procedural code which is automatically executed within response to certain events on a particular table in a database. Trigger

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd