List two restrictions that are applied on the modification, Database Management System

Assignment Help:

List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view. 

Ans: The two restrictions are:

1. If a view does not consist of primary key and/or at least one of the attributes along with the NOT NULL constraint which do not have default values specified, is not updatable. This restriction is needed because if we are inserting any row in the view than all attributes not included in view of the base relation are will be denoted by the NULLs if any default value is not specified. In this type of case, if any attribute is set as NOT NULL or primary key, then it should not be NULL, and the insertion will be violating the constraints.

2. If a view defined by using grouping and/or aggregate functions, is not updatable. This restriction is also needed because, if we want to modify the base relation by view then we are not in the position to identify that tuple(s) will be modified in the group in what way.


Related Discussions:- List two restrictions that are applied on the modification

Computer, 1. Will you advise that your organization uses open source softwa...

1. Will you advise that your organization uses open source software and why? 2. Why is it important for business managers to have a basic understanding of the software development

What is gathering information and producing erd, What is Gathering informat...

What is Gathering information and Producing ERD Gathering information: This could be a written document that explains the system in question with reasonable quantity of detai

What is the function of sql server agent windows service, What is the funct...

What is the function of SQL Server Agent Windows service? - It's a Windows service that handles tasks scheduled within SQL Server environment. These tasks are also known as job

Define shared locks, Define Shared locks? Ans: Shared lock: Throughout ...

Define Shared locks? Ans: Shared lock: Throughout concurrent execution of transactions, earlier than a transaction can access a data item, it has to obtain a lock on it. Now he

Explain the systems development life cycle, Explain the systems development...

Explain the systems development life cycle. This is the traditional method to develop, maintain, and replace information systems that contains the project identification and se

What is functional dependency, What is Functional Dependency? A Functi...

What is Functional Dependency? A Functional dependency is shown by X Y among two sets of attributes X and Y that are subsets of R specifies a constraint on the possible tuple

What do you understand by data ware house, Question 1: Define the term ...

Question 1: Define the term business intelligence tools? Briefly explain how the data from one end gets transformed into information at the other end? Definition Exp

Define integrity, (a) Explain briefly the three parts of a relational Model...

(a) Explain briefly the three parts of a relational Model. (b) Contrast the following terms with an appropriate example: (i) stored attribute v/s derived attribute (ii) en

Explain weak and strong entity sets, Explain weak and strong entity sets? ...

Explain weak and strong entity sets? Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that k

DSS, WHAT IS DSS? WRITE ITS REQUIREMENTS.

WHAT IS DSS? WRITE ITS REQUIREMENTS.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd