Modify - referential integrity, Database Management System

Assignment Help:

Update or Modify operation alters the existing values. If these operations alter the value that is the foreign key also, the only check need is the similar as that of the Insert operation.

What should happen to an try to update a candidate key that is the objective of a foreign key reference? For instance, an attempt to update the PROJID "LG" for which there exists at least one matching ASSIGNMENT tuple? In common there are the similar possibilities as for DELETE operation:

RESTRICT: The update operation is "restricted" to the case where there are not matching assignment tuples. (it is rejected otherwise).

CASCADE - The update operation "cascades" to update the foreign key in those matching assignment tuples also.


Related Discussions:- Modify - referential integrity

What are the advantages of dbms, What are the advantages of DBMS ? 1. ...

What are the advantages of DBMS ? 1. Centralized Management and Control - One of the major advantages of using a database system is in which the organization could exert, thr

What is the need of a log in a dbms, What is the need of a log in a DBMS? B...

What is the need of a log in a DBMS? Briefly describe the various types of records that are normally present in a log.            Ans:  The system log, which is generally writt

I need erp system, I need ERP system We are selling automotive spare par...

I need ERP system We are selling automotive spare parts on the internet and we require ERP software, which would sync with our e-shop. Our e-shop doesn't use any e-commerce plat

On laod, how to write a in a text and load it on mysql

how to write a in a text and load it on mysql

What is deadlock, What is deadlock? How can it be avoided? How can it be re...

What is deadlock? How can it be avoided? How can it be resolved once it occurs? Deadlock happens when two transactions are each waiting on a resource that the other transaction

Linear commit protocol, With the linear commit protocol, sites are connecte...

With the linear commit protocol, sites are connected in a chain, and the subtransaction at the left-hand end of the chain initiates the protocol. Propose a crash recovery protocol

I need web security expert, I need web security expert , website management...

I need web security expert , website management Project Description: i want professional for the below . website management server management database management

Why we use delegation to share implementation, Use Delegation to Share Impl...

Use Delegation to Share Implementation The delegation " Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to

Explain the functions trim-length-count in oracle, Explain the following fu...

Explain the following functions of Oracle with suitable examples: (i) To_Char( ) (ii) Count( ) (iii) Trim( ) (iv) Length( ) Ans: (i) To_char( ): The TO_CHAR function conver

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd