Referential integrity, Database Management System

Assignment Help:

It can be easily defined as:

The database must not have any unmatched foreign key values.

The term "unmatched foreign key value" means a foreign key value for which there does not exist a matching value of the relevant candidate key in the relevant target (referenced) relation. For instance, any value existing in the EMPID attribute in ASSIGNMENT relation must be in the EMPLOYEE relation. That is, the only EMPIDs that can be in the EMPLOYEE relation are 101, 102 and 103 for the instance / present state of the database given in Figure. If we want to insert a tuple with EMPID value 104 in the ASSIGNMENT relation, it will cause violation of referential integrity constraint. Logically it is very obvious after all the employee 104 does not be, so how can s/he be assigned any work.


Related Discussions:- Referential integrity

Give an example of operations from the state actions, Give an example of op...

Give an example of operations from the State Actions and Activities. For instance, in bank the activity verify account code and verify password

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Equijoin, When every condition appears with equality condition (=) only. c)...

When every condition appears with equality condition (=) only. c)   Natural join (denoted by R*S) When two join attributes have the similar name in both relations. (Tha

Illustrate the definition of the classes and operation, The definition of t...

The definition of the classes and operation can often be adjusted to increase the amount of inheritance". Justify the above statement.   Adjustment of Inheritance The def

Explain physical and logical independence, Define Physical and Logical inde...

Define Physical and Logical independence  Ans: Physical data independence: The ability to modify physical level without causing application program to be rewritten. Logic

What are uncommitted modifications, What are uncommitted modifications? ...

What are uncommitted modifications? The immediate-modification technique permits database modifications to be output to the database whereas the transaction is still in the act

Recovery management component, Ask question #Minim 100 words accepted#what ...

Ask question #Minim 100 words accepted#what is recovery management component in database management system and how it is useful

Use inheritance as an implementation technique, Use inheritance as an imple...

Use inheritance as an implementation technique when you are going to use inheritance as an implementation technique, you can achieve same goal in a safer way by making one cla

Extended star schema, Northwind Pty Ltd sells a variety of food products th...

Northwind Pty Ltd sells a variety of food products throughout the world. They want to use the reporting features of SAP''s Business Information Warehouse to better understand thei

Which is another name for weak entity, Which is another name for weak entit...

Which is another name for weak entity? Child is another name of weak entity.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd