Referential integrity, Database Management System

Assignment Help:

It can be easily defined as:

The database must not have any unmatched foreign key values.

The term "unmatched foreign key value" means a foreign key value for which there does not exist a matching value of the relevant candidate key in the relevant target (referenced) relation. For instance, any value existing in the EMPID attribute in ASSIGNMENT relation must be in the EMPLOYEE relation. That is, the only EMPIDs that can be in the EMPLOYEE relation are 101, 102 and 103 for the instance / present state of the database given in Figure. If we want to insert a tuple with EMPID value 104 in the ASSIGNMENT relation, it will cause violation of referential integrity constraint. Logically it is very obvious after all the employee 104 does not be, so how can s/he be assigned any work.


Related Discussions:- Referential integrity

What is advantage of two-way association, What is advantage of two-way asso...

What is advantage of two-way association? Two-way association advantages are following: a) Independent of the classes. b) Useful for existing predefined classes that are

Define the term- making common behaviour abstract, Making Common Behaviour ...

Making Common Behaviour Abstract Let us define abstraction "Abstraction means to focus on the necessary, inherent aspects of an entity and ignoring its accidental features". O

What is first normal form, What is first normal form? The domain of att...

What is first normal form? The domain of attribute must contain only atomic (simple, indivisible) values.

Relational declarative database language environment, Server Control It ...

Server Control It is usual to control access to the data via the front end application, for example by displaying data as ‘read only'. This part of the assignment illustrates ho

Define hash files organization, Define Hash files organization a. Hashi...

Define Hash files organization a. Hashing includes computing the address of a data item by calculating a function on the search key value.   b. A hash function h is a functi

Explain thomas write rule, Explain Thomas' Write rule.  Show how it is diff...

Explain Thomas' Write rule.  Show how it is different from timestamp ordering protol Ans: In timestamp-based concurrency control the thomas Write rule is a rule. Given a Timest

I want a professional with strong it background, I want a professional with...

I want a professional with strong IT background who provide me timely assignments Project Description: I want a professional who can do my assignments for my major i.e. Infor

Explain two phase locking protocol, Explain Two phase locking protocol ...

Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra

Define the query optimisation, Define the Query optimisation The query ...

Define the Query optimisation The query parser commonly generates a standard initial tree to correspond to an SQL query, with no doing any optimization. Such type of a canonica

User error-database errors, User error :  This contains errors in the progr...

User error :  This contains errors in the program (e.g., Logical errors) with errors made by online users of database.  These types of errors can be avoided by applying some check

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd