Preview

Data Integrity

Satisfactory Essays
Open Document
Open Document
500 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Integrity
Types of Data Integrity
This section describes the rules that can be applied to table columns to enforce different types of data integrity.

Null Rule
A null rule is a rule defined on a single column that allows or disallows inserts or updates of rows containing a null (the absence of a value) in that column.

Unique Column Values
A unique value rule defined on a column (or set of columns) allows the insert or update of a row only if it contains a unique value in that column (or set of columns).

Primary Key Values
A primary key value rule defined on a key (a column or set of columns) specifies that each row in the table can be uniquely identified by the values in the key.

Referential Integrity Rules
A referential integrity rule is a rule defined on a key (a column or set of columns) in one table that guarantees that the values in that key match the values in a key in a related table (the referenced value).

Referential integrity also includes the rules that dictate what types of data manipulation are allowed on referenced values and how these actions affect dependent values. The rules associated with referential integrity are:

•Restrict: Disallows the update or deletion of referenced data.

•Set to Null: When referenced data is updated or deleted, all associated dependent data is set to NULL.

•Set to Default: When referenced data is updated or deleted, all associated dependent data is set to a default value.

•Cascade: When referenced data is updated, all associated dependent data is correspondingly updated. When a referenced row is deleted, all associated dependent rows are deleted.

•No Action: Disallows the update or deletion of referenced data. This differs from RESTRICT in that it is checked at the end of the statement, or at the end of the transaction if the constraint is deferred. (Oracle uses No Action as its default action.)

Complex Integrity Checking
Complex integrity checking is a user-defined rule for a column (or set of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Garden Glory chapter 1

    • 824 Words
    • 4 Pages

    Adding value: For example, if we want to add a data for a customer but we don’t want to add property data. In this case we will unable to capture the data of those owners whose property data is not available or we don’t want to keep their data.…

    • 824 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Database concepts

    • 586 Words
    • 3 Pages

    In Database Management System, a transitive dependency is a functional dependency which holds by virtue of transitivity. A transitive dependency can occur only in a relation that has three or more attributes. Let A, B, and C designate three distinct attributes (or distinct collections of attributes) in the relation. Suppose all three of the following conditions hold:…

    • 586 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Referential Integrity exists when every foreign key relates to an existing primary key. There are no orphan records in child tables that have no reference in a parent table.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    13 T | A transient dependency is where an attribute depends on another attribute for its meaning and not on the key.…

    • 313 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    07

    • 4772 Words
    • 25 Pages

    5) The SQL keyword CONSTRAINT is used in conjunction with the SQL keywords PRIMARY KEY and FOREIGN KEY.…

    • 4772 Words
    • 25 Pages
    Good Essays
  • Good Essays

    Anime LIst

    • 11441 Words
    • 52 Pages

    Which of the following defines a relationship in which each occurrence of data in one entity…

    • 11441 Words
    • 52 Pages
    Good Essays
  • Satisfactory Essays

    Entity-relationship Model

    • 411 Words
    • 2 Pages

    12. Linking Entities- Linking entities are used to resolve many-to-many relationships into two one-to-many relationships.…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Note. A key is a unique identifier that distinguishes rows within a database table. To view examples, please refer to your text.…

    • 103 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    Data independence, it exists when we were able to change the database structure or characteristics without affecting the…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Validation rules are very important for databases, they provide error reports for the user, an example would be a telephone number being only 11 characters.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Candidate keys are keys that uniquely identify each row in a relation. They can be single or composite. The primary key is the candidate key that is chosen as the key that the DBMS…

    • 805 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    04

    • 4586 Words
    • 34 Pages

    Constraints are used to ensure the accuracy and integrity of the data contained in the database.…

    • 4586 Words
    • 34 Pages
    Satisfactory Essays
  • Good Essays

    Assingment2

    • 906 Words
    • 3 Pages

    2. List at least four basic rules for identifying primary keys in a relational database. Mention how you would go about identifying the foreign keys in your design. Briefly discuss foreign key ownership and how to indicate a foreign key in your relational database model.…

    • 906 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment

    • 80 Words
    • 1 Page

    In the unit 1 assignment, we defined the relations and keys for a library system. In unit 2 we learned about constraints. For your unit 2 assignment, identify and describe the constraints that would be appropriate for the relations that we have within our library system. Constraints that you should consider may include:…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 204 Quiz

    • 2478 Words
    • 10 Pages

    You follow certain step’s to access the supplementary readings for a course when u sing your organizations library management system. These steps that you follow are examples of the _________ components of an information system.…

    • 2478 Words
    • 10 Pages
    Satisfactory Essays

Related Topics