Introduction to the Relational Model

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to the Relational Model Today… § Relational Data Model- Definitions CS 2451 • High level concepts • We discuss how these are implemented in SQL Database Systems: More details when we cover SQL Relational Data Model § Front end tools – HTML/CSS/… § Next class - start with formal query languages before moving to SQL http://www.seas.gwu.edu/~bhagiweb/cs2541 Spring 2020 Instructor: Dr. Bhagi Narahari & R. Leontie Based on slides © Ramakrishnan&Gerhke, R. Lawrence 1 2 Database “People” – i.e., roles Some Terminology § There are several types of database ‘personnel’: § Database: • Database administrator (DBA) - responsible for installing, • A collection of related data. maintaining, and configuring the DBMS software. § Data: • Known facts that can be recorded and have an implicit meaning. o gets paid the big bucks ! § Mini-world: • Data administrator (DA) - responsible for organizational policies on data creation, security, and planning. • Some part of the real world about which data is stored in a database. For example, student grades and transcripts at a university. • Gets to be on the hot seat if data leaks happen.. § Database Management System (DBMS): • Database designer - defines and implements a schema for a • A software package/ system to facilitate the creation and maintenance database and associated applications. of a computerized database. Logical/Conceptual database designer - interacts with users to Example: MySQL, Oracle, MongoDB YOU determine data requirements, constraints, and business rules. § Database System: Physical database designer - implements the logical design for a • The DBMS software together with the data and (usually) the data model on a DBMS. Defines indexes, security, and constraints. applications • DBMS developer - writes the DBMS software code. • Application developer - writes code that uses the DBMS. • User - uses the database directly or through applications. 3 4 1 How will your database system be architected: Recent Developments Three-Tier Client-Server Architecture (Recent in my timeline J ) n Social Networks started capturing a lot of information about Tier 1: Client (Web/mobile) people and their communications (tweets, photos, videos..) •User Interface (using HTML/CSS) n - Facebook, Twitter, Linked-In,…. n All of the above constitutes data Tier 2: Application Server •Business logic – written using PHP n Search Engines: Google, Bing, Yahoo : collect their own •Data processing logic repository of web pages for searching purposes Database § New Technologies emerging to manage vast amounts of Tier 3: Database Server data generated on the web: •Data storage/management •Using MySQL • Big Data storage systems involving large clusters • NOSQL (Not Only SQL) systems • A large amount of data now resides on the “cloud” which means it is in huge data centers using thousands of machines. 5 6 Data Models..more definitions More terminology..Levels of Data Models § Data Model: § Conceptual (high-level, semantic) data models: • A formal framework to describe the data and structure, • Provide concepts that are close to the way many users constraints, of a database, and perceive data. • the operations for manipulating these structures § Logical level: • Constructs used to define the database structure • Provide concepts used by DBMS implementations • *In earlier definition we mixed conceptual and logical Data types, format (table),…ex: name is a char string § Physical (low-level, internal) data models: § Constraints: • details of how data is stored in the DBMS/computer. • Constraints specify some restrictions on valid data; these • These are usually specified in an ad-hoc manner through constraints must be enforced at all times..ex: GWID is unique DBMS design and administration manuals § Data Model Operations: § Self-Describing Data Models: • These operations are used for specifying database retrievals and • Combine the description of data with the data values. updates by referring to the constructs of the data model. Examples include JSON/XML, key-value stores and some Ex: find student name with GWID= abcd NOSQL systems. 7 8 2 Conceptual Data Model: The Entity-Relationship ( ER) Model Example: ER Design for mini-banner: § Provide database design that is easy to interpret by a wide Entities = Professors, Students, Courses class of users Relationship between entities • Not just database/CS experts fid PROFESSOR name • You want to provide a design to a “client” using a representation they can understand “Who’s taking what, and what grade do they § What’s a natural way to provide an easy to interpret expect?” representation…. Teaches • Fill in the blanks: A ________ is worth a thousand words STUDENT COURSE § “Visual” representation of the data, how it interacts, Takes constraints, etc. • And can be automatically mapped to a data model (relational) sid name exp-grade cid subj semester § ER-Model is one such data model One picture provides info on what your system stores and models • We will return to it after we cover the relational model UML anyone ? 9 10 Some more terminology….. Schemas versus Instances Database Schema for a COMPANY § Similar to types and variables in programming languages Database § Database Schema: structure of the database • The description of a database. • Includes descriptions of the database structure, data types, and the constraints on the database. • Schema Diagram: illustrative display of a database schema. § Database instance/state: actual data (content) stored in a database at a particular moment in time • Initial state: when database is loaded • Valid state: A state that satisfies the structures and constraints of the database… job of DBMS to ensure valid entries • The database schema changes very infrequently. Preferably never • The database state changes every time the database is updated. 11 12 3 Example of a Database Schema Populated database state/instance for COMPANY 13 14 History of Data Models Example Instance & Schema § Network Model STUDENT Takes COURSE § Hierarchical Model sid name sid exp-grade cid cid subj sem § Relational Model 1 Ross 1 A 550-0103 550-0103 DB S13 2 Lee 1 A 700-1003 700-1003 AI S13 § Object-oriented Data Models 3 Emily 3 C 500-0103 500-0103 Arch F12 • Object-Relational Models § NoSQL/ Big Data technologies PROFESSOR Teaches • Schema-less designs fid name fid cid § Our focus now: relational schema – set 1 Wood 1 550-0103 of tables 2 Heller 2 700-1003 § Can have other kinds of 8 Narahari 8 500-0103 schemas – XML, object, … Slide 2- 16 15 16 4 History of Data Models Next: Relational Model Concepts § Network Model: § The relational Model of Data is based on the concept of a • Network of records Relation • The first network DBMS implemented by Honeywell in 1964-65 • The strength of the relational approach to data management • Can model complex relationships between records i.e., graphs! comes from the formal foundation provided by the theory of § Hierarchical Model: relations • First implemented by IBM and Rockwell Intl. 1965 (?) § start with review of essentials of the formal relational model • Hierarchical network of records (trees like) • Abstract view of an Org Chart – models hierarchy in the data § In practice, there is a standard model based on SQL § Query language: COBOL • Hear about the Y2K bug/problem ? § Note: There are several important differences between the § Disadvantages: formal model and the practical model • Database contains complex set of pointers that thread through sets • And, there are variations in SQL features provided on different DBMS of records systems Little scope for “query optimization”, Procedural nature of processing Oracle SQL, MySQL, MS-SQL,… Do you like working with pointers ? J 17 18 Why Did It Take So Many Years to Implement Relational Model Concepts Relational Databases? § The model was introduced by Dr. E.F. Codd of IBM Research in 1970 § Codd’s original work: 1969-70 "A Relational Model for Large Shared Data Banks," Communications § Earliest relational database research: ~1976 of the ACM, June 1970 § Commercial Relational DBMSs: ~mid 1980s Describes the data minimally and mathematically – A relation describes an association between data items – tuples with § Widespread deployment” mid-1990’s attributes § Why the gap? Top 10 reasons… Uses standard mathematical (logical) operations over the data – 1. “You could do the same thing in other ways” relational algebra or relational calculus 2. “Nobody wants to write math formulas” § It contributed: data independence, query languages, query 3. “Why would I turn my data into tables?” optimization 4. “It won’t perform well” § The above paper caused a major revolution in the field of 5. … database management and earned Dr. Codd the coveted § What do you think? ACM Turing Award 19 20 5 Relational Model Definitions Example of a Relation § A relation is a table with columns and rows. § An attribute is a named column of a relation. § A tuple is a row of a relation. § A domain is a set of allowable values for one or more attributes. § The degree of a relation is the number of attributes it contains. § The cardinality of a relation is the number of tuples it contains. § A relational database is a collection of normalized relations with distinct relation names. Degree= 7, Cardinality = 5 21 22 Relational Model: Formal Definition Relation Schemas and Instances § Formally, a table is a relation over K sets (domains) § A relation schema is a definition of a single relation. • R Í A1 × A2 …. × AK Subset of the cartesian product of the K domains § A database schema is a set of relation schemas (modeling a particular domain). • Tuple= (t1,t2,…,tK), where ti Î Ai § A relation instance denoted r(R) over a relation schema R(A1, A2, …, § A database is a collection of relations An) is subset of the Cartesian product of the domains of all attributes in § Theoretically: a relation is a set of tuples; no tuple can occur the relation schema more than once § r(R) Í dom(A1) ´ dom(A2) ´ … ´ dom(An) • Real systems may allow duplicates for efficiency or other reasons – • i.e., a set of n-tuples <d1, d2, ..., dn> where each di is an element of we’ll ignore this for now dom(Ai) or is null.
Recommended publications
  • Foreign(Key(Constraints(
    Foreign(Key(Constraints( ! Foreign(key:(a(rule(that(a(value(appearing(in(one(rela3on(must( appear(in(the(key(component(of(another(rela3on.( – aka(values(for(certain(a9ributes(must("make(sense."( – Po9er(example:(Every(professor(who(is(listed(as(teaching(a(course(in(the( Courses(rela3on(must(have(an(entry(in(the(Profs(rela3on.( ! How(do(we(express(such(constraints(in(rela3onal(algebra?( ! Consider(the(rela3ons(Courses(crn,(year,(name,(proflast,(…)(and( Profs(last,(first).( ! We(want(to(require(that(every(nonLNULL(value(of(proflast(in( Courses(must(be(a(valid(professor(last(name(in(Profs.( ! RA((πProfLast(Courses)((((((((⊆ π"last(Profs)( 23( Foreign(Key(Constraints(in(SQL( ! We(want(to(require(that(every(nonLNULL(value(of(proflast(in( Courses(must(be(a(valid(professor(last(name(in(Profs.( ! In(Courses,(declare(proflast(to(be(a(foreign(key.( ! CREATE&TABLE&Courses&(& &&&proflast&VARCHAR(8)&REFERENCES&Profs(last),...);& ! CREATE&TABLE&Courses&(& &&&proflast&VARCHAR(8),&...,&& &&&FOREIGN&KEY&proflast&REFERENCES&Profs(last));& 24( Requirements(for(FOREIGN(KEYs( ! If(a(rela3on(R(declares(that(some(of(its(a9ributes(refer( to(foreign(keys(in(another(rela3on(S,(then(these( a9ributes(must(be(declared(UNIQUE(or(PRIMARY(KEY(in( S.( ! Values(of(the(foreign(key(in(R(must(appear(in(the( referenced(a9ributes(of(some(tuple(in(S.( 25( Enforcing(Referen>al(Integrity( ! Three(policies(for(maintaining(referen3al(integrity.( ! Default(policy:(reject(viola3ng(modifica3ons.( ! Cascade(policy:(mimic(changes(to(the(referenced( a9ributes(at(the(foreign(key.( ! SetLNULL(policy:(set(appropriate(a9ributes(to(NULL.(
    [Show full text]
  • ACS-3902 Ron Mcfadyen Slides Are Based on Chapter 5 (7Th Edition)
    ACS-3902 Ron McFadyen Slides are based on chapter 5 (7th edition) (chapter 3 in 6th edition) ACS-3902 1 The Relational Data Model and Relational Database Constraints • Relational model – Ted Codd (IBM) 1970 – First commercial implementations available in early 1980s – Widely used ACS-3902 2 Relational Model Concepts • Database is a collection of relations • Implementation of relation: table comprising rows and columns • In practice a table/relation represents an entity type or relationship type (entity-relationship model … later) • At intersection of a row and column in a table there is a simple value • Row • Represents a collection of related data values • Formally called a tuple • Column names • Columns may be referred to as fields, or, formally as attributes • Values in a column are drawn from a domain of values associated with the column/field/attribute ACS-3902 3 Relational Model Concepts 7th edition Figure 5.1 ACS-3902 4 Domains • Domain – Atomic • A domain is a collection of values where each value is indivisible • Not meaningful to decompose further – Specifying a domain • Name, data type, rules – Examples • domain of department codes for UW is a list: {“ACS”, “MATH”, “ENGL”, “HIST”, etc} • domain of gender values for UW is the list (“male”, “female”) – Cardinality: number of values in a domain – Database implementation & support vary ACS-3902 5 Domain example - PostgreSQL CREATE DOMAIN posint AS integer CHECK (VALUE > 0); CREATE TABLE mytable (id posint); INSERT INTO mytable VALUES(1); -- works INSERT INTO mytable VALUES(-1); -- fails https://www.postgresql.org/docs/current/domains.html ACS-3902 6 Domain example - PostgreSQL CREATE DOMAIN domain_code_type AS character varying NOT NULL CONSTRAINT domain_code_type_check CHECK (VALUE IN ('ApprovedByAdmin', 'Unapproved', 'ApprovedByEmail')); CREATE TABLE codes__domain ( code_id integer NOT NULL, code_type domain_code_type NOT NULL, CONSTRAINT codes_domain_pk PRIMARY KEY (code_id) ) ACS-3902 7 Relation • Relation schema R – Name R and a list of attributes: • Denoted by R (A1, A2, ...,An) • E.g.
    [Show full text]
  • Referential Integrity in Sqlite
    CS 564: Database Management Systems University of Wisconsin - Madison, Fall 2017 Referential Integrity in SQLite Declaring Referential Integrity (Foreign Key) Constraints Foreign key constraints are used to check referential integrity between tables in a database. Consider, for example, the following two tables: create table Residence ( nameVARCHARPRIMARY KEY, capacityINT ); create table Student ( idINTPRIMARY KEY, firstNameVARCHAR, lastNameVARCHAR, residenceVARCHAR ); We can enforce the constraint that a Student’s residence actually exists by making Student.residence a foreign key that refers to Residence.name. SQLite lets you specify this relationship in several different ways: create table Residence ( nameVARCHARPRIMARY KEY, capacityINT ); create table Student ( idINTPRIMARY KEY, firstNameVARCHAR, lastNameVARCHAR, residenceVARCHAR, FOREIGNKEY(residence) REFERENCES Residence(name) ); or create table Residence ( nameVARCHARPRIMARY KEY, capacityINT ); create table Student ( idINTPRIMARY KEY, firstNameVARCHAR, lastNameVARCHAR, residenceVARCHAR REFERENCES Residence(name) ); or create table Residence ( nameVARCHARPRIMARY KEY, 1 capacityINT ); create table Student ( idINTPRIMARY KEY, firstNameVARCHAR, lastNameVARCHAR, residenceVARCHAR REFERENCES Residence-- Implicitly references the primary key of the Residence table. ); All three forms are valid syntax for specifying the same constraint. Constraint Enforcement There are a number of important things about how referential integrity and foreign keys are handled in SQLite: • The attribute(s) referenced by a foreign key constraint (i.e. Residence.name in the example above) must be declared UNIQUE or as the PRIMARY KEY within their table, but this requirement is checked at run-time, not when constraints are declared. For example, if Residence.name had not been declared as the PRIMARY KEY of its table (or as UNIQUE), the FOREIGN KEY declarations above would still be permitted, but inserting into the Student table would always yield an error.
    [Show full text]
  • Not ACID, Not BASE, but SALT a Transaction Processing Perspective on Blockchains
    Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Stefan Tai, Jacob Eberhardt and Markus Klems Information Systems Engineering, Technische Universitat¨ Berlin fst, je, [email protected] Keywords: SALT, blockchain, decentralized, ACID, BASE, transaction processing Abstract: Traditional ACID transactions, typically supported by relational database management systems, emphasize database consistency. BASE provides a model that trades some consistency for availability, and is typically favored by cloud systems and NoSQL data stores. With the increasing popularity of blockchain technology, another alternative to both ACID and BASE is introduced: SALT. In this keynote paper, we present SALT as a model to explain blockchains and their use in application architecture. We take both, a transaction and a transaction processing systems perspective on the SALT model. From a transactions perspective, SALT is about Sequential, Agreed-on, Ledgered, and Tamper-resistant transaction processing. From a systems perspec- tive, SALT is about decentralized transaction processing systems being Symmetric, Admin-free, Ledgered and Time-consensual. We discuss the importance of these dual perspectives, both, when comparing SALT with ACID and BASE, and when engineering blockchain-based applications. We expect the next-generation of decentralized transactional applications to leverage combinations of all three transaction models. 1 INTRODUCTION against. Using the admittedly contrived acronym of SALT, we characterize blockchain-based transactions There is a common belief that blockchains have the – from a transactions perspective – as Sequential, potential to fundamentally disrupt entire industries. Agreed, Ledgered, and Tamper-resistant, and – from Whether we are talking about financial services, the a systems perspective – as Symmetric, Admin-free, sharing economy, the Internet of Things, or future en- Ledgered, and Time-consensual.
    [Show full text]
  • Database Administrator
    Database Administrator Purpose: DGC is looking for a passionate Database Administrator to help support our platform, delivering the content of choice for casino operators and their players. You will be working in a small but high performing IT team to create something special. Online gaming is set to be one of the fastest growing industries in the US as regulation allows online gaming to expand into the various states. Our RGS platform is designed for fast and efficient deployments and seamless integration into a high performing library of online casino games. You will need to assist with the hosting, management and updating of this technology to ensure our success. As an DBA you will implement, design and improve processes relating to the administration of databases to ensure that they function correctly, perform optimally, preserve data and facilitate revenue generation. This role forms part of a rapidly expanding team which will require the ability to support a fast growing infrastructure and customer base. Duties include, but not limited to: • Set and maintain operational database standards on an ongoing basis • Develop and maintain OLAP environments • Develop and maintain OLTP environments • Develop and maintain ETL processes • Enforce and improve database integrity and performance using sound design principles and implementation of database design standards • Design and enforce data security policies to eliminate unauthorised access to data on managed data systems in accordance with IT Services technical specifications and business requirements • Ensure that effective data redundancy; archiving, backup and recovery mechanisms are in place to prevent the loss of data • Set up configurable pre-established jobs to automatically run daily in order to monitor and maintain the operational databases • Provide 24-hour standby support by being available on a 24/7 basis during specified periods This job description is not intended to be an exhaustive list of responsibilities.
    [Show full text]
  • The Unconstrained Primary Key
    IBM Systems Lab Services and Training The Unconstrained Primary Key Dan Cruikshank www.ibm.com/systems/services/labservices © 2009 IBM Corporation In this presentation I build upon the concepts that were presented in my article “The Keys to the Kingdom”. I will discuss how primary and unique keys can be utilized for something other than just RI. In essence, it is about laying the foundation for data centric programming. I hope to convey that by establishing some basic rules the database developer can obtain reasonable performance. The title is an oxymoron, in essence a Primary Key is a constraint, but it is a constraint that gives the database developer more freedom to utilize an extremely powerful relational database management system, what we call DB2 for i. 1 IBM Systems Lab Services and Training Agenda Keys to the Kingdom Exploiting the Primary Key Pagination with ROW_NUMBER Column Ordering Summary 2 www.ibm.com/systems/services/labservices © 2009 IBM Corporation I will review the concepts I introduced in the article “The Keys to the Kingdom” published in the Centerfield. I think this was the inspiration for the picture. I offered a picture of me sitting on the throne, but that was rejected. I will follow this with a discussion on using the primary key as a means for creating peer or subset tables for the purpose of including or excluding rows in a result set. The ROW_NUMBER function is part of the OLAP support functions introduced in 5.4. Here I provide some examples of using ROW_NUMBER with the BETWEEN predicate in order paginate a result set.
    [Show full text]
  • Keys Are, As Their Name Suggests, a Key Part of a Relational Database
    The key is defined as the column or attribute of the database table. For example if a table has id, name and address as the column names then each one is known as the key for that table. We can also say that the table has 3 keys as id, name and address. The keys are also used to identify each record in the database table . Primary Key:- • Every database table should have one or more columns designated as the primary key . The value this key holds should be unique for each record in the database. For example, assume we have a table called Employees (SSN- social security No) that contains personnel information for every employee in our firm. We’ need to select an appropriate primary key that would uniquely identify each employee. Primary Key • The primary key must contain unique values, must never be null and uniquely identify each record in the table. • As an example, a student id might be a primary key in a student table, a department code in a table of all departments in an organisation. Unique Key • The UNIQUE constraint uniquely identifies each record in a database table. • Allows Null value. But only one Null value. • A table can have more than one UNIQUE Key Column[s] • A table can have multiple unique keys Differences between Primary Key and Unique Key: • Primary Key 1. A primary key cannot allow null (a primary key cannot be defined on columns that allow nulls). 2. Each table can have only one primary key. • Unique Key 1. A unique key can allow null (a unique key can be defined on columns that allow nulls.) 2.
    [Show full text]
  • Relational Database Design Chapter 7
    Chapter 7: Relational Database Design Chapter 7: Relational Database Design First Normal Form Pitfalls in Relational Database Design Functional Dependencies Decomposition Boyce-Codd Normal Form Third Normal Form Multivalued Dependencies and Fourth Normal Form Overall Database Design Process Database System Concepts 7.2 ©Silberschatz, Korth and Sudarshan 1 First Normal Form Domain is atomic if its elements are considered to be indivisible units + Examples of non-atomic domains: Set of names, composite attributes Identification numbers like CS101 that can be broken up into parts A relational schema R is in first normal form if the domains of all attributes of R are atomic Non-atomic values complicate storage and encourage redundant (repeated) storage of data + E.g. Set of accounts stored with each customer, and set of owners stored with each account + We assume all relations are in first normal form (revisit this in Chapter 9 on Object Relational Databases) Database System Concepts 7.3 ©Silberschatz, Korth and Sudarshan First Normal Form (Contd.) Atomicity is actually a property of how the elements of the domain are used. + E.g. Strings would normally be considered indivisible + Suppose that students are given roll numbers which are strings of the form CS0012 or EE1127 + If the first two characters are extracted to find the department, the domain of roll numbers is not atomic. + Doing so is a bad idea: leads to encoding of information in application program rather than in the database. Database System Concepts 7.4 ©Silberschatz, Korth and Sudarshan 2 Pitfalls in Relational Database Design Relational database design requires that we find a “good” collection of relation schemas.
    [Show full text]
  • The Relational Data Model and Relational Database Constraints
    chapter 33 The Relational Data Model and Relational Database Constraints his chapter opens Part 2 of the book, which covers Trelational databases. The relational data model was first introduced by Ted Codd of IBM Research in 1970 in a classic paper (Codd 1970), and it attracted immediate attention due to its simplicity and mathematical foundation. The model uses the concept of a mathematical relation—which looks somewhat like a table of values—as its basic building block, and has its theoretical basis in set theory and first-order predicate logic. In this chapter we discuss the basic characteristics of the model and its constraints. The first commercial implementations of the relational model became available in the early 1980s, such as the SQL/DS system on the MVS operating system by IBM and the Oracle DBMS. Since then, the model has been implemented in a large num- ber of commercial systems. Current popular relational DBMSs (RDBMSs) include DB2 and Informix Dynamic Server (from IBM), Oracle and Rdb (from Oracle), Sybase DBMS (from Sybase) and SQLServer and Access (from Microsoft). In addi- tion, several open source systems, such as MySQL and PostgreSQL, are available. Because of the importance of the relational model, all of Part 2 is devoted to this model and some of the languages associated with it. In Chapters 4 and 5, we describe the SQL query language, which is the standard for commercial relational DBMSs. Chapter 6 covers the operations of the relational algebra and introduces the relational calculus—these are two formal languages associated with the relational model.
    [Show full text]
  • Pizza Parlor Point-Of-Sales System CMPS 342 Database
    1 Pizza Parlor Point-Of-Sales System CMPS 342 Database Systems Chris Perry Ruben Castaneda 2 Table of Contents PHASE 1 1 Pizza Parlor: Point-Of-Sales Database........................................................................3 1.1 Description of Business......................................................................................3 1.2 Conceptual Database.........................................................................................4 2 Conceptual Database Design........................................................................................5 2.1 Entities................................................................................................................5 2.2 Relationships....................................................................................................13 2.3 Related Entities................................................................................................16 PHASE 2 3 ER-Model vs Relational Model..................................................................................17 3.1 Description.......................................................................................................17 3.2 Comparison......................................................................................................17 3.3 Conversion from E-R model to relational model.............................................17 3.4 Constraints........................................................................................................19 4 Relational Model..........................................................................................................19
    [Show full text]
  • Normalization Exercises
    DATABASE DESIGN: NORMALIZATION NOTE & EXERCISES (Up to 3NF) Tables that contain redundant data can suffer from update anomalies, which can introduce inconsistencies into a database. The rules associated with the most commonly used normal forms, namely first (1NF), second (2NF), and third (3NF). The identification of various types of update anomalies such as insertion, deletion, and modification anomalies can be found when tables that break the rules of 1NF, 2NF, and 3NF and they are likely to contain redundant data and suffer from update anomalies. Normalization is a technique for producing a set of tables with desirable properties that support the requirements of a user or company. Major aim of relational database design is to group columns into tables to minimize data redundancy and reduce file storage space required by base tables. Take a look at the following example: StdSSN StdCity StdClass OfferNo OffTerm OffYear EnrGrade CourseNo CrsDesc S1 SEATTLE JUN O1 FALL 2006 3.5 C1 DB S1 SEATTLE JUN O2 FALL 2006 3.3 C2 VB S2 BOTHELL JUN O3 SPRING 2007 3.1 C3 OO S2 BOTHELL JUN O2 FALL 2006 3.4 C2 VB The insertion anomaly: Occurs when extra data beyond the desired data must be added to the database. For example, to insert a course (CourseNo), it is necessary to know a student (StdSSN) and offering (OfferNo) because the combination of StdSSN and OfferNo is the primary key. Remember that a row cannot exist with NULL values for part of its primary key. The update anomaly: Occurs when it is necessary to change multiple rows to modify ONLY a single fact.
    [Show full text]
  • Clarion & ANSI SQL Standard Referential Integrity and Referential
    Clarion & ANSI SQL Standard Referential Integrity and Referential Actions November 12, 2018 Whitemarsh Information Systems Corporation 2008 Althea Lane Bowie, Maryland 20716 Tele: 301-249-1142 Email: [email protected] Web: www.wiscorp.com Referential Integrity and Referential Actions Fundamental Definition: Actions resulting from instruction to the database engine created in the dictionary (i.e., schema) associated with “Relationship” specifications. For SQL-engine DBMSs, these relationship-specifications and actions relate to value congruence between the value-set of a primary key’s column(s) and the value-set of a Foreign key’s column(s). When either a Update or Delete action occurs that violates the value congruence, a Referential Action occurs. The actions depend on whether the Referential Action is specified. In ANSI SQL Standards, the four referential integrity actions: No Action, Cascade, or Set Null or Set Default. In Clarion, the five referential integrity actions are: None, Restrict, Cascade, Clear, Cascade Server, ClearServer and Restrict Server. Copyright 2018, Whitemarsh Information Systems Corporation Proprietary Data, All Rights Reserved 2 Referential Integrity and Referential Actions Referential Integrity and Actions Referential Action taken when violation occurs On Update On Delete Referential Action Parent Child Parent Child Function ANSI Clarion Table Table Table Table Parent Table No equivalent None: Instructs the Primary No change Row is Nothing. Primary Key Application Generator not key in the deleted Effect is to Column value can to generate any code to column foreign key make the change. Foreign maintain referential value can value child table Key Column value integrity between any change row an does not change.
    [Show full text]