Implementing user-defined Integrity Constraint in MYSQL
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
The methods with which we can maintain correctness of any specific table in data base management system are Integrity constraints. The general idea of this paper is to investigate and observe user-defined integrity constraint handling or integrity control in relational database management systems. Every business applications run among the rules which are defined previously, these rules are also valid and appropriate to business data and they should not be violated. MySQL presented a unique and special feature called data constraint or integrity constraint that was applied with the formation data structure. Constraints are business rules, which are imposed on data being stored in a table. Due to their carelessness or lack of knowledge Integrity control deals with the avoidance of semantic errors made by users; Integrity rules used by the integrity control subsystem so that it verify the database and operations on the database. In today's database systems and functions for implementing user-defined integrity constraints triggers are being applying in a variety of important ways. The most important use of triggers is still to implement a variety of integrity constraints taken by the application, and we have disagreed that additional uses of triggers than one might think are in fact maintaining constraints of one sort or another.
Authors and Affiliations
Deepika, Mr. Anil Arora
Analysis and Implementation of PMBLDC Motor Drive with CUK Converter
This method is used to improve the efficiency of motor drive by power factor correction. It plays an important role in energy saving during energy conversion. A cuk dc -dc converter topology reduced the power quality pr...
A Rule Based Punjabi Dialect Conversion System
Recently there is dramatically increase in availability of informal dialectal language on web. People are sharing their ideas, thoughts and emotions, usually in the form of blogs and partially informal articles across t...
Effect of Jute Fiber Reinforcement Layers on Unconfined Compressive Strength of Black Cotton Soil
Improvement of soil in foundation is a major challenge in civil engineering. Structures built on black cotton soil may be damaged due to high swelling and shrinkage characteristics of this soil with variation of water c...
Fault Recovery Using Scan Chain Based Approach Technique
Recent applications of all embedded system will get failure due to multiple faults occurring in the system. This fault should be detected and corrected simultaneously while running the system. In practise we use a scan...
Privacy in Data Storage and MultiOwner Authentication with Load Balancing in Cloud Computing
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the encumbrance of local data stora...