Techniques for Performing User-Defined Integrity Constraint
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Integrity constraints help us to maintain integrity i.e., correctness of the table in any database. Whenever a user creates a new database then wrong entry can be inserted in the table. To prevent these wrong entries we initiate data constraints while creating the new table. The integrity or data constraints are categorized into two methods – Input-Output Constraints and Business Rule Constraints. The input-output constraints are applicable on general table & common to all types of organizations. On the other hand business rule are specific to any specific business or organization. Business rules, which are enforced on data being stored in a table, are called constraints. Integrity control deals with the prevention of semantic errors made by users due to their carelessness or lack of knowledge; the integrity control subsystem uses integrity rules to verify the database and operations on the database. The business can also used user-defined constraints which are defined by the Oracle Trigger. Trigger helps a business to defined constraints which are not possible using built-in constraints. In this paper we defined various triggers to prevent business or an organization from entry or performing wrong operation in the table of any specific database.
Authors and Affiliations
Jyoti . , Sneha
Smart Locker System to Crack Shoulder Surfing Techniques
Authentication based on passwords is used largely in applications for computer security and privacy. The password is generated for each and every time a new color code is generated for the user. The user can open the lo...
Simulation of Distributed Power Flow Controller
The growing demand and the aging of networks make it desirable to control the power flow in power-transmission systems fast and reliably. The Load changes the voltage variation in transmission lines must be limited, oth...
Prediction Of Weld Bead Geometry Analysis For Disimilar(Al Lm6 &Allm25) Metal Matrix Composites
Metal matrix composites (MMCs) combine a stiff but brittle phase, typically a ceramic, with a more ductile metal matrix. The correct fractional combination of materials can result in a material with improved stiffness,...
Implementation of Zigbee Transmitter using Verilog
The previous quite a while have seen a fast advancement in the remote system region. So far remote systems administration has been centred around fast and long range applications. Sigsbee innovation was created for a Re...
Introduction To Artificial intelligence
Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing syst...