Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CS 411-01 Assignment 3 Cascade?) of enforcing each of the violated constraint. A For example, say, if you have one violated (referential integrity) constraint, you

image text in transcribed
image text in transcribed
CS 411-01 Assignment 3 Cascade?) of enforcing each of the violated constraint. A For example, say, if you have one violated (referential integrity) constraint, you write down at maximum', the 5 different actions applying to this violation, explaining how each action is to be applied to this violation (i.e., at maximum, 5 explanations, totally). For another example, say, if you have two violated (referential integrity) constraints, you write down at maximum, the 4 different actions applying to each of the 2 violations, explaining how each action is to be applied to the respective violation (i.e., at maximum, 2 violations * 5 possible actions each = 10 explanations, totally). Etc., for three violated constraints, and so on. so bolnicupon Notice that there are four relational constraints in the relational data model: domain constraint, key constraint, entity integrity constraint, referential integrity constraint. For each operation, you need to check for violation of each of the four constraints (not all of the constraints will be violated, just some of them but you need to check all of them to be sure which ones are violated, if any; otherwise you may overlook for some of the violations). For that, you need also to use the COMPANY database state in Figure 3.6 on p. 72 of the Elmasri's textbook; this Figure 3.6 is also shown in the lecture notes) r the format of answering this question, you need to look in the examples of violations of constraints on 16, 77, and 78 in the Elmasri's textbook (6/E) and answer here in THE SAME manner and format. Also documento, cucuny, C uess, allu 151Warba simplicity. (ook 1. PROBLEMS: piso rosb_qtda 1. (50 pts = 5 x 10 pts) Consider that the update operations below are applied to the COMPANY relational database schema (Figure 3.7 on p. 75 of the textbook "Fundamentals of Database Systems," 6th Edition) 1 Insert into EMPLOYEE. 2 Insert into EMPLOYEE. 3 Insert into PROJECT.motto wo o d 4 Delete the WORKS ON tuples with Essn = '333445555'. 5 Modify the Mgrssn and Mgrstartdate of the DEPARTMENT tuple with Dnumber = 4 to 123456788' and '2007-10-01', respectively. volto ai moito d onde For each operation, write down (no MOTEUD od (1) EACH of the four integrity constraint violated by the operation (op), if any, and union (2) ALL possible different ways, also called actions (Reject, Change the on, Set Default; Set Null and *RECALL: The 4 integrity constraints (ICs) are: Domain constraint, Key constraint, Entity IC and Referenca CS 411-01 Assignment 3 Cascade?) of enforcing each of the violated constraint. A For example, say, if you have one violated (referential integrity) constraint, you write down at maximum', the 5 different actions applying to this violation, explaining how each action is to be applied to this violation (i.e., at maximum, 5 explanations, totally). For another example, say, if you have two violated (referential integrity) constraints, you write down at maximum, the 4 different actions applying to each of the 2 violations, explaining how each action is to be applied to the respective violation (i.e., at maximum, 2 violations * 5 possible actions each = 10 explanations, totally). Etc., for three violated constraints, and so on. so bolnicupon Notice that there are four relational constraints in the relational data model: domain constraint, key constraint, entity integrity constraint, referential integrity constraint. For each operation, you need to check for violation of each of the four constraints (not all of the constraints will be violated, just some of them but you need to check all of them to be sure which ones are violated, if any; otherwise you may overlook for some of the violations). For that, you need also to use the COMPANY database state in Figure 3.6 on p. 72 of the Elmasri's textbook; this Figure 3.6 is also shown in the lecture notes) r the format of answering this question, you need to look in the examples of violations of constraints on 16, 77, and 78 in the Elmasri's textbook (6/E) and answer here in THE SAME manner and format. Also documento, cucuny, C uess, allu 151Warba simplicity. (ook 1. PROBLEMS: piso rosb_qtda 1. (50 pts = 5 x 10 pts) Consider that the update operations below are applied to the COMPANY relational database schema (Figure 3.7 on p. 75 of the textbook "Fundamentals of Database Systems," 6th Edition) 1 Insert into EMPLOYEE. 2 Insert into EMPLOYEE. 3 Insert into PROJECT.motto wo o d 4 Delete the WORKS ON tuples with Essn = '333445555'. 5 Modify the Mgrssn and Mgrstartdate of the DEPARTMENT tuple with Dnumber = 4 to 123456788' and '2007-10-01', respectively. volto ai moito d onde For each operation, write down (no MOTEUD od (1) EACH of the four integrity constraint violated by the operation (op), if any, and union (2) ALL possible different ways, also called actions (Reject, Change the on, Set Default; Set Null and *RECALL: The 4 integrity constraints (ICs) are: Domain constraint, Key constraint, Entity IC and Referenca

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle 12c SQL

Authors: Joan Casteel

3rd edition

1305251032, 978-1305251038

More Books

Students also viewed these Databases questions

Question

4. How would you deal with the store manager?

Answered: 1 week ago

Question

2. How were various roles filled?

Answered: 1 week ago

Question

2. What process will you put in place to address conflicts?

Answered: 1 week ago