5 Jul 2022

115

Data Integrity Constraints

Format: APA

Academic level: College

Paper type: Coursework

Words: 255

Pages: 1

Downloads: 0

Data integrity means the completeness and correctness of data in a database warehouse. To implement data integrity, one has restricted or constraints data values, which users may insert, update or delete in a database. These integrity constraints offer the mechanism for making sure that data matches to guidelines underlined by the database manager. Constraints are of significance in ensuring data cleanliness through verifying that data within database conforms to the fundamental level of data correctness and consistency, preventing entry of irrelevant data. Also, constraints may serve in various aspects of the optimization of the query. They are more specifically relevant in query rewrite on materialized views. 

Constraints must be close to database data more often. However, the developer has to think about what if he wrote his constraints in code, in future, he wants to change to a different platform or language, and he encounters an error within that limitations. It would be devastating. Things such as primary keys, foreign keys, constraints are applied broadly. They have been employed for over 30 years up to date. They are not junk but in particular, scenarios they are simply not manageable. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

For instance, whether a developer was Google, he cannot simply depend on the relational model to provide answers for milliseconds. Therefore, considering requirements such as stability and speed, developers often duplicate data; they do not apply primary keys or establish relationships. However, they only use when looking something in particular and when they understand what they will lose through performing it in that manner. In the end, developers beliefs that relational model is simply a model and a means of representing something. It is a successful means, but not a god sends, therefore, in certain cases there is the need for it to be compromised. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Data Integrity Constraints.
https://studybounty.com/data-integrity-constraints-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration