• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Fundamental » Memory » Types of integrity
Next →
← Prev

Types of integrity

By Dinesh Thakur

There are two types of relational integrity rules

Entity Integrity: – No attribute participating in the primary key of a base relation allowed containing any nulls. Primary key performs the unique identification function in a relational model. Thus a null primary key value within a base relation would be like saying that there was some entity that had no known identity. An entity that cannot be identified is a contradiction in terms, hence the name entity integrity.

Referential integrity: – A referential integrity constraint designates a column or combination of columns as a foreign key and establishes a relation ship between the foreign key and a specified primary or unique key, called the referenced key. or The value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation is called Referential Integrity. If the Base Relation/Table includes a foreign key matching Primary key of some other base table relation. Then every value of the Foreign Key in the First table/Relation must either be equal to the value of Primary Key in some tuple of the second table or be the wholly null. Or in other words a Foreign Key value must match primary key value in some tuple of the referenced relation if that foreign key value is non-null. Sometimes it is necessary to permit foreign keys to accept nulls. Here it must be noted that the nulls are of the variety value does not exist’ rather than ‘Value unknown’.

You’ll also like:

  1. What is Database Integrity
  2. Types of Storage Device | Types of Backup
  3. Different Types of RAM? Explain in Detail
  4. Read Only Memory. What are the types of ROM
  5. Types of Computer Memory
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Computer Memory

Computer Memory

    • Computer - Memory
    • Computer - Types of Memory
    • Computer - RAM
    • Computer - Types of RAM
    • Computer - ROM
    • Computer - RAM Vs ROM
    • Computer - Associative Memory
    • Computer - SemiConductor Memory
    • Computer - Primary Memory
    • Computer - Auxiliary Memory
    • Computer - Flash Memory
    • Computer - EPROM
    • Computer - Secondary Memory
    • Computer - Sequential Access Memory
    • Computer - EEPROM
    • Computer - Bubble Memory
    • Computer - DDRAM Vs FPMDRAM
    • Computer - SDRAM
    • Computer - DRAM
    • Computer - VRAM
    • Computer - ECC Memory
    • Computer - PC RAM
    • Computer - NVRAM
    • Computer - Register

Computer Devices

    • Computer - Input/Output Devices
    • Computer - Printer
    • Computer - Laser Printer
    • Computer - Hard Drive
    • Computer - Dot-Matrix Printer
    • Computer - Impact and Non-Impact
    • Computer - Storage Devices
    • Computer - Primary Storage
    • Computer - Types of Storage
    • Computer - Line Printer

Other Terms

    • Computer - Interrupt
    • Computer - Classify Storage Devices
    • Computer - CISC and RISC
    • Computer - Access Method
    • Computer - Memory Mapping
    • Computer - OMR
    • Computer - Access Time
    • Computer - Types of integrity
    • Computer - Buffer
    • Computer - Associative Cache
    • Computer - RAM Parity
    • Computer - Disk Cache
    • Computer - Disk Controller
    • Computer - Cycle Time
    • Computer - IDE
    • Computer - RAM Disk
    • Computer - Cartridge Hard Disk
    • Computer - DPI
    • Computer - Fatal Error
    • Computer - Install HDD/SSD
    • Computer - Input Technologies
    • Computer - OCR

Binary Number

  • CO - EBCDIC
  • CO - ASCII Code
  • CO - Bit
  • CO - ASCII
  • CO - BCD Numbers
  • CO - Binary Numbers
  • CO - Byte
  • CO - Bits and Bytes
  • CO - Machine Code

Other Links

  • Computer Memory - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW