Integrity Constraints

Integrity constraint

It is the mechanism or condition used to prevent invalid data entry into the relation (table). It applies rules on the table.

Three types of integrity constraints are:
  1. Domain integrity constraints: Set a range on any relation that will prevent the user from performing any invalid manipulation.
    1. Not null constraint
    2. Check constraint
  2. Entity integrityh constraints: Applies on relation or table.
    1. Unique key constraint
    2. Primary key constraint
  3. Referential integrity constraints: Applies condition in two tables.
    1. Foreign key constraint
1. Not null: Not allow null values.
2. Check: Specify condition that each tuple must satisfy.
3. Unique key: Prevent duplicate values, allow NULL values.
4. Primary key: Prevent duplicate values, don’t allow null values.
5. Foreign key: Tuples in the referencing relation R1 have attribute (Foreign key attribute) that reference the primary key attribute of the referenced relation R2

Check constraint

The CHECK constraint is used to limit the value range that can be placed in a column.
The  CHECK constraint allows only certain values for a column.

How to create a CHECK constraint?

Check constraint can be created in this way:

RollNumber INT NOT NULL,
Name varchar(255), 
Age INT,
CHECK (Age>=18)

How to delete a CHECK constraint?


Referenctial integrity

Referential Integrity ensures that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.
If “CSE” is a branch name appearing in one of the tuples in the College relation (table), then there exists a tuple in the Department relation (table) for branch “CSE”.
Example in SQL:
create table customer
(customer-name           char(20),
customer-street            char(30),
customer-city  char(30),
primary key (customer-name))

create table depositor
(customer-name           char(20),
account-number          char(10),
primary key (customer-name, account-number),
foreign key (customer-name) references customer)
Check out this video lecture, for more info on integrity constraints

Python Programming ↓ 👆
Java Programming ↓ 👆
JAVA covered following topics in these notes.
JAVA Programs
Principles of Programming Languages ↓ 👆
Principles of Programming Languages covered following topics in these notes.

Previous years solved papers:
A list of Video lectures References:
  1. Sebesta,”Concept of programming Language”, Pearson Edu 
  2. Louden, “Programming Languages: Principles & Practices” , Cengage Learning 
  3. Tucker, “Programming Languages: Principles and paradigms “, Tata McGraw –Hill. 
  4. E Horowitz, "Programming Languages", 2nd Edition, Addison Wesley

    Computer Organization and Architecture ↓ 👆

    Computer Organization and Architecture covered following topics in these notes.

    1. Structure of desktop computers
    2. Logic gates
    3. Register organization
    4. Bus structure
    5. Addressing modes
    6. Register transfer language
    7. Direct mapping numericals
    8. Register in Assembly Language Programming
    9. Arrays in Assembly Language Programming


    1. William stalling ,“Computer Architecture and Organization” PHI
    2. Morris Mano , “Computer System Organization ”PHI

    Computer Network ↓ 👆
    Computer Network covered following topics in these notes.
    1. Data Link Layer
    2. Framing
    3. Byte count framing method
    4. Flag bytes with byte stuffing framing method
    5. Flag bits with bit stuffing framing method
    6. Physical layer coding violations framing method
    7. Error control in data link layer
    8. Stop and Wait scheme
    9. Sliding Window Protocol
    10. One bit sliding window protocol
    11. A protocol Using Go-Back-N
    12. Selective repeat protocol
    13. Application layer
    1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
    2. Douglas E Comer, “Internetworking with TCP/IP Principles, Protocols, And Architecture",Pearson Education
    3. KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
    4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.