SlideShare a Scribd company logo
1 of 15
INTRODUCTION

 There are some instances when a
  primary key doesn’t exist in the
  real world or when the existing
natural key might not be a suitable
           primary key.
SURROGATE KEY:

Is a primary key created by
the database designer to
simplify the identification of
entity instances.
ADVANTAGE

Since it has no intrinsic meaning,
values for it can be generated by
the DBMS to ensure that unique
values are always provided.
TABLE 5.4


  DATE       TIME_START   TIME_END   ROOM      EVENT_NAME      PARTY_OF

6/17/2010     11:00AM      2:00PM    Allure      Burton           60
                                                 Wedding
6/17/2010     11:00AM      2:00PM    Bonanza   Adams Office       12

6/17/2010     3:00PM       5:30PM     Allure   Smith Family       15

6/17/2010     3:30PM       5:30PM    Bonanza   Adam’s Office      12

6/18/2010     1:00PM       3:00PM    Bonanza    Boy Scouts        33

6/18/2010     11:00AM      2:00PM     Allure     March of         25
                                                  Dines
6/18/2010     11:00AM     12:30PM    Bonanza   Smith Family       12
 Given the data shown in table 5.4 you would
          model the EVENT entity as:

EVENT(DATE, TIME_START, TIME_END,ROOM
        ,EVENT_NAME,PARTY_OF)
DATE TIME_ TIME        ROOM      EVENT_     PART
     START _EN                    NAME      Y_OF   What primary key would you
             D                                     suggest? In this case , there is no
6/17 11:00 2:00        Allure    Burton      60    simple natural key that could be
 /10  AM    PM                   Wedding
                                                   used as a primary key in the
6/17/   11:00   2:00   Bonanza   Adams       12    model. Based on the primary key
 10      AM     PM               Office            concepts you learned about in
                                                   previous chapters, you might
6/17/   3:00    5:30    Allure    Smith      15    suggest one of these options.
 10     PM      PM                Family

6/17/   3:30    5:30   Bonanza   Adam’s      12
 10     PM      PM                Office

                                                       (DATE, TIME_START, ROOM)
6/18/   1:00    3:00   Bonanza     Boy       33                    Or
 10     PM      PM                Scouts                (DATE, TIME_END, ROOM)
6/18/   11:00   2:00    Allure   March of    25
 10      AM     PM                Dines
6/18/   11:00   12:3 Bonanza      Smith      12
 10      AM     0PM               Family
DAT TIME_      TIME_   ROO      EVENT_     PART
 E  START       END     M        NAME      Y_OF        Assume you select the
                                                  composite primary key (DATE,
                                                  TIME_START,ROOM) for the
6/17   11:00   2:00P   Allure   Burton      60    EVENT entity. Next ,you
/10     AM       M              Wedding
                                                  determine that one EVENT may
6/17   11:00   2:00P   Bonan    Adams       12    use many RESOURCES such as
/10     AM       M       za     Office            tables, projectors, pc and
                                                  stands, and that the same
6/17   3:00    5:30P   Allure    Smith      15    RESOURCE may be use for
/10    PM        M               Family           many EVENTS. The RESOURCE
                                                  entity would be represented by
6/17   3:30    5:30P   Bonan    Adam’s      12    the ff. attributes:
/10    PM        M       za      Office

6/18   1:00    3:00P   Bonan      Boy       33    RESOURCE (RSC_ID,
/10    PM        M       za      Scouts           RSC_DESCRIPTION,RSC_T
6/18   11:00   2:00P   Allure   March of    25    YPE, RSC_QTY,RSC_PRICE)
/10     AM       M               Dines
6/18   11:00   12:30   Bonan     Smith      12
/10     AM      PM       za      Family
DATE TIME_ TIME        ROOM     EVENT      PART
     START _EN                  _NAME      Y_OF   Given the business rules, the M:N
             D                                    relationship between RESOURCE
                                                  and EVENT would be represented
6/17   11:00   2:00P   Allure   Burton      60
                                                  via the EVNTRSC composite entity
/10     AM       M              Wedding
                                                  with a composite primary key as
6/17   11:00   2:00P   Bonan    Adams       12    follows:
/10     AM       M       za     Office
                                                    EVNTRSC (DATE, TIME _START,
6/17   3:00    5:30P   Allure    Smith      15      ROOM, RSC_ID, QTY _USED
/10    PM        M               Family
                                                   You now have a lengthy four-
6/17   3:30    5:30P   Bonan    Adam’s      12     attribute composite primary key.
/10    PM        M       za      Office            What would happen if the
                                                   EVNTRSC entity’s primary key
                                                   were inherited by another
6/18   1:00    3:00P   Bonan      Boy       33     existence dependent entity? At
/10    PM        M       za      Scouts            this point, you can see that the
6/18   11:00   2:00P   Allure   March of    25     composite primary key could
/10     AM       M               Dines             make the implementation of the
                                                   database and program coding
6/18   11:00   12:30   Bonan     Smith      12
                                                   unnecessarily complex.
/10     AM      PM       za      Family
Surrogate primary keys are accepted
   practice in today's complex data
            environments.
They are especially helpful when there
  is no natural key, when the selected
 candidate key has embedded semantic
     contents or when the selected
       candidate key is too long or
             cumbersome.
However , there is a trade-off; if you use
  a surrogate key, you must ensure that
     the candidate key of the entity in
 question performs properly through the
  use of “unique index” and “not null”
               constraints.
PREPARED BY:




   ROSELYN P. CEA
ALLYSA JANE CATALLA
      BLIS -III

More Related Content

Viewers also liked

Viewers also liked (9)

Dbms
DbmsDbms
Dbms
 
Bedlibrary5
Bedlibrary5Bedlibrary5
Bedlibrary5
 
Bettyboop
BettyboopBettyboop
Bettyboop
 
Bibliotheraphy
BibliotheraphyBibliotheraphy
Bibliotheraphy
 
Bedlibrary4
Bedlibrary4Bedlibrary4
Bedlibrary4
 
Term paper counseling
Term paper counselingTerm paper counseling
Term paper counseling
 
Information management education
Information management educationInformation management education
Information management education
 
Bedlibrary4
Bedlibrary4Bedlibrary4
Bedlibrary4
 
Bedlibrary6
Bedlibrary6Bedlibrary6
Bedlibrary6
 

More from Janecatalla

My presentation-for-infolit-workshop1
My presentation-for-infolit-workshop1My presentation-for-infolit-workshop1
My presentation-for-infolit-workshop1Janecatalla
 
Relationships within the relational database
Relationships within the relational databaseRelationships within the relational database
Relationships within the relational databaseJanecatalla
 
Object oriented database model
Object oriented database modelObject oriented database model
Object oriented database modelJanecatalla
 
Permuted Title Index
Permuted Title IndexPermuted Title Index
Permuted Title IndexJanecatalla
 
Readers advisory services final
Readers advisory services finalReaders advisory services final
Readers advisory services finalJanecatalla
 
Library orientation
Library orientationLibrary orientation
Library orientationJanecatalla
 
Library instruction(opac)
Library instruction(opac)Library instruction(opac)
Library instruction(opac)Janecatalla
 
Geographical Sources Governmental Publications/ Documents Continuing Resour...
Geographical Sources  Governmental Publications/ Documents  Continuing Resour...Geographical Sources  Governmental Publications/ Documents  Continuing Resour...
Geographical Sources Governmental Publications/ Documents Continuing Resour...Janecatalla
 

More from Janecatalla (20)

Bedlibrary3
Bedlibrary3Bedlibrary3
Bedlibrary3
 
Bedlibrary2
Bedlibrary2Bedlibrary2
Bedlibrary2
 
Bedlibrary
BedlibraryBedlibrary
Bedlibrary
 
Lis124
Lis124Lis124
Lis124
 
My presentation-for-infolit-workshop1
My presentation-for-infolit-workshop1My presentation-for-infolit-workshop1
My presentation-for-infolit-workshop1
 
Pp lis
Pp  lisPp  lis
Pp lis
 
Relationships within the relational database
Relationships within the relational databaseRelationships within the relational database
Relationships within the relational database
 
Object oriented database model
Object oriented database modelObject oriented database model
Object oriented database model
 
Jane catalla
Jane catallaJane catalla
Jane catalla
 
Indexing report
Indexing reportIndexing report
Indexing report
 
Permuted Title Index
Permuted Title IndexPermuted Title Index
Permuted Title Index
 
Indexing report
Indexing reportIndexing report
Indexing report
 
Jane iii
Jane iiiJane iii
Jane iii
 
Readers advisory services final
Readers advisory services finalReaders advisory services final
Readers advisory services final
 
Library orientation
Library orientationLibrary orientation
Library orientation
 
Library instruction(opac)
Library instruction(opac)Library instruction(opac)
Library instruction(opac)
 
Lib.instruction
Lib.instructionLib.instruction
Lib.instruction
 
Geographical Sources Governmental Publications/ Documents Continuing Resour...
Geographical Sources  Governmental Publications/ Documents  Continuing Resour...Geographical Sources  Governmental Publications/ Documents  Continuing Resour...
Geographical Sources Governmental Publications/ Documents Continuing Resour...
 
Encyclopedia
EncyclopediaEncyclopedia
Encyclopedia
 
Bibliographies
Bibliographies Bibliographies
Bibliographies
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Surrogate Keys Simplify Complex Database Designs

  • 1.
  • 2. INTRODUCTION There are some instances when a primary key doesn’t exist in the real world or when the existing natural key might not be a suitable primary key.
  • 3. SURROGATE KEY: Is a primary key created by the database designer to simplify the identification of entity instances.
  • 4.
  • 5. ADVANTAGE Since it has no intrinsic meaning, values for it can be generated by the DBMS to ensure that unique values are always provided.
  • 6.
  • 7. TABLE 5.4 DATE TIME_START TIME_END ROOM EVENT_NAME PARTY_OF 6/17/2010 11:00AM 2:00PM Allure Burton 60 Wedding 6/17/2010 11:00AM 2:00PM Bonanza Adams Office 12 6/17/2010 3:00PM 5:30PM Allure Smith Family 15 6/17/2010 3:30PM 5:30PM Bonanza Adam’s Office 12 6/18/2010 1:00PM 3:00PM Bonanza Boy Scouts 33 6/18/2010 11:00AM 2:00PM Allure March of 25 Dines 6/18/2010 11:00AM 12:30PM Bonanza Smith Family 12
  • 8.  Given the data shown in table 5.4 you would model the EVENT entity as: EVENT(DATE, TIME_START, TIME_END,ROOM ,EVENT_NAME,PARTY_OF)
  • 9. DATE TIME_ TIME ROOM EVENT_ PART START _EN NAME Y_OF What primary key would you D suggest? In this case , there is no 6/17 11:00 2:00 Allure Burton 60 simple natural key that could be /10 AM PM Wedding used as a primary key in the 6/17/ 11:00 2:00 Bonanza Adams 12 model. Based on the primary key 10 AM PM Office concepts you learned about in previous chapters, you might 6/17/ 3:00 5:30 Allure Smith 15 suggest one of these options. 10 PM PM Family 6/17/ 3:30 5:30 Bonanza Adam’s 12 10 PM PM Office (DATE, TIME_START, ROOM) 6/18/ 1:00 3:00 Bonanza Boy 33 Or 10 PM PM Scouts (DATE, TIME_END, ROOM) 6/18/ 11:00 2:00 Allure March of 25 10 AM PM Dines 6/18/ 11:00 12:3 Bonanza Smith 12 10 AM 0PM Family
  • 10. DAT TIME_ TIME_ ROO EVENT_ PART E START END M NAME Y_OF Assume you select the composite primary key (DATE, TIME_START,ROOM) for the 6/17 11:00 2:00P Allure Burton 60 EVENT entity. Next ,you /10 AM M Wedding determine that one EVENT may 6/17 11:00 2:00P Bonan Adams 12 use many RESOURCES such as /10 AM M za Office tables, projectors, pc and stands, and that the same 6/17 3:00 5:30P Allure Smith 15 RESOURCE may be use for /10 PM M Family many EVENTS. The RESOURCE entity would be represented by 6/17 3:30 5:30P Bonan Adam’s 12 the ff. attributes: /10 PM M za Office 6/18 1:00 3:00P Bonan Boy 33 RESOURCE (RSC_ID, /10 PM M za Scouts RSC_DESCRIPTION,RSC_T 6/18 11:00 2:00P Allure March of 25 YPE, RSC_QTY,RSC_PRICE) /10 AM M Dines 6/18 11:00 12:30 Bonan Smith 12 /10 AM PM za Family
  • 11. DATE TIME_ TIME ROOM EVENT PART START _EN _NAME Y_OF Given the business rules, the M:N D relationship between RESOURCE and EVENT would be represented 6/17 11:00 2:00P Allure Burton 60 via the EVNTRSC composite entity /10 AM M Wedding with a composite primary key as 6/17 11:00 2:00P Bonan Adams 12 follows: /10 AM M za Office EVNTRSC (DATE, TIME _START, 6/17 3:00 5:30P Allure Smith 15 ROOM, RSC_ID, QTY _USED /10 PM M Family You now have a lengthy four- 6/17 3:30 5:30P Bonan Adam’s 12 attribute composite primary key. /10 PM M za Office What would happen if the EVNTRSC entity’s primary key were inherited by another 6/18 1:00 3:00P Bonan Boy 33 existence dependent entity? At /10 PM M za Scouts this point, you can see that the 6/18 11:00 2:00P Allure March of 25 composite primary key could /10 AM M Dines make the implementation of the database and program coding 6/18 11:00 12:30 Bonan Smith 12 unnecessarily complex. /10 AM PM za Family
  • 12. Surrogate primary keys are accepted practice in today's complex data environments.
  • 13. They are especially helpful when there is no natural key, when the selected candidate key has embedded semantic contents or when the selected candidate key is too long or cumbersome.
  • 14. However , there is a trade-off; if you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use of “unique index” and “not null” constraints.
  • 15. PREPARED BY: ROSELYN P. CEA ALLYSA JANE CATALLA BLIS -III