SlideShare ist ein Scribd-Unternehmen logo
1 von 28
ENTITY RELATIONSHIP MODEL
DBMS
CONTENT
DBMS
About – ER model
Example
Components:
Entity
Attribute
Relationshi
p
DBM S-
A database management system (DBMS)
is system software for creating and
managing databases. The DBMS
provides users and programmers with a
systematic way to create, retrieve,
update and manage data.
Overall we can say that a dbms is a
system that is responsible for
holding,retriving,and manipulating of data
with presence of some constraints
About– ER-MODEL
Entity relationship model also called e-r model
and it is a high level model.
This model is used to define the data elements
and relationship for a specified system.
It develops a conceptual design for the
database. It also develops a very simple and
easy to design view of data.
In ER modeling, the database structure is
portrayed as a diagram called an entity-
E
X
A
M
P
L
E-
Component of ER Diagram
-
 Entity
An entity may be any object, class, person or
place.
In the ER diagram, an entity can be
represented as rectangles.
An entity can be of two types (by existance):-
•Tangible Entity : Entities that exist in the real world physically.
Example: Person, car, etc.
•Intangible Entity : Entities that exist only logically and have
no physical existence. Example: Bank Account, etc.
Weak Entity-
An entity that depends on another entity
called a weak entity.
The weak entity doesn't contain any key
attribute of its own.it has discriminator.
The weak entity is represented by a double
rectangle.
Strong Entity:
A strong entity is not dependent on any other
entity in the schema. A strong entity will always
have a primary key. Strong entities are
represented by a single rectangle. The relationship
of two strong entities is represented by a single
diamond.
Attribute-
The attribute is used to describe the
property of an entity.
For example - id, age, contact number,
name, etc. can be attributes of a student.
KeyAttribute-
The key attribute is used to represent the
main characteristics of an entity.
It represents a primary key.
The key attribute is represented by an oval shape
with the text underlined.
Different types of keys
The different types of keys in the database
management system (DBMS) are as follows −
•Primary key
•Super key
•Candidate key
•Alternate key
•Artificial key
•Foreign key
Candidate key
It is an attribute whose values uniquely identify
each record of a table. A table can have more than
one candidate key.
StdNo Name Branch Branch
01 Hari Cse A
02 Pinky Ece B
03 Bob Civil A
Let’s consider a table −
Candidate key satisfy some conditions which are as follows −
•Different records cannot be identical.
•Subset of the candidate key cannot be a key.
Primary Key
From many candidate keys, the database designer
selects one candidate key for his database called as
primary key. The primary key uniquely identifies
each record in a table and must never be the same
for two records.
•Uniqueness (two different records cannot be
identical).
•NOT NULL (null value is not allowed).
•Value in a primary key column can never be
modified or updated, if any foreign key refers to
that primary key
Alternate Key
Candidate keys which are not selected for primary
keys are called alternate keys. That is, except for
the primary key the remaining candidate keys are
alternate keys.
Super key
It is the superset of the candidate key. The combine
attributes where the first attribute always have
uniqueness and second attribute may or may not
have uniqueness.
Artificial key
It is used in the form of indexes. If the size of the
database is large and no attribute can be specified
as a key field then the index or artificial key is
applied on the given database.
Foreign key
In a relation, the column whose data values
correspond to the values of a key column in
another relation is called a foreign key. In a
relational database, the foreign key of a relation
may be the primary key of another relation.
ComposIteAttribute-
An attribute that composed of many
other attributes is known as a composite
attribute.
Multivalued Attribute-
An attribute can have more than one value.
These attributes are known as a
multivalued attribute.
The double oval is used to represent
multivalued attribute.
Derived Attribute-
An attribute that can be derived from other
attribute is known as a derived attribute.
It can be represented by a dashed oval.
Relationship-
A relationship is used to describe the
relation between entities.
Diamond shape is used to represent
the relationship.
There are two types one is strong relation
and second is weak relation.
Strong relationship represented by a single
diamond where weak relationship represented by
double diamond
Types of relationship -
1.One-to-One Relationship
When only one instance of an entity is
associated with the relationship, then it is
known as one to one relationship.
For example, A female can marry to one
male, and a male can marry to one female.
2.One-to-many relationship
When only one instance of the entity on the left,
and more than one instance of an entity on the
right associates with the relationship then this is
known as a one-to-many relationship.
For example, Scientist can invent many
inventions, but the invention is done by the only
specific scientist.
3.Many-to-one relationship
When more than one instance of the entity on the
left, and only one instance of an entity on the right
associates with the relationship then it is known as
a many-to-one relationship.
For example, Student enrolls for only one course,
but a course can have many students.
4.Many-to-many relationship
When more than one instance of the entity on the
left, and more than one instance of an entity on the
right associates with the relationship then it is known
as a many- to-many relationship.
For example, Employee can assign by many
projects and project can have many employees.
Life is Art
Live yours in
color .

Weitere ähnliche Inhalte

Ähnlich wie rdbmsdol.pptx

ermodelppt-181229121745.pptx
ermodelppt-181229121745.pptxermodelppt-181229121745.pptx
ermodelppt-181229121745.pptxThangamaniR3
 
Data Models & Introduction to UML
Data Models & Introduction to UML Data Models & Introduction to UML
Data Models & Introduction to UML نبيله نواز
 
3. Chapter Three.pdf
3. Chapter Three.pdf3. Chapter Three.pdf
3. Chapter Three.pdffikadumola
 
18306_lec-2 (1).ppt
18306_lec-2 (1).ppt18306_lec-2 (1).ppt
18306_lec-2 (1).pptIshuIswarya3
 
ICT DBA3 09 0710 Model Data Objects.pdf
ICT DBA3 09 0710 Model Data Objects.pdfICT DBA3 09 0710 Model Data Objects.pdf
ICT DBA3 09 0710 Model Data Objects.pdfInfotech27
 
E_R-Diagram (2).pptx
E_R-Diagram (2).pptxE_R-Diagram (2).pptx
E_R-Diagram (2).pptxsandeep54552
 
DBMS_unit2_Notes.pdf
DBMS_unit2_Notes.pdfDBMS_unit2_Notes.pdf
DBMS_unit2_Notes.pdfssuserf71896
 
Entityrelationshipmodel
EntityrelationshipmodelEntityrelationshipmodel
EntityrelationshipmodelEnes Bolfidan
 
entityrelationshipmodel.pptx
entityrelationshipmodel.pptxentityrelationshipmodel.pptx
entityrelationshipmodel.pptxThangamaniR3
 
DATA MODEL PRESENTATION UNIT I-BCA I.pptx
DATA MODEL PRESENTATION UNIT I-BCA I.pptxDATA MODEL PRESENTATION UNIT I-BCA I.pptx
DATA MODEL PRESENTATION UNIT I-BCA I.pptxJasmineMichael1
 
SQL Tutorial - Basics of Structured Query Language Day 1.pdf
SQL Tutorial - Basics of Structured Query Language Day 1.pdfSQL Tutorial - Basics of Structured Query Language Day 1.pdf
SQL Tutorial - Basics of Structured Query Language Day 1.pdfRiturajDas28
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship ModelSlideshare
 

Ähnlich wie rdbmsdol.pptx (20)

ER MODEL.pptx
ER MODEL.pptxER MODEL.pptx
ER MODEL.pptx
 
ermodelppt-181229121745.pptx
ermodelppt-181229121745.pptxermodelppt-181229121745.pptx
ermodelppt-181229121745.pptx
 
ERD(2).ppt
ERD(2).pptERD(2).ppt
ERD(2).ppt
 
database
databasedatabase
database
 
ans_dbms.pdf
ans_dbms.pdfans_dbms.pdf
ans_dbms.pdf
 
Data Models & Introduction to UML
Data Models & Introduction to UML Data Models & Introduction to UML
Data Models & Introduction to UML
 
3. Chapter Three.pdf
3. Chapter Three.pdf3. Chapter Three.pdf
3. Chapter Three.pdf
 
18306_lec-2 (1).ppt
18306_lec-2 (1).ppt18306_lec-2 (1).ppt
18306_lec-2 (1).ppt
 
ICT DBA3 09 0710 Model Data Objects.pdf
ICT DBA3 09 0710 Model Data Objects.pdfICT DBA3 09 0710 Model Data Objects.pdf
ICT DBA3 09 0710 Model Data Objects.pdf
 
Day 1 SQL.pptx
Day 1 SQL.pptxDay 1 SQL.pptx
Day 1 SQL.pptx
 
SQL.pptx
SQL.pptxSQL.pptx
SQL.pptx
 
E_R-Diagram (2).pptx
E_R-Diagram (2).pptxE_R-Diagram (2).pptx
E_R-Diagram (2).pptx
 
DBMS_unit2_Notes.pdf
DBMS_unit2_Notes.pdfDBMS_unit2_Notes.pdf
DBMS_unit2_Notes.pdf
 
Entityrelationshipmodel
EntityrelationshipmodelEntityrelationshipmodel
Entityrelationshipmodel
 
entityrelationshipmodel.pptx
entityrelationshipmodel.pptxentityrelationshipmodel.pptx
entityrelationshipmodel.pptx
 
DATA MODEL PRESENTATION UNIT I-BCA I.pptx
DATA MODEL PRESENTATION UNIT I-BCA I.pptxDATA MODEL PRESENTATION UNIT I-BCA I.pptx
DATA MODEL PRESENTATION UNIT I-BCA I.pptx
 
Data model and entity relationship
Data model and entity relationshipData model and entity relationship
Data model and entity relationship
 
SQL Tutorial - Basics of Structured Query Language Day 1.pdf
SQL Tutorial - Basics of Structured Query Language Day 1.pdfSQL Tutorial - Basics of Structured Query Language Day 1.pdf
SQL Tutorial - Basics of Structured Query Language Day 1.pdf
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship Model
 
dbms mannual.pdf
dbms mannual.pdfdbms mannual.pdf
dbms mannual.pdf
 

Mehr von Dolchandra

Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
Hitesh Dewangan PPT.pptx
Hitesh Dewangan PPT.pptxHitesh Dewangan PPT.pptx
Hitesh Dewangan PPT.pptxDolchandra
 
AASHUrdbms.pptx
AASHUrdbms.pptxAASHUrdbms.pptx
AASHUrdbms.pptxDolchandra
 
Window to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptxWindow to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptxDolchandra
 
python conditional statement.pptx
python conditional statement.pptxpython conditional statement.pptx
python conditional statement.pptxDolchandra
 
dinning phillosopher problem
dinning phillosopher problemdinning phillosopher problem
dinning phillosopher problemDolchandra
 
Window to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptxWindow to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptxDolchandra
 

Mehr von Dolchandra (8)

Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Hitesh Dewangan PPT.pptx
Hitesh Dewangan PPT.pptxHitesh Dewangan PPT.pptx
Hitesh Dewangan PPT.pptx
 
AASHUrdbms.pptx
AASHUrdbms.pptxAASHUrdbms.pptx
AASHUrdbms.pptx
 
Window to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptxWindow to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptx
 
rdbmsdol.pptx
rdbmsdol.pptxrdbmsdol.pptx
rdbmsdol.pptx
 
python conditional statement.pptx
python conditional statement.pptxpython conditional statement.pptx
python conditional statement.pptx
 
dinning phillosopher problem
dinning phillosopher problemdinning phillosopher problem
dinning phillosopher problem
 
Window to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptxWindow to Viewport Transformation in Computer Graphics with.pptx
Window to Viewport Transformation in Computer Graphics with.pptx
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

rdbmsdol.pptx

  • 1.
  • 3. CONTENT DBMS About – ER model Example Components: Entity Attribute Relationshi p
  • 4. DBM S- A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data. Overall we can say that a dbms is a system that is responsible for holding,retriving,and manipulating of data with presence of some constraints
  • 5. About– ER-MODEL Entity relationship model also called e-r model and it is a high level model. This model is used to define the data elements and relationship for a specified system. It develops a conceptual design for the database. It also develops a very simple and easy to design view of data. In ER modeling, the database structure is portrayed as a diagram called an entity-
  • 7. Component of ER Diagram -
  • 8.  Entity An entity may be any object, class, person or place. In the ER diagram, an entity can be represented as rectangles.
  • 9. An entity can be of two types (by existance):- •Tangible Entity : Entities that exist in the real world physically. Example: Person, car, etc. •Intangible Entity : Entities that exist only logically and have no physical existence. Example: Bank Account, etc.
  • 10. Weak Entity- An entity that depends on another entity called a weak entity. The weak entity doesn't contain any key attribute of its own.it has discriminator. The weak entity is represented by a double rectangle.
  • 11. Strong Entity: A strong entity is not dependent on any other entity in the schema. A strong entity will always have a primary key. Strong entities are represented by a single rectangle. The relationship of two strong entities is represented by a single diamond.
  • 12. Attribute- The attribute is used to describe the property of an entity. For example - id, age, contact number, name, etc. can be attributes of a student.
  • 13. KeyAttribute- The key attribute is used to represent the main characteristics of an entity. It represents a primary key. The key attribute is represented by an oval shape with the text underlined.
  • 14. Different types of keys The different types of keys in the database management system (DBMS) are as follows − •Primary key •Super key •Candidate key •Alternate key •Artificial key •Foreign key
  • 15. Candidate key It is an attribute whose values uniquely identify each record of a table. A table can have more than one candidate key. StdNo Name Branch Branch 01 Hari Cse A 02 Pinky Ece B 03 Bob Civil A Let’s consider a table − Candidate key satisfy some conditions which are as follows − •Different records cannot be identical. •Subset of the candidate key cannot be a key.
  • 16. Primary Key From many candidate keys, the database designer selects one candidate key for his database called as primary key. The primary key uniquely identifies each record in a table and must never be the same for two records. •Uniqueness (two different records cannot be identical). •NOT NULL (null value is not allowed). •Value in a primary key column can never be modified or updated, if any foreign key refers to that primary key
  • 17. Alternate Key Candidate keys which are not selected for primary keys are called alternate keys. That is, except for the primary key the remaining candidate keys are alternate keys. Super key It is the superset of the candidate key. The combine attributes where the first attribute always have uniqueness and second attribute may or may not have uniqueness.
  • 18. Artificial key It is used in the form of indexes. If the size of the database is large and no attribute can be specified as a key field then the index or artificial key is applied on the given database.
  • 19. Foreign key In a relation, the column whose data values correspond to the values of a key column in another relation is called a foreign key. In a relational database, the foreign key of a relation may be the primary key of another relation.
  • 20. ComposIteAttribute- An attribute that composed of many other attributes is known as a composite attribute.
  • 21. Multivalued Attribute- An attribute can have more than one value. These attributes are known as a multivalued attribute. The double oval is used to represent multivalued attribute.
  • 22. Derived Attribute- An attribute that can be derived from other attribute is known as a derived attribute. It can be represented by a dashed oval.
  • 23. Relationship- A relationship is used to describe the relation between entities. Diamond shape is used to represent the relationship. There are two types one is strong relation and second is weak relation. Strong relationship represented by a single diamond where weak relationship represented by double diamond
  • 24. Types of relationship - 1.One-to-One Relationship When only one instance of an entity is associated with the relationship, then it is known as one to one relationship. For example, A female can marry to one male, and a male can marry to one female.
  • 25. 2.One-to-many relationship When only one instance of the entity on the left, and more than one instance of an entity on the right associates with the relationship then this is known as a one-to-many relationship. For example, Scientist can invent many inventions, but the invention is done by the only specific scientist.
  • 26. 3.Many-to-one relationship When more than one instance of the entity on the left, and only one instance of an entity on the right associates with the relationship then it is known as a many-to-one relationship. For example, Student enrolls for only one course, but a course can have many students.
  • 27. 4.Many-to-many relationship When more than one instance of the entity on the left, and more than one instance of an entity on the right associates with the relationship then it is known as a many- to-many relationship. For example, Employee can assign by many projects and project can have many employees.
  • 28. Life is Art Live yours in color .