Best Practices for Primary Key and Unique Key Constraints
By James Seymour
Not yet rated.
Published: July 22, 2012
Words: 4,215 (approximate)
The purpose of this document is to understand primary and unique key constraints as a very important general concept in data integrity enforcement in both database design and database management.
Unlike check constraints and referential integrity (foreign key) constraints, primary and unique key constraints are not only critical to proper database design and database management, the rules for their use and the use itself must not vary. Primary and unique key constraints need to be properly applied and administered from the starting existence of a normalized table in a normalized database.
This document presents best practices for understanding primary and unique key constraints plus deciding how to use primary and unique key constraints.
, data integrity
, primary keys
, unique keys
, surrogate key
, composite key
Single purchase gains access to all formats. How to download ebooks to e-reading devices and apps.
||Sample First 10%
|Online Reading (HTML, good for sampling in web browser)||Buy||View sample|
|Kindle (.mobi for Kindle devices and Kindle apps)||Buy||Download sample|
|Epub (Apple iPad/iBooks, Nook, Sony Reader, Kobo, and most e-reading apps including Stanza, Aldiko, Adobe Digital Editions, others)||Buy||Download sample|
|PDF (good for reading on PC, or for home printing)||Buy||No sample available|
|RTF (readable on most word processors)||Buy||No sample available|
|LRF (Use only for older model Sony Readers that don't support .epub)||Buy||Download sample|
|Palm Doc (PDB) (for Palm reading devices)||Buy||Download sample|
|Plain Text (download) (flexible, but lacks much formatting)||Buy||No sample available|
|Plain Text (view) (viewable as web page)||Buy||No sample available|
Log-in to write a Review
Log-in to add a Video Review
This book has not yet been reviewed.