SlideShare a Scribd company logo
INTRODUCTION

 There are some instances when a
  primary key doesn’t exist in the
  real world or when the existing
natural key might not be a suitable
           primary key.
SURROGATE KEY:

Is a primary key created by
the database designer to
simplify the identification of
entity instances.
ADVANTAGE
Since it has no intrinsic
meaning, values for it can be
generated by the DBMS to ensure
that unique values are always
provided.
TABLE 5.4


  DATE       TIME_START   TIME_END   ROOM      EVENT_NAME      PARTY_OF

6/17/2010     11:00AM      2:00PM    Allure      Burton           60
                                                 Wedding
6/17/2010     11:00AM      2:00PM    Bonanza   Adams Office       12

6/17/2010     3:00PM       5:30PM     Allure   Smith Family       15

6/17/2010     3:30PM       5:30PM    Bonanza   Adam’s Office      12

6/18/2010     1:00PM       3:00PM    Bonanza    Boy Scouts        33

6/18/2010     11:00AM      2:00PM     Allure     March of         25
                                                  Dines
6/18/2010     11:00AM     12:30PM    Bonanza   Smith Family       12
 Given the data shown in table 5.4 you would
          model the EVENT entity as:

EVENT(DATE, TIME_START, TIME_END,ROOM
        ,EVENT_NAME,PARTY_OF)
DATE TIME_ TIME        ROOM      EVENT_     PART
     START _EN                    NAME      Y_OF   What primary key would you
             D                                     suggest? In this case , there is no
6/17 11:00 2:00        Allure    Burton      60    simple natural key that could be
 /10  AM    PM                   Wedding
                                                   used as a primary key in the
6/17/   11:00   2:00   Bonanza   Adams       12    model. Based on the primary key
 10      AM     PM               Office            concepts you learned about in
                                                   previous chapters, you might
6/17/   3:00    5:30    Allure    Smith      15    suggest one of these options.
 10     PM      PM                Family

6/17/   3:30    5:30   Bonanza   Adam’s      12
 10     PM      PM                Office

                                                       (DATE, TIME_START, ROOM)
6/18/   1:00    3:00   Bonanza     Boy       33                    Or
 10     PM      PM                Scouts                (DATE, TIME_END, ROOM)
6/18/   11:00   2:00    Allure   March of    25
 10      AM     PM                Dines
6/18/   11:00   12:3 Bonanza      Smith      12
 10      AM     0PM               Family
DAT TIME_ TIME         ROOM     EVENT_     PART
 E  START _EN                    NAME      Y_OF        Assume you select the
            D                                     composite primary key (DATE,
                                                  TIME_START,ROOM) for the
6/17   11:00   2:00P   Allure   Burton      60    EVENT entity. Next ,you
/10     AM       M              Wedding
                                                  determine that one EVENT may
6/17   11:00   2:00P   Bonan    Adams       12    use many RESOURCES such as
/10     AM       M       za     Office            tables, projectors, pc and
                                                  stands, and that the same
6/17   3:00    5:30P   Allure    Smith      15    RESOURCE may be use for
/10    PM        M               Family           many EVENTS. The RESOURCE
                                                  entity would be represented by
6/17   3:30    5:30P   Bonan    Adam’s      12    the ff. attributes:
/10    PM        M       za      Office

6/18   1:00    3:00P   Bonan      Boy       33    RESOURCE
/10    PM        M       za      Scouts           (RSC_ID, RSC_DESCRIPTIO
6/18   11:00   2:00P   Allure   March of    25    N,RSC_TYPE, RSC_QTY,RS
/10     AM       M               Dines            C_PRICE)
6/18   11:00   12:30   Bonan     Smith      12
/10     AM      PM       za      Family
DATE TIME_ TIME       ROOM      EVENT    PART
     START _EN                  _NAME    Y_OF   Given the business rules, the M:N
             D                                  relationship between RESOURCE
                                                and EVENT would be represented
6/17   11:00   2:00    Allure   Burton    60
                                                via the EVNTRSC composite entity
/10     AM     PM               Weddi
                                                with a composite primary key as
                                  ng
                                                follows:
6/17   11:00   2:00   Bonanza   Adams     12
/10     AM     PM               Office            EVNTRSC (DATE, TIME
                                                  _START, ROOM, RSC_ID, QTY
6/17   3:00    5:30    Allure   Smith     15      _USED
/10    PM      PM               Family           You now have a lengthy four-
                                                 attribute composite primary key.
6/17   3:30    5:30   Bonanza Adam’s      12     What would happen if the
/10    PM      PM              Office            EVNTRSC entity’s primary key
                                                 were inherited by another
                                                 existence dependent entity? At
6/18   1:00    3:00   Bonanza    Boy      33     this point, you can see that the
/10    PM      PM               Scouts           composite primary key could
6/18   11:00   2:00    Allure   March     25     make the implementation of the
/10     AM     PM                of              database and program coding
                                Dines            unnecessarily complex.
6/18   11:00   12:3   Bonanza   Smith     12
Surrogate primary keys are accepted
   practice in today's complex data
            environments.
They are especially helpful when there
  is no natural key, when the selected
 candidate key has embedded semantic
     contents or when the selected
       candidate key is too long or
             cumbersome.
However , there is a trade-off; if you use
  a surrogate key, you must ensure that
     the candidate key of the entity in
 question performs properly through the
  use of “unique index” and “not null”
               constraints.
PREPARED BY:




   ROSELYN P. CEA
ALLYSA JANE CATALLA
      BLIS -III

More Related Content

Viewers also liked

Indexing languages
Indexing languagesIndexing languages
Indexing languages
yhen06
 
web tech
web techweb tech
web tech
yhen06
 
Markey encyclopedia
Markey encyclopediaMarkey encyclopedia
Markey encyclopedia
yhen06
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
yhen06
 
Evaluating different sources
Evaluating different sourcesEvaluating different sources
Evaluating different sources
yhen06
 
Project proposal final presentation
Project proposal  final presentationProject proposal  final presentation
Project proposal final presentation
yhen06
 
Informational web pages
Informational web pagesInformational web pages
Informational web pages
yhen06
 
Basic education department library
Basic education department libraryBasic education department library
Basic education department library
yhen06
 

Viewers also liked (8)

Indexing languages
Indexing languagesIndexing languages
Indexing languages
 
web tech
web techweb tech
web tech
 
Markey encyclopedia
Markey encyclopediaMarkey encyclopedia
Markey encyclopedia
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Evaluating different sources
Evaluating different sourcesEvaluating different sources
Evaluating different sources
 
Project proposal final presentation
Project proposal  final presentationProject proposal  final presentation
Project proposal final presentation
 
Informational web pages
Informational web pagesInformational web pages
Informational web pages
 
Basic education department library
Basic education department libraryBasic education department library
Basic education department library
 

More from yhen06

Story telling
Story tellingStory telling
Story telling
yhen06
 
National book week celebration
National book week celebrationNational book week celebration
National book week celebration
yhen06
 
Book fair
Book fairBook fair
Book fair
yhen06
 
Indexing languages (2)
Indexing languages (2)Indexing languages (2)
Indexing languages (2)
yhen06
 
Importance of database design (1)
Importance of database design (1)Importance of database design (1)
Importance of database design (1)
yhen06
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
yhen06
 
Dictionary aizel
Dictionary aizelDictionary aizel
Dictionary aizel
yhen06
 
Book of days and first - aubrey
Book of days and first  - aubreyBook of days and first  - aubrey
Book of days and first - aubrey
yhen06
 
Bibliographies (2)
Bibliographies (2)Bibliographies (2)
Bibliographies (2)
yhen06
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
yhen06
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
yhen06
 
Importance of data model
Importance of data modelImportance of data model
Importance of data model
yhen06
 
General factbooks
General factbooksGeneral factbooks
General factbooks
yhen06
 
Evaluating different sources maam she
Evaluating different sources maam sheEvaluating different sources maam she
Evaluating different sources maam she
yhen06
 
Nature of information
Nature of informationNature of information
Nature of information
yhen06
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
yhen06
 
Database management functions
Database management functionsDatabase management functions
Database management functions
yhen06
 
Indexing languages
Indexing languagesIndexing languages
Indexing languages
yhen06
 
Evaluating web resources
Evaluating web resourcesEvaluating web resources
Evaluating web resources
yhen06
 

More from yhen06 (20)

Story telling
Story tellingStory telling
Story telling
 
National book week celebration
National book week celebrationNational book week celebration
National book week celebration
 
Book fair
Book fairBook fair
Book fair
 
Indexing languages (2)
Indexing languages (2)Indexing languages (2)
Indexing languages (2)
 
Importance of database design (1)
Importance of database design (1)Importance of database design (1)
Importance of database design (1)
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Dictionary aizel
Dictionary aizelDictionary aizel
Dictionary aizel
 
Book of days and first - aubrey
Book of days and first  - aubreyBook of days and first  - aubrey
Book of days and first - aubrey
 
Bibliographies (2)
Bibliographies (2)Bibliographies (2)
Bibliographies (2)
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
 
Importance of data model
Importance of data modelImportance of data model
Importance of data model
 
General factbooks
General factbooksGeneral factbooks
General factbooks
 
Evaluating different sources maam she
Evaluating different sources maam sheEvaluating different sources maam she
Evaluating different sources maam she
 
Nature of information
Nature of informationNature of information
Nature of information
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
 
Database management functions
Database management functionsDatabase management functions
Database management functions
 
Indexing languages
Indexing languagesIndexing languages
Indexing languages
 
Evaluating web resources
Evaluating web resourcesEvaluating web resources
Evaluating web resources
 
Project proposal final presentation2
Project proposal  final presentation2Project proposal  final presentation2
Project proposal final presentation2
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 

Catalla & cea

  • 1.
  • 2. INTRODUCTION There are some instances when a primary key doesn’t exist in the real world or when the existing natural key might not be a suitable primary key.
  • 3. SURROGATE KEY: Is a primary key created by the database designer to simplify the identification of entity instances.
  • 4.
  • 5. ADVANTAGE Since it has no intrinsic meaning, values for it can be generated by the DBMS to ensure that unique values are always provided.
  • 6.
  • 7. TABLE 5.4 DATE TIME_START TIME_END ROOM EVENT_NAME PARTY_OF 6/17/2010 11:00AM 2:00PM Allure Burton 60 Wedding 6/17/2010 11:00AM 2:00PM Bonanza Adams Office 12 6/17/2010 3:00PM 5:30PM Allure Smith Family 15 6/17/2010 3:30PM 5:30PM Bonanza Adam’s Office 12 6/18/2010 1:00PM 3:00PM Bonanza Boy Scouts 33 6/18/2010 11:00AM 2:00PM Allure March of 25 Dines 6/18/2010 11:00AM 12:30PM Bonanza Smith Family 12
  • 8.  Given the data shown in table 5.4 you would model the EVENT entity as: EVENT(DATE, TIME_START, TIME_END,ROOM ,EVENT_NAME,PARTY_OF)
  • 9. DATE TIME_ TIME ROOM EVENT_ PART START _EN NAME Y_OF What primary key would you D suggest? In this case , there is no 6/17 11:00 2:00 Allure Burton 60 simple natural key that could be /10 AM PM Wedding used as a primary key in the 6/17/ 11:00 2:00 Bonanza Adams 12 model. Based on the primary key 10 AM PM Office concepts you learned about in previous chapters, you might 6/17/ 3:00 5:30 Allure Smith 15 suggest one of these options. 10 PM PM Family 6/17/ 3:30 5:30 Bonanza Adam’s 12 10 PM PM Office (DATE, TIME_START, ROOM) 6/18/ 1:00 3:00 Bonanza Boy 33 Or 10 PM PM Scouts (DATE, TIME_END, ROOM) 6/18/ 11:00 2:00 Allure March of 25 10 AM PM Dines 6/18/ 11:00 12:3 Bonanza Smith 12 10 AM 0PM Family
  • 10. DAT TIME_ TIME ROOM EVENT_ PART E START _EN NAME Y_OF Assume you select the D composite primary key (DATE, TIME_START,ROOM) for the 6/17 11:00 2:00P Allure Burton 60 EVENT entity. Next ,you /10 AM M Wedding determine that one EVENT may 6/17 11:00 2:00P Bonan Adams 12 use many RESOURCES such as /10 AM M za Office tables, projectors, pc and stands, and that the same 6/17 3:00 5:30P Allure Smith 15 RESOURCE may be use for /10 PM M Family many EVENTS. The RESOURCE entity would be represented by 6/17 3:30 5:30P Bonan Adam’s 12 the ff. attributes: /10 PM M za Office 6/18 1:00 3:00P Bonan Boy 33 RESOURCE /10 PM M za Scouts (RSC_ID, RSC_DESCRIPTIO 6/18 11:00 2:00P Allure March of 25 N,RSC_TYPE, RSC_QTY,RS /10 AM M Dines C_PRICE) 6/18 11:00 12:30 Bonan Smith 12 /10 AM PM za Family
  • 11. DATE TIME_ TIME ROOM EVENT PART START _EN _NAME Y_OF Given the business rules, the M:N D relationship between RESOURCE and EVENT would be represented 6/17 11:00 2:00 Allure Burton 60 via the EVNTRSC composite entity /10 AM PM Weddi with a composite primary key as ng follows: 6/17 11:00 2:00 Bonanza Adams 12 /10 AM PM Office EVNTRSC (DATE, TIME _START, ROOM, RSC_ID, QTY 6/17 3:00 5:30 Allure Smith 15 _USED /10 PM PM Family You now have a lengthy four- attribute composite primary key. 6/17 3:30 5:30 Bonanza Adam’s 12 What would happen if the /10 PM PM Office EVNTRSC entity’s primary key were inherited by another existence dependent entity? At 6/18 1:00 3:00 Bonanza Boy 33 this point, you can see that the /10 PM PM Scouts composite primary key could 6/18 11:00 2:00 Allure March 25 make the implementation of the /10 AM PM of database and program coding Dines unnecessarily complex. 6/18 11:00 12:3 Bonanza Smith 12
  • 12. Surrogate primary keys are accepted practice in today's complex data environments.
  • 13. They are especially helpful when there is no natural key, when the selected candidate key has embedded semantic contents or when the selected candidate key is too long or cumbersome.
  • 14. However , there is a trade-off; if you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use of “unique index” and “not null” constraints.
  • 15. PREPARED BY: ROSELYN P. CEA ALLYSA JANE CATALLA BLIS -III