SlideShare a Scribd company logo
1 of 12
KEYS IN DBMS
PRESENTED BY,
KANTA ANURAG SHAOO : -220301120178
SUBHRASIS BISWAL : -220301120168
Introduction
Types Of Key
Conclusion
1.
2.
3.
CONTENTS
 Keys are used to ensure unique identification
of records in a database.
 They help in defining integrity constraints
and linking data between tables.
 Keys can be a combination of multiple
attributes or a single attribute.
 Their purpose is to provide every record with
a unique identity.
Introduction
Keys
Primary Key
Composite
Key
Super Key
Foreign Key
Candidate Key
Alternate Key
1.
4.
5.
2. 3.
6.
 A Primary key is the column or columns that contain values that uniquely
identify each row in a table.
 The value of a primary key can’t be null.
 It should not allowed duplicate value
Primary Key
 A candidate key is an attribute or set of attributes that can
uniquely identify a tuple(A tuple in DBMS is a collection of
attribute values in which no two unique items
have the same name.).
 Except for the primary key, the remaining attributes are
considered a candidate key.
 The candidate keys are as strong as the primary key
Candidate key
 It is a column or group of columns that uniquely identify every row in a
table.
 A table can have multiple choices for a primary key but only one can be
set as primary key and rest are known as alternate key.
Alternate key
 A composite key is a candidate key that consists of two or
more attributes (table columns) that together uniquely
identify an entity occurrence (table row).
 Overall, composite keys are an important concept in database
design and can be used to ensure data integrity and create
relationships between tables.
Composite
key
 In the context of databases, a super key is a set of one or more attributes
or columns in a table that can uniquely identify each row in that table.
 Unlike a primary key, a super key may not be minimal, meaning it may
contain additional attributes beyond those necessary to uniquely identify
each row.
 It support null value.
Super key
 Foreign key are the column of an a table used to point to the
primary key.
 Foreign keys allow key values that are all NULL.
Foreign key
 In a database management system (DBMS), a key is a field or combination of
fields that uniquely identifies each record or row in a table.
 Keys are used to ensure the integrity of the data in a database by enforcing
rules that prevent duplicate records and maintain consistency.
 keys play a crucial role in a DBMS by ensuring data integrity and maintaining
consistency. They help to establish relationships between tables and enforce
referential integrity, which is important for maintaining the accuracy and
reliability of data in a database.
Conclusion
THANK YOU

More Related Content

Similar to key.pptx

Understanding Entity Relationship Models
Understanding Entity Relationship ModelsUnderstanding Entity Relationship Models
Understanding Entity Relationship Models
HamzaNadeem527928
 

Similar to key.pptx (20)

Referential integrity
Referential integrityReferential integrity
Referential integrity
 
Database Keys & Relationship
Database Keys & RelationshipDatabase Keys & Relationship
Database Keys & Relationship
 
2 - Keys.pdf
2 - Keys.pdf2 - Keys.pdf
2 - Keys.pdf
 
DATABASE CONCEPTS AND PRACTICAL EXAMPLES
DATABASE CONCEPTS AND PRACTICAL EXAMPLESDATABASE CONCEPTS AND PRACTICAL EXAMPLES
DATABASE CONCEPTS AND PRACTICAL EXAMPLES
 
Keys in dbms(UNIT 2)
Keys in dbms(UNIT 2)Keys in dbms(UNIT 2)
Keys in dbms(UNIT 2)
 
Introduction of DBMS
Introduction of DBMSIntroduction of DBMS
Introduction of DBMS
 
Understanding Entity Relationship Models
Understanding Entity Relationship ModelsUnderstanding Entity Relationship Models
Understanding Entity Relationship Models
 
Intro to Data warehousing lecture 12
Intro to Data warehousing   lecture 12Intro to Data warehousing   lecture 12
Intro to Data warehousing lecture 12
 
B & c
B & cB & c
B & c
 
DBMS-Unit-2.pptx
DBMS-Unit-2.pptxDBMS-Unit-2.pptx
DBMS-Unit-2.pptx
 
DATABASE-1.pptx
DATABASE-1.pptxDATABASE-1.pptx
DATABASE-1.pptx
 
Dbms keys
Dbms keysDbms keys
Dbms keys
 
Keys in Database
Keys in DatabaseKeys in Database
Keys in Database
 
ans_dbms.pdf
ans_dbms.pdfans_dbms.pdf
ans_dbms.pdf
 
Keys.pptx
Keys.pptxKeys.pptx
Keys.pptx
 
Relational database management system
Relational database management systemRelational database management system
Relational database management system
 
Unit 2 DBMS.pptx
Unit 2 DBMS.pptxUnit 2 DBMS.pptx
Unit 2 DBMS.pptx
 
Doc 20191022-wa0041
Doc 20191022-wa0041Doc 20191022-wa0041
Doc 20191022-wa0041
 
Ankit
AnkitAnkit
Ankit
 
Types of keys dbms
Types of keys dbmsTypes of keys dbms
Types of keys dbms
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

key.pptx

  • 1. KEYS IN DBMS PRESENTED BY, KANTA ANURAG SHAOO : -220301120178 SUBHRASIS BISWAL : -220301120168
  • 3.  Keys are used to ensure unique identification of records in a database.  They help in defining integrity constraints and linking data between tables.  Keys can be a combination of multiple attributes or a single attribute.  Their purpose is to provide every record with a unique identity. Introduction
  • 4. Keys Primary Key Composite Key Super Key Foreign Key Candidate Key Alternate Key 1. 4. 5. 2. 3. 6.
  • 5.  A Primary key is the column or columns that contain values that uniquely identify each row in a table.  The value of a primary key can’t be null.  It should not allowed duplicate value Primary Key
  • 6.  A candidate key is an attribute or set of attributes that can uniquely identify a tuple(A tuple in DBMS is a collection of attribute values in which no two unique items have the same name.).  Except for the primary key, the remaining attributes are considered a candidate key.  The candidate keys are as strong as the primary key Candidate key
  • 7.  It is a column or group of columns that uniquely identify every row in a table.  A table can have multiple choices for a primary key but only one can be set as primary key and rest are known as alternate key. Alternate key
  • 8.  A composite key is a candidate key that consists of two or more attributes (table columns) that together uniquely identify an entity occurrence (table row).  Overall, composite keys are an important concept in database design and can be used to ensure data integrity and create relationships between tables. Composite key
  • 9.  In the context of databases, a super key is a set of one or more attributes or columns in a table that can uniquely identify each row in that table.  Unlike a primary key, a super key may not be minimal, meaning it may contain additional attributes beyond those necessary to uniquely identify each row.  It support null value. Super key
  • 10.  Foreign key are the column of an a table used to point to the primary key.  Foreign keys allow key values that are all NULL. Foreign key
  • 11.  In a database management system (DBMS), a key is a field or combination of fields that uniquely identifies each record or row in a table.  Keys are used to ensure the integrity of the data in a database by enforcing rules that prevent duplicate records and maintain consistency.  keys play a crucial role in a DBMS by ensuring data integrity and maintaining consistency. They help to establish relationships between tables and enforce referential integrity, which is important for maintaining the accuracy and reliability of data in a database. Conclusion