SlideShare une entreprise Scribd logo
1  sur  34
SQL
Constraint
Made By:
      Israa Al- Jarrah
                         CIS Dept-- IT
                         Faculty
SQL Constraint Meaning




                    Write Constraint




 Constraint Type
 Constraints can be specified when a table is created
   (with the CREATE TABLE statement) or after the
  table is created (with the ALTER TABLE statement)


     Constraints are used to limit the type of data
                that can go into a table.
Constraint   [Constraint name]   Constraint Type
You can define constraints syntactically in two ways:

    1.   As part of the definition of an individual column or
             attribute. This is called inline specification.

    2. As part of the table definition. This is called
             out-of-line specification.
Types of constraints:
     1.Integrity constraints
      2.Value constraints
Table constraint
     Restricts data value with
   respect to all other values in
                table
1. Not Null
2. Unique Key
3. Primary Key
4. Foreign Key
5. Check Key
6. Default Key
Not Null

 constraint enforces a column to NOT accept
 NULL values. constraint enforces a column to
           NOT accept NULL values.
 This means that you cannot insert a new
    record, or update a record without
        adding a value to this field.
 Expression of Not Null we use short cut NN
1. Not Null Example :-


Create Table Language
(
      Language_Name varchar2(30),
      Language_Id number(15)
Constraint
Constraint_Language_language_name
_NN
      Not Null
);
All other constraints
can be declared either
  inline or out of line.
2. Unique Key


  The UNIQUE constraint uniquely identifies
      each record in a database table.
2. Unique Key Example

Create Table Person
(
      Person_Id number(15)
      Constraint
Person_person_id_UN Unique
      Person_name varchar2(40),
     Person_BD Date
);
2. Unique Key Example

Create Table Person
(
       Person_Id number(15),
        Person_name varchar2(40),
         Person_BD Date
                 Constraint
   Person_person_id_UN Unique
             (Person_Id)
3. Primary Key


 Primary keys must contain unique values

   A primary key column cannot contain NULL
                     values.
     Each table should have a primary key, and each
           table can have only ONE primary key
3. Primary Key Example

CREATE TABLE locations_demo

    location_id NUMBER(4) Constraint
Constraint_loc_id_pk PRIMARY KEY ,
   street_address VARCHAR2(40) ,
    postal_code VARCHAR2(12)
);
3. Primary Key Example

CREATE TABLE locations_demo

    location_id NUMBER(4) ,
     street_address VARCHAR2(40) ,
     postal_code VARCHAR2(12) ,
    Constraint Constraint_loc_id_pk
PRIMARY KEY (Location_id)
);
Unique Key
Unique Key


               Primary Key
Unique Key
 Unique Key

 accept only one null value

    unique key use many time in
               table.
Primary Key
 Unique Key

Primary key does not accept null
             value
   primary key use only one time
               in table.
4. Foreign Key
      Unique Key
 A FOREIGN KEY in one table points to a PRIMARY KEY in
                     another table

       The FOREIGN KEY constraint is used to prevent actions
              that would destroy links between tables.
4. Foreign Key Example

     Unique Key
The "Persons" table:

P-Id     LastName     FirstName    Address      CIty

 1        Hansen         Ola      Timoteivn    Sandnes
                                     10
 2       Svendson       Tove      Borgvn23     Sandnes

 3        Pettersen     Kari      Storagt 20   Sandnes
4. Foreign Key Example

 Unique Key
The “Order" table:


      O_Id       OrderNo     P_id

       1             77895    3
       2             44678    3
       3             22456    2
       4             24562    1
4. Foreign Key Example

             "P_Id" column in the "Orders" table
              points to the "P_Id" column in the
                        "Persons" table.

        The "P_Id" column in the "Persons" table is
        the PRIMARY KEY in the "Persons" table.

        The "P_Id" column in the "Orders" table is
         a FOREIGN KEY in the "Orders" table.
4. Foreign Key Example
     First step must create “Person” Table
Create Table Person
(
   P_Id number Constraint
constraint_person_person_Id_PK primary key,
    LastName varcahr2(45),
    FirstName varchar2(45),
   Address varchar2(45),
   City varchar2(45)
);
4. Foreign Key Example


Create Table Order
(
Order_id number(15) CONSTRAINT
con_Order_id_pk Primary Key,
OredrNO number(30) ,
P_id number(15) CONSTRINT
con_person_order_id_FK refernace Person (p_id)
);
5. Check Key

 The CHECK constraint is used to limit the value range
            that can be placed in a column.

  If you define a CHECK constraint on a single column it
          allows only certain values for this column
5. Check Key Example

CREATE TABLE divisions
 (
div_no NUMBER CONSTRAINT check_divno
CHECK
(div_no BETWEEN 10 AND 99),

div_name VARCHAR2(9) CONSTRAINT
check_divname_cc CHECK
(div_name = UPPER(div_name))

);
5. Check Key
   6. Default Key

 The DEFAULT constraint is used to insert a default
                value into a column

  The default value will be added to all new records
 if no other value is specified
5. Check Key Example
   6. Default Key
CREATE TABLE Persons
(
    P_Id Number(15),
    LastName varchar(255),
    FirstName varchar(255),
    Address varchar(255),
    City varchar(255) DEFAULT 'Sandnes'
);
CONSTRAINT constraint_name
PRIMARY KEY (columnname1,
columnname2 …)
Create table person
(
           Person_ID Number(15),
         Person_phone number(15),
         Constraint con_person_un
     Unique(Person_ID,Person_Phone)
);
Reference
http://www.w3schools.com/sql/sql_constraints.asp

http://www.docs.oracle.com/cd/B19306_01/server.102/b142
00/clauses002.htm#i1015609
Thank you for listen
     Israa jarrah

Contenu connexe

Tendances (20)

Key and its different types
Key and its different typesKey and its different types
Key and its different types
 
Join
JoinJoin
Join
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
 
SQL BUILT-IN FUNCTION
SQL BUILT-IN FUNCTIONSQL BUILT-IN FUNCTION
SQL BUILT-IN FUNCTION
 
Joins in SQL
Joins in SQLJoins in SQL
Joins in SQL
 
Sql subquery
Sql  subquerySql  subquery
Sql subquery
 
Set operators
Set  operatorsSet  operators
Set operators
 
SQL JOIN
SQL JOINSQL JOIN
SQL JOIN
 
SQL Overview
SQL OverviewSQL Overview
SQL Overview
 
Oracle Database Trigger
Oracle Database TriggerOracle Database Trigger
Oracle Database Trigger
 
SQL Views
SQL ViewsSQL Views
SQL Views
 
Sql operators & functions 3
Sql operators & functions 3Sql operators & functions 3
Sql operators & functions 3
 
Sql queries presentation
Sql queries presentationSql queries presentation
Sql queries presentation
 
SQL
SQLSQL
SQL
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Aggregating Data Using Group Functions
Aggregating Data Using Group FunctionsAggregating Data Using Group Functions
Aggregating Data Using Group Functions
 
Algo>ADT list & linked list
Algo>ADT list & linked listAlgo>ADT list & linked list
Algo>ADT list & linked list
 
Introduction to-sql
Introduction to-sqlIntroduction to-sql
Introduction to-sql
 
Aggregate functions
Aggregate functionsAggregate functions
Aggregate functions
 
sql function(ppt)
sql function(ppt)sql function(ppt)
sql function(ppt)
 

En vedette

L2 acquisition
L2 acquisitionL2 acquisition
L2 acquisitionCameliaN
 
Including Constraints -Oracle Data base
Including Constraints -Oracle Data base Including Constraints -Oracle Data base
Including Constraints -Oracle Data base Salman Memon
 
SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...
SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...
SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...Marco M. Kiesewetter, MBA
 
SQL Server - Constraints
SQL Server - ConstraintsSQL Server - Constraints
SQL Server - ConstraintsAaron Buma
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraintsmadhav bansal
 
SQL Tutorial - Table Constraints
SQL Tutorial - Table ConstraintsSQL Tutorial - Table Constraints
SQL Tutorial - Table Constraints1keydata
 
Second Language Acquisition
Second Language AcquisitionSecond Language Acquisition
Second Language Acquisitionvictorgaogao
 
Elt different methods & approaches
Elt different methods & approachesElt different methods & approaches
Elt different methods & approachesMuhammad Fauzan
 
Sql database object
Sql database objectSql database object
Sql database objectYoung Alista
 
Theory of constraints
Theory of constraintsTheory of constraints
Theory of constraintsMOHD ARISH
 

En vedette (18)

L2 acquisition
L2 acquisitionL2 acquisition
L2 acquisition
 
Including Constraints -Oracle Data base
Including Constraints -Oracle Data base Including Constraints -Oracle Data base
Including Constraints -Oracle Data base
 
Relational databe
Relational databeRelational databe
Relational databe
 
Sql xp 05
Sql xp 05Sql xp 05
Sql xp 05
 
SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...
SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...
SQL: Unique IDs, Primary Keys and Archiving Inactive Rows Without Violating C...
 
8. sql
8. sql8. sql
8. sql
 
SQL Server - Constraints
SQL Server - ConstraintsSQL Server - Constraints
SQL Server - Constraints
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
 
Parameter setting
Parameter settingParameter setting
Parameter setting
 
SQL Tutorial - Table Constraints
SQL Tutorial - Table ConstraintsSQL Tutorial - Table Constraints
SQL Tutorial - Table Constraints
 
Universal grammar
Universal grammarUniversal grammar
Universal grammar
 
Second Language Acquisition
Second Language AcquisitionSecond Language Acquisition
Second Language Acquisition
 
Elt different methods & approaches
Elt different methods & approachesElt different methods & approaches
Elt different methods & approaches
 
Sql database object
Sql database objectSql database object
Sql database object
 
Universal grammar
Universal grammarUniversal grammar
Universal grammar
 
Theory of constraints
Theory of constraintsTheory of constraints
Theory of constraints
 
Data integrity
Data integrityData integrity
Data integrity
 
Error localization
Error localizationError localization
Error localization
 

Similaire à oracle Sql constraint

Entigrity constraint
Entigrity constraintEntigrity constraint
Entigrity constraintsuman kumar
 
Lecture 4 sql {basics keys and constraints}
Lecture 4 sql {basics  keys and constraints}Lecture 4 sql {basics  keys and constraints}
Lecture 4 sql {basics keys and constraints}Shubham Shukla
 
MQSL JOINING OF TABLES.pptx
MQSL JOINING OF TABLES.pptxMQSL JOINING OF TABLES.pptx
MQSL JOINING OF TABLES.pptxlemonchoos
 
Sql integrity constraints
Sql integrity constraintsSql integrity constraints
Sql integrity constraintsVivek Singh
 
Sql server ___________session_15(data integrity)
Sql server  ___________session_15(data integrity)Sql server  ___________session_15(data integrity)
Sql server ___________session_15(data integrity)Ehtisham Ali
 
Sql ch 12 - creating database
Sql ch 12 - creating databaseSql ch 12 - creating database
Sql ch 12 - creating databaseMukesh Tekwani
 
CONSTRAINTS PPT.pptx
CONSTRAINTS PPT.pptxCONSTRAINTS PPT.pptx
CONSTRAINTS PPT.pptxThangaduraiA4
 
Integrity Constraints in Database Management System.pptx
Integrity Constraints in Database Management System.pptxIntegrity Constraints in Database Management System.pptx
Integrity Constraints in Database Management System.pptxPallaviPatil905338
 
RDBMS Lab03 applying constraints (UIU)
RDBMS Lab03 applying constraints (UIU)RDBMS Lab03 applying constraints (UIU)
RDBMS Lab03 applying constraints (UIU)Muhammad T Q Nafis
 
Mysql 120831075600-phpapp01
Mysql 120831075600-phpapp01Mysql 120831075600-phpapp01
Mysql 120831075600-phpapp01sagaroceanic11
 
03Constraints - last.pdf
03Constraints - last.pdf03Constraints - last.pdf
03Constraints - last.pdfssuserfd620b
 
Constraints
ConstraintsConstraints
Constraintspunu_82
 
introdution concept on _ _ sql_basic.ppt
introdution concept on _ _ sql_basic.pptintrodution concept on _ _ sql_basic.ppt
introdution concept on _ _ sql_basic.pptriscomputersir
 

Similaire à oracle Sql constraint (20)

Entigrity constraint
Entigrity constraintEntigrity constraint
Entigrity constraint
 
Lecture 4 sql {basics keys and constraints}
Lecture 4 sql {basics  keys and constraints}Lecture 4 sql {basics  keys and constraints}
Lecture 4 sql {basics keys and constraints}
 
SQL & PLSQL
SQL & PLSQLSQL & PLSQL
SQL & PLSQL
 
MQSL JOINING OF TABLES.pptx
MQSL JOINING OF TABLES.pptxMQSL JOINING OF TABLES.pptx
MQSL JOINING OF TABLES.pptx
 
Sql integrity constraints
Sql integrity constraintsSql integrity constraints
Sql integrity constraints
 
Create table
Create tableCreate table
Create table
 
Sql server ___________session_15(data integrity)
Sql server  ___________session_15(data integrity)Sql server  ___________session_15(data integrity)
Sql server ___________session_15(data integrity)
 
Sql ch 12 - creating database
Sql ch 12 - creating databaseSql ch 12 - creating database
Sql ch 12 - creating database
 
CONSTRAINTS PPT.pptx
CONSTRAINTS PPT.pptxCONSTRAINTS PPT.pptx
CONSTRAINTS PPT.pptx
 
MY SQL
MY SQLMY SQL
MY SQL
 
Integrity Constraints in Database Management System.pptx
Integrity Constraints in Database Management System.pptxIntegrity Constraints in Database Management System.pptx
Integrity Constraints in Database Management System.pptx
 
RDBMS Lab03 applying constraints (UIU)
RDBMS Lab03 applying constraints (UIU)RDBMS Lab03 applying constraints (UIU)
RDBMS Lab03 applying constraints (UIU)
 
Sql
SqlSql
Sql
 
Mysql 120831075600-phpapp01
Mysql 120831075600-phpapp01Mysql 120831075600-phpapp01
Mysql 120831075600-phpapp01
 
03Constraints - last.pdf
03Constraints - last.pdf03Constraints - last.pdf
03Constraints - last.pdf
 
Integrity and security
Integrity and securityIntegrity and security
Integrity and security
 
Constraints
ConstraintsConstraints
Constraints
 
introdution concept on _ _ sql_basic.ppt
introdution concept on _ _ sql_basic.pptintrodution concept on _ _ sql_basic.ppt
introdution concept on _ _ sql_basic.ppt
 
Sql basics
Sql basicsSql basics
Sql basics
 
Introduction to sql
Introduction to sqlIntroduction to sql
Introduction to sql
 

Plus de home

Mobile security
Mobile securityMobile security
Mobile securityhome
 
Html5
Html5Html5
Html5home
 
svg Scalable Vector Graphics (SVG)
 svg Scalable Vector Graphics  (SVG) svg Scalable Vector Graphics  (SVG)
svg Scalable Vector Graphics (SVG)home
 
SVG
SVG SVG
SVG home
 
Working principle of the microwave1
Working principle of the microwave1Working principle of the microwave1
Working principle of the microwave1home
 
How to work cable network
How to work cable networkHow to work cable network
How to work cable networkhome
 

Plus de home (6)

Mobile security
Mobile securityMobile security
Mobile security
 
Html5
Html5Html5
Html5
 
svg Scalable Vector Graphics (SVG)
 svg Scalable Vector Graphics  (SVG) svg Scalable Vector Graphics  (SVG)
svg Scalable Vector Graphics (SVG)
 
SVG
SVG SVG
SVG
 
Working principle of the microwave1
Working principle of the microwave1Working principle of the microwave1
Working principle of the microwave1
 
How to work cable network
How to work cable networkHow to work cable network
How to work cable network
 

Dernier

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

oracle Sql constraint

  • 1. SQL Constraint Made By: Israa Al- Jarrah CIS Dept-- IT Faculty
  • 2. SQL Constraint Meaning Write Constraint Constraint Type
  • 3.  Constraints can be specified when a table is created (with the CREATE TABLE statement) or after the table is created (with the ALTER TABLE statement) Constraints are used to limit the type of data that can go into a table.
  • 4. Constraint [Constraint name] Constraint Type
  • 5. You can define constraints syntactically in two ways: 1. As part of the definition of an individual column or attribute. This is called inline specification. 2. As part of the table definition. This is called out-of-line specification.
  • 6. Types of constraints: 1.Integrity constraints 2.Value constraints Table constraint Restricts data value with respect to all other values in table
  • 7. 1. Not Null 2. Unique Key 3. Primary Key 4. Foreign Key 5. Check Key 6. Default Key
  • 8. Not Null  constraint enforces a column to NOT accept NULL values. constraint enforces a column to NOT accept NULL values.  This means that you cannot insert a new record, or update a record without adding a value to this field.  Expression of Not Null we use short cut NN
  • 9. 1. Not Null Example :- Create Table Language ( Language_Name varchar2(30), Language_Id number(15) Constraint Constraint_Language_language_name _NN Not Null );
  • 10.
  • 11. All other constraints can be declared either inline or out of line.
  • 12. 2. Unique Key The UNIQUE constraint uniquely identifies each record in a database table.
  • 13. 2. Unique Key Example Create Table Person ( Person_Id number(15) Constraint Person_person_id_UN Unique Person_name varchar2(40), Person_BD Date );
  • 14. 2. Unique Key Example Create Table Person ( Person_Id number(15), Person_name varchar2(40), Person_BD Date Constraint Person_person_id_UN Unique (Person_Id)
  • 15. 3. Primary Key  Primary keys must contain unique values  A primary key column cannot contain NULL values.  Each table should have a primary key, and each table can have only ONE primary key
  • 16. 3. Primary Key Example CREATE TABLE locations_demo location_id NUMBER(4) Constraint Constraint_loc_id_pk PRIMARY KEY , street_address VARCHAR2(40) , postal_code VARCHAR2(12) );
  • 17. 3. Primary Key Example CREATE TABLE locations_demo location_id NUMBER(4) , street_address VARCHAR2(40) , postal_code VARCHAR2(12) , Constraint Constraint_loc_id_pk PRIMARY KEY (Location_id) );
  • 18. Unique Key Unique Key Primary Key
  • 19. Unique Key Unique Key  accept only one null value  unique key use many time in table.
  • 20. Primary Key Unique Key Primary key does not accept null value  primary key use only one time in table.
  • 21. 4. Foreign Key Unique Key  A FOREIGN KEY in one table points to a PRIMARY KEY in another table  The FOREIGN KEY constraint is used to prevent actions that would destroy links between tables.
  • 22. 4. Foreign Key Example Unique Key The "Persons" table: P-Id LastName FirstName Address CIty 1 Hansen Ola Timoteivn Sandnes 10 2 Svendson Tove Borgvn23 Sandnes 3 Pettersen Kari Storagt 20 Sandnes
  • 23. 4. Foreign Key Example Unique Key The “Order" table: O_Id OrderNo P_id 1 77895 3 2 44678 3 3 22456 2 4 24562 1
  • 24. 4. Foreign Key Example "P_Id" column in the "Orders" table points to the "P_Id" column in the "Persons" table. The "P_Id" column in the "Persons" table is the PRIMARY KEY in the "Persons" table. The "P_Id" column in the "Orders" table is a FOREIGN KEY in the "Orders" table.
  • 25. 4. Foreign Key Example First step must create “Person” Table Create Table Person ( P_Id number Constraint constraint_person_person_Id_PK primary key, LastName varcahr2(45), FirstName varchar2(45), Address varchar2(45), City varchar2(45) );
  • 26. 4. Foreign Key Example Create Table Order ( Order_id number(15) CONSTRAINT con_Order_id_pk Primary Key, OredrNO number(30) , P_id number(15) CONSTRINT con_person_order_id_FK refernace Person (p_id) );
  • 27. 5. Check Key  The CHECK constraint is used to limit the value range that can be placed in a column.  If you define a CHECK constraint on a single column it allows only certain values for this column
  • 28. 5. Check Key Example CREATE TABLE divisions ( div_no NUMBER CONSTRAINT check_divno CHECK (div_no BETWEEN 10 AND 99), div_name VARCHAR2(9) CONSTRAINT check_divname_cc CHECK (div_name = UPPER(div_name)) );
  • 29. 5. Check Key 6. Default Key  The DEFAULT constraint is used to insert a default value into a column  The default value will be added to all new records if no other value is specified
  • 30. 5. Check Key Example 6. Default Key CREATE TABLE Persons ( P_Id Number(15), LastName varchar(255), FirstName varchar(255), Address varchar(255), City varchar(255) DEFAULT 'Sandnes' );
  • 31. CONSTRAINT constraint_name PRIMARY KEY (columnname1, columnname2 …)
  • 32. Create table person ( Person_ID Number(15), Person_phone number(15), Constraint con_person_un Unique(Person_ID,Person_Phone) );
  • 34. Thank you for listen Israa jarrah