SlideShare a Scribd company logo
1 of 15
INTRODUCTION

 There are some instances when a
  primary key doesn’t exist in the
  real world or when the existing
natural key might not be a suitable
           primary key.
SURROGATE KEY:

Is a primary key created by
the database designer to
simplify the identification of
entity instances.
ADVANTAGE
Since it has no intrinsic
meaning, values for it can be
generated by the DBMS to ensure
that unique values are always
provided.
TABLE 5.4


  DATE       TIME_START   TIME_END   ROOM      EVENT_NAME      PARTY_OF

6/17/2010     11:00AM      2:00PM    Allure      Burton           60
                                                 Wedding
6/17/2010     11:00AM      2:00PM    Bonanza   Adams Office       12

6/17/2010     3:00PM       5:30PM     Allure   Smith Family       15

6/17/2010     3:30PM       5:30PM    Bonanza   Adam’s Office      12

6/18/2010     1:00PM       3:00PM    Bonanza    Boy Scouts        33

6/18/2010     11:00AM      2:00PM     Allure     March of         25
                                                  Dines
6/18/2010     11:00AM     12:30PM    Bonanza   Smith Family       12
 Given the data shown in table 5.4 you would
          model the EVENT entity as:

EVENT(DATE, TIME_START, TIME_END,ROOM
        ,EVENT_NAME,PARTY_OF)
DATE TIME_ TIME        ROOM      EVENT_     PART
     START _EN                    NAME      Y_OF   What primary key would you
             D                                     suggest? In this case , there is no
6/17 11:00 2:00        Allure    Burton      60    simple natural key that could be
 /10  AM    PM                   Wedding
                                                   used as a primary key in the
6/17/   11:00   2:00   Bonanza   Adams       12    model. Based on the primary key
 10      AM     PM               Office            concepts you learned about in
                                                   previous chapters, you might
6/17/   3:00    5:30    Allure    Smith      15    suggest one of these options.
 10     PM      PM                Family

6/17/   3:30    5:30   Bonanza   Adam’s      12
 10     PM      PM                Office

                                                       (DATE, TIME_START, ROOM)
6/18/   1:00    3:00   Bonanza     Boy       33                    Or
 10     PM      PM                Scouts                (DATE, TIME_END, ROOM)
6/18/   11:00   2:00    Allure   March of    25
 10      AM     PM                Dines
6/18/   11:00   12:3 Bonanza      Smith      12
 10      AM     0PM               Family
DAT TIME_ TIME         ROOM     EVENT_     PART
 E  START _EN                    NAME      Y_OF        Assume you select the
            D                                     composite primary key (DATE,
                                                  TIME_START,ROOM) for the
6/17   11:00   2:00P   Allure   Burton      60    EVENT entity. Next ,you
/10     AM       M              Wedding
                                                  determine that one EVENT may
6/17   11:00   2:00P   Bonan    Adams       12    use many RESOURCES such as
/10     AM       M       za     Office            tables, projectors, pc and
                                                  stands, and that the same
6/17   3:00    5:30P   Allure    Smith      15    RESOURCE may be use for
/10    PM        M               Family           many EVENTS. The RESOURCE
                                                  entity would be represented by
6/17   3:30    5:30P   Bonan    Adam’s      12    the ff. attributes:
/10    PM        M       za      Office

6/18   1:00    3:00P   Bonan      Boy       33    RESOURCE
/10    PM        M       za      Scouts           (RSC_ID, RSC_DESCRIPTIO
6/18   11:00   2:00P   Allure   March of    25    N,RSC_TYPE, RSC_QTY,RS
/10     AM       M               Dines            C_PRICE)
6/18   11:00   12:30   Bonan     Smith      12
/10     AM      PM       za      Family
DATE TIME_ TIME       ROOM      EVENT    PART
     START _EN                  _NAME    Y_OF   Given the business rules, the M:N
             D                                  relationship between RESOURCE
                                                and EVENT would be represented
6/17   11:00   2:00    Allure   Burton    60
                                                via the EVNTRSC composite entity
/10     AM     PM               Weddi
                                                with a composite primary key as
                                  ng
                                                follows:
6/17   11:00   2:00   Bonanza   Adams     12
/10     AM     PM               Office            EVNTRSC (DATE, TIME
                                                  _START, ROOM, RSC_ID, QTY
6/17   3:00    5:30    Allure   Smith     15      _USED
/10    PM      PM               Family           You now have a lengthy four-
                                                 attribute composite primary key.
6/17   3:30    5:30   Bonanza Adam’s      12     What would happen if the
/10    PM      PM              Office            EVNTRSC entity’s primary key
                                                 were inherited by another
                                                 existence dependent entity? At
6/18   1:00    3:00   Bonanza    Boy      33     this point, you can see that the
/10    PM      PM               Scouts           composite primary key could
6/18   11:00   2:00    Allure   March     25     make the implementation of the
/10     AM     PM                of              database and program coding
                                Dines            unnecessarily complex.
6/18   11:00   12:3   Bonanza   Smith     12
Surrogate primary keys are accepted
   practice in today's complex data
            environments.
They are especially helpful when there
  is no natural key, when the selected
 candidate key has embedded semantic
     contents or when the selected
       candidate key is too long or
             cumbersome.
However , there is a trade-off; if you use
  a surrogate key, you must ensure that
     the candidate key of the entity in
 question performs properly through the
  use of “unique index” and “not null”
               constraints.
PREPARED BY:




   ROSELYN P. CEA
ALLYSA JANE CATALLA
      BLIS -III

More Related Content

Viewers also liked

Indexing languages
Indexing languagesIndexing languages
Indexing languages
yhen06
 
web tech
web techweb tech
web tech
yhen06
 
Markey encyclopedia
Markey encyclopediaMarkey encyclopedia
Markey encyclopedia
yhen06
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
yhen06
 
Evaluating different sources
Evaluating different sourcesEvaluating different sources
Evaluating different sources
yhen06
 
Project proposal final presentation
Project proposal  final presentationProject proposal  final presentation
Project proposal final presentation
yhen06
 
Informational web pages
Informational web pagesInformational web pages
Informational web pages
yhen06
 
Basic education department library
Basic education department libraryBasic education department library
Basic education department library
yhen06
 

Viewers also liked (8)

Indexing languages
Indexing languagesIndexing languages
Indexing languages
 
web tech
web techweb tech
web tech
 
Markey encyclopedia
Markey encyclopediaMarkey encyclopedia
Markey encyclopedia
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Evaluating different sources
Evaluating different sourcesEvaluating different sources
Evaluating different sources
 
Project proposal final presentation
Project proposal  final presentationProject proposal  final presentation
Project proposal final presentation
 
Informational web pages
Informational web pagesInformational web pages
Informational web pages
 
Basic education department library
Basic education department libraryBasic education department library
Basic education department library
 

More from yhen06

Story telling
Story tellingStory telling
Story telling
yhen06
 
National book week celebration
National book week celebrationNational book week celebration
National book week celebration
yhen06
 
Book fair
Book fairBook fair
Book fair
yhen06
 
Indexing languages (2)
Indexing languages (2)Indexing languages (2)
Indexing languages (2)
yhen06
 
Importance of database design (1)
Importance of database design (1)Importance of database design (1)
Importance of database design (1)
yhen06
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
yhen06
 
Dictionary aizel
Dictionary aizelDictionary aizel
Dictionary aizel
yhen06
 
Book of days and first - aubrey
Book of days and first  - aubreyBook of days and first  - aubrey
Book of days and first - aubrey
yhen06
 
Bibliographies (2)
Bibliographies (2)Bibliographies (2)
Bibliographies (2)
yhen06
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
yhen06
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
yhen06
 
Importance of data model
Importance of data modelImportance of data model
Importance of data model
yhen06
 
General factbooks
General factbooksGeneral factbooks
General factbooks
yhen06
 
Evaluating different sources maam she
Evaluating different sources maam sheEvaluating different sources maam she
Evaluating different sources maam she
yhen06
 
Nature of information
Nature of informationNature of information
Nature of information
yhen06
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
yhen06
 
Database management functions
Database management functionsDatabase management functions
Database management functions
yhen06
 
Indexing languages
Indexing languagesIndexing languages
Indexing languages
yhen06
 
Evaluating web resources
Evaluating web resourcesEvaluating web resources
Evaluating web resources
yhen06
 

More from yhen06 (20)

Story telling
Story tellingStory telling
Story telling
 
National book week celebration
National book week celebrationNational book week celebration
National book week celebration
 
Book fair
Book fairBook fair
Book fair
 
Indexing languages (2)
Indexing languages (2)Indexing languages (2)
Indexing languages (2)
 
Importance of database design (1)
Importance of database design (1)Importance of database design (1)
Importance of database design (1)
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Dictionary aizel
Dictionary aizelDictionary aizel
Dictionary aizel
 
Book of days and first - aubrey
Book of days and first  - aubreyBook of days and first  - aubrey
Book of days and first - aubrey
 
Bibliographies (2)
Bibliographies (2)Bibliographies (2)
Bibliographies (2)
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
 
Importance of data model
Importance of data modelImportance of data model
Importance of data model
 
General factbooks
General factbooksGeneral factbooks
General factbooks
 
Evaluating different sources maam she
Evaluating different sources maam sheEvaluating different sources maam she
Evaluating different sources maam she
 
Nature of information
Nature of informationNature of information
Nature of information
 
Advantages and disadvantages of digital library
Advantages and disadvantages of digital libraryAdvantages and disadvantages of digital library
Advantages and disadvantages of digital library
 
Database management functions
Database management functionsDatabase management functions
Database management functions
 
Indexing languages
Indexing languagesIndexing languages
Indexing languages
 
Evaluating web resources
Evaluating web resourcesEvaluating web resources
Evaluating web resources
 
Project proposal final presentation2
Project proposal  final presentation2Project proposal  final presentation2
Project proposal final presentation2
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Catalla & cea

  • 1.
  • 2. INTRODUCTION There are some instances when a primary key doesn’t exist in the real world or when the existing natural key might not be a suitable primary key.
  • 3. SURROGATE KEY: Is a primary key created by the database designer to simplify the identification of entity instances.
  • 4.
  • 5. ADVANTAGE Since it has no intrinsic meaning, values for it can be generated by the DBMS to ensure that unique values are always provided.
  • 6.
  • 7. TABLE 5.4 DATE TIME_START TIME_END ROOM EVENT_NAME PARTY_OF 6/17/2010 11:00AM 2:00PM Allure Burton 60 Wedding 6/17/2010 11:00AM 2:00PM Bonanza Adams Office 12 6/17/2010 3:00PM 5:30PM Allure Smith Family 15 6/17/2010 3:30PM 5:30PM Bonanza Adam’s Office 12 6/18/2010 1:00PM 3:00PM Bonanza Boy Scouts 33 6/18/2010 11:00AM 2:00PM Allure March of 25 Dines 6/18/2010 11:00AM 12:30PM Bonanza Smith Family 12
  • 8.  Given the data shown in table 5.4 you would model the EVENT entity as: EVENT(DATE, TIME_START, TIME_END,ROOM ,EVENT_NAME,PARTY_OF)
  • 9. DATE TIME_ TIME ROOM EVENT_ PART START _EN NAME Y_OF What primary key would you D suggest? In this case , there is no 6/17 11:00 2:00 Allure Burton 60 simple natural key that could be /10 AM PM Wedding used as a primary key in the 6/17/ 11:00 2:00 Bonanza Adams 12 model. Based on the primary key 10 AM PM Office concepts you learned about in previous chapters, you might 6/17/ 3:00 5:30 Allure Smith 15 suggest one of these options. 10 PM PM Family 6/17/ 3:30 5:30 Bonanza Adam’s 12 10 PM PM Office (DATE, TIME_START, ROOM) 6/18/ 1:00 3:00 Bonanza Boy 33 Or 10 PM PM Scouts (DATE, TIME_END, ROOM) 6/18/ 11:00 2:00 Allure March of 25 10 AM PM Dines 6/18/ 11:00 12:3 Bonanza Smith 12 10 AM 0PM Family
  • 10. DAT TIME_ TIME ROOM EVENT_ PART E START _EN NAME Y_OF Assume you select the D composite primary key (DATE, TIME_START,ROOM) for the 6/17 11:00 2:00P Allure Burton 60 EVENT entity. Next ,you /10 AM M Wedding determine that one EVENT may 6/17 11:00 2:00P Bonan Adams 12 use many RESOURCES such as /10 AM M za Office tables, projectors, pc and stands, and that the same 6/17 3:00 5:30P Allure Smith 15 RESOURCE may be use for /10 PM M Family many EVENTS. The RESOURCE entity would be represented by 6/17 3:30 5:30P Bonan Adam’s 12 the ff. attributes: /10 PM M za Office 6/18 1:00 3:00P Bonan Boy 33 RESOURCE /10 PM M za Scouts (RSC_ID, RSC_DESCRIPTIO 6/18 11:00 2:00P Allure March of 25 N,RSC_TYPE, RSC_QTY,RS /10 AM M Dines C_PRICE) 6/18 11:00 12:30 Bonan Smith 12 /10 AM PM za Family
  • 11. DATE TIME_ TIME ROOM EVENT PART START _EN _NAME Y_OF Given the business rules, the M:N D relationship between RESOURCE and EVENT would be represented 6/17 11:00 2:00 Allure Burton 60 via the EVNTRSC composite entity /10 AM PM Weddi with a composite primary key as ng follows: 6/17 11:00 2:00 Bonanza Adams 12 /10 AM PM Office EVNTRSC (DATE, TIME _START, ROOM, RSC_ID, QTY 6/17 3:00 5:30 Allure Smith 15 _USED /10 PM PM Family You now have a lengthy four- attribute composite primary key. 6/17 3:30 5:30 Bonanza Adam’s 12 What would happen if the /10 PM PM Office EVNTRSC entity’s primary key were inherited by another existence dependent entity? At 6/18 1:00 3:00 Bonanza Boy 33 this point, you can see that the /10 PM PM Scouts composite primary key could 6/18 11:00 2:00 Allure March 25 make the implementation of the /10 AM PM of database and program coding Dines unnecessarily complex. 6/18 11:00 12:3 Bonanza Smith 12
  • 12. Surrogate primary keys are accepted practice in today's complex data environments.
  • 13. They are especially helpful when there is no natural key, when the selected candidate key has embedded semantic contents or when the selected candidate key is too long or cumbersome.
  • 14. However , there is a trade-off; if you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use of “unique index” and “not null” constraints.
  • 15. PREPARED BY: ROSELYN P. CEA ALLYSA JANE CATALLA BLIS -III