answersLogoWhite

0


Best Answer

The use of Foreign key constraints together with the use of proper field formats and lenghths. You can also use defaults and rules.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What methods would you use to maintain the integrity of the data in your database?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How would you describe a database program?

Database software, such as Microsoft Access, allows users to maintain records of related information.


What does a database expert mean when she says that a databse displays both entity and referential integrity?

Entity integrity, also known as a check constraint, is a database imposed restriction that the value of a field be limited. For instance, you could say that a number can only be in the range of 1 to 100, and the database would not allow you to insert or modify a row to have a value outside that range.Referential integrity, also known as a foreign key constraint, is a database imposed restriction that the value of a field be contained in the primary key or a unique key associated with another table. For instance, you could say that a programmer's name be contained in a table of employees, and the database would not allow you to insert or modify a row to have a programmer that is not also an employee. In this example, to clarify, the employee table would contain people that are programmers, as well as analysts, managers, officers, etc.


How do you maintain database without any duplicates?

Hello, There are many kind of softwares to maintain the database. I tried with many software and finally settled with data match 2009 from dataladder.com In the dataladder.com there is a free trial, it has many features like merge database, purge database, deduplication software, data cleansing software and eliminating for mainting the databases. Further check it out the free trial http://www.dataladder.com/Download.htm and proceed with the same. I hope this would be useful for your database. Thanks


In what field is referential integrity applied?

Referential integrity is commonly applied in database management. It ensures that relationships between tables are maintained by enforcing constraints to prevent actions that would result in orphaned records or data inconsistencies.


Why would you use database?

why would you use database?


Is database hardware?

A database manager is a computer program (or programs) that manages database information. Most database programs can be purchased or obtained from many places and installed on a computer. That makes it software.If the database program is part of and supplied with the computer vendors system, than it is system software.It is possible to securely store the database program in a type of memory where its location is fixed and not changeable using normal programming methods. That would make it firmware.If the database software is implemented in the actual computer machinery and not changeable without replacing or changing computer components, it would be hardware.


What role does a foreign key play in the establishment of a relationship between two entities or tables?

A foreign key is a column or a set of columns in one table that references the primary key in another table, creating a relationship between the two. This relationship ensures data integrity by enforcing referential integrity constraints, allowing for the proper establishment of connections between related data in a database. It helps maintain data consistency by preventing actions that would create orphaned records or violate the defined relationship between the tables.


Difference between database integrity and database security?

Integrity is related to trust in terms of the data. We need to be sure that the data is being retrieved accurately. Particularly when there are multiple tables that are linked to each other, we need to be sure we can trust those links so that data can be selected from linked databases. This is all about database integrity. Database security is making sure the database is safe. Different people may have different levels of access and some people should have no access at all. Things like passwords and other security measures will do this. Some users may be allowed to see data, but not change it. Some users may only be able to see some data that is relevant to what they need to do, but not have access to other data. So for example, in a company only the people that work in the wages department will have access to that data and the ability to change it. People in other department would not be able to do that. That is all part of database security.


When would it make sense not to use a database system?

It may not make sense to use a database system for simple, small-scale applications or projects that do not require complex data management or querying capabilities. Additionally, if the data storage and retrieval needs are minimal and can be efficiently managed using flat files or basic data structures, a database system may be unnecessary.


Enter on the database or in the database?

We would use in rather than on. Data is stored in a database, not on a database. Data is entered into a database not onto a database.


Why would you use a database?

you would use a database? You would use it to store data


What is Integrity according to Computer Security?

In the context of computer security, "integrity" is the "I" in the "CIA" triad, i.e. Confidentiality, Integrity, and Availability. Integrity refers specifically to data being protected from unauthorized changes. The changes could be intentional, accidental, or simple corruption. Intentional changes could be things like an intruder trying to cover his tracks by modifying the log files to delete entries showing his activity or someone hacking into a a school database to change their grade in a class. Man-in-the-middle attacks can be attacks on integrity where a message is intercepted, modified, and then forwarded to the intended recipient. Accidental changes would be things like someone deleting data by executing the wrong command. An example of corruption would be a software flaw that allows overwriting database files when someone inserts a string that is longer than intended in a data field and the input is not validated before the write is executed.