Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Oracle Database XE 11gR2 Jump Start Guide

You're reading from   Oracle Database XE 11gR2 Jump Start Guide Build and manage your Oracle Database 11g XE environment with this fast paced, practical guide with this book and ebook.

Arrow left icon
Product type Paperback
Published in Jul 2012
Publisher Packt
ISBN-13 9781849686747
Length 146 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Asif Momen Asif Momen
Author Profile Icon Asif Momen
Asif Momen
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Oracle Database XE 11gR2 Jump Start Guide
Credits
About the Author
Acknowledgement
About the Reviewers
1. www.PacktPub.com
2. Preface
1. Database Editions and Oracle Database XE FREE CHAPTER 2. Installing and Uninstalling Oracle Database XE 3. Connecting and Configuring Oracle Database 11g XE 4. Accessing Table Data, DML Statements, and Transactions 5. Creating and Managing Schema Objects 6. Developing Stored Subprograms and Triggers 7. Building a Sample Application with Oracle Application Express 8. Managing Database and Database Storage 9. Moving Data between Oracle Databases 10. Upgrading Oracle Database 11g XE to Other Database Editions 11. Backup and Recovery 12. Tuning Oracle Database 11g XE Features Available with Oracle Database 11g XE

Integrity constraints


Data stored in the database must adhere to certain business rules. An integrity constraint defines a business rule for a table column. When the integrity constraint is enabled, Oracle will enforce the business rule. Integrity constraints are stored as part of table definition within the database.

The following are the integrity constraints:

  • NOT NULL: The NOT NULL constraint enforces a column to not accept null values.

  • CHECK: The CHECK constraint is used to limit the values that are accepted by a column.

  • UNIQUE: The UNIQUE constraint is used to make sure that no duplicate values are entered in the column.

  • PRIMARY KEY: The PRIMARY KEY constraint is used to uniquely identify a row in a table. PRIMARY KEY can be thought of as a combination of the UNIQUE key and NOT NULL constraints. Furthermore, a table can have only one primary key.

  • FOREIGN KEY: A foreign key column is used to establish link between two tables. The FOREIGN KEY constraint on a column ensures that the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image