O'Reilly logo

Absolute Beginner’s Guide to Databases by John V. Petersen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Referential Integrity Works

There are four types of referential integrity constraints that can be employed. The four types are restricted deletes, restricted inserts, cascading deletes, and cascading updates. The name of each constraint accurately describes the respective function. The following section describes the different types of referential integrity constraints as well as how to employ the constraints. Each constraint will be illustrated in the context of Client and Contact tables of the Time Entry and Billing Database.

Establishing Referential Integrity Rules for the TEB Database

Before you can see how the various constraints work, the database needs to be equipped with the capability to support referential integrity. In Chapter ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required