How Referential Integrity Works

There are four types of referential integrity constraints that can be employed. The four types are restricted deletes, restricted inserts, cascading deletes, and cascading updates. The name of each constraint accurately describes the respective function. The following section describes the different types of referential integrity constraints as well as how to employ the constraints. Each constraint will be illustrated in the context of Client and Contact tables of the Time Entry and Billing Database.

Establishing Referential Integrity Rules for the TEB Database

Before you can see how the various constraints work, the database needs to be equipped with the capability to support referential integrity. In Chapter ...

Get Absolute Beginner’s Guide to Databases now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.