*To derive coloumn values automatically *To enforce complex integrity constraints *To enforce business rules. *To customize complex security authorizations *To maintain replicate tables *To audit data modification