Eliminate redundant data, Database Management System

Assignment Help:

 Eliminate Redundant Data

In the "Database Relation" above, the primary key is made up of the D-ID and the Emp-ID. The database-name relies only on the D-ID. The similar database-name will appear redundantly every time its associated D-ID appears in the Database Relation. The database relation has redundancy, for example D-ID value 4 is oracle is repetitive twice. In addition, it also experiences insertion anomaly that is we cannot enter Sybase in the relation as no employee has that skill.

The deletion anomaly also exists. For instance, if we remove employee with Emp-ID 3; no employee with FoxPro knowledge lefts and the information that D-ID 3 is the code of FoxPro will be gone.

To avoid these troubles, we require second normal form. To achieve this, we isolate the attributes depending on both parts of the key from those depending only on the D- ID. This result in two relations: "Database" which gives the name for every D-ID,

and "Emp-database" which lists the databases for each employee. The employee relation is already in 2NF as all the EMP-ID determines all different attributes

Employee Relation

 Emp-ID

Emp-Name

1

Gurpreet Malhotra

2

Faisal Khan

3

Manisha Kukreja

4

Sameer Singh

 

Emp-database

Relation

Emp-ID

D-ID

2

1

4

2

3

3

1

4

4

4

 

 

 

 

Database Relation

D-ID

Database

1

Access

2

DB2

3

FoxPro

4

Oracle


Related Discussions:- Eliminate redundant data

Difference between a composite key and attribute, Question: (a) Discuss...

Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam

Define tuple variable, Define tuple variable Tuple variable is a type o...

Define tuple variable Tuple variable is a type of variable whose domain is the set of all tuples.

Define upgrade and downgrade, Define upgrade and downgrade? It gives a ...

Define upgrade and downgrade? It gives a mechanism for conversion from shared lock to exclusive lock is called as upgrade. It gives a mechanism for conversion from exclusive

System level permissions-data control, System level permissions : With the ...

System level permissions : With the use of data dictionary you can view them.       Let us take the table name as user_sys_privs (used in oracle).       DESCRIBE USER_SYS_PRI

Mobile database, write short note on mobile database

write short note on mobile database

Differance between ddl and sdl, Differance between DDL and SDL? DDL and...

Differance between DDL and SDL? DDL and SDL - The data definition language (DDL) is used through DBA and database designers to describe internal schema, conceptual schema, and

Briefly describe concurrency execution, Briefly describe concurrency execut...

Briefly describe concurrency execution? Lock - based protocols Locks There are several modes in which a data item may be locked in this section we restrict our attention

Write short notes on relational model, Write short notes on relational mode...

Write short notes on relational model The relational model uses a collection of tables to show both data and the relationships between those data. The relational model is an ex

Explain er relationship model, Explain ER Relationship model? An entity...

Explain ER Relationship model? An entity-relationship model (ERM): An entity-relationship model (ERM) is an abstract theoretical illustration of structured data. Entity-relatio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd