Normalization and types of normalization, DOT NET Programming

Assignment Help:

What is normalization & what are the types of normalization?

Normalization is a set of rules that have been established to aid in the design of tables that are meant to be connected through relationships. This set of rules is termed as Normalization.

The advantages of normalizing your database will include following points:

  • Avoiding of the repetitive entries
  • Reducing the required storage space
  • Preventing the need to restructure existing tables to accommodate the new data.
  • To increased the flexibility of queries, speed and sorts, and summaries.

The three normal forms are illustrated below:-

1)First Normal Form :

For a table to be in the first normal form, the data must be broken up into the smallest possible units .In addition to breaking the data  into the smallest meaningful values, the tables in first normal form should not contain any repetitions groups of fields.

409_first normal form.png

Figure :- Repeating groups example

For this in the above example city1 & city2 are repeating.In order to show this table to be in First normal form you have to change the table structure as follows.Also note that the Customer Name is now broken down to first name and the last name (First normal form data must be broken down to smallest unit).

14_second normal form.png

2)Second Normal form:

The second normal form states that every field in a multiple field, primary keytable should be directly related to the whole primary key. Or in the other words, each non-key field must be a fact of about all the fields in the primary key. In the  table above of customer, the city is not linked to any primary field.

1809_second normal form1.png

Figure:- Normalized customer table.

2108_second normal form2.png

Figure :- City is now shifted to a different master table.

3)Third normal form:

The non-key field should not depend on other Non-key field. The field "Total" is dependent on the "Unit price" and the "qty".

930_thid normal form.png

Figure :- Fill third normal form


Related Discussions:- Normalization and types of normalization

Develop a new website, I need to develop a new website. Previous site was n...

I need to develop a new website. Previous site was not good and I need better one with not only static but using also more details . Skills required: .NET, MySQL, C# Programm

V model in testing, What is V model in testing? The V model map's the t...

What is V model in testing? The V model map's the type of test to the stage of development in the project. Figure: - V Model 1) Unit Testing: The Starting fro

I need a project which shows paypal integration with asp.net, I need a proj...

I need a project which shows Paypal integration with ASP.net website We have events website written in C# and ASP.net. We want to integrate Paypal using API and have a full inte

Explain the concept of destructor, Explain the concept of destructor? A...

Explain the concept of destructor? A destructor is a special method for a class and is requested automatically when an object is finally destroyed. The name of the destructor i

I need to duplicate a website, Duplicate a Website I need a customer man...

Duplicate a Website I need a customer management site Please help me out and what I need to get. I need all charteristics of above mentioned site a) Effects b) Mobil

What is xpath, What is XPath? XPath stands for XML Path. It is a langua...

What is XPath? XPath stands for XML Path. It is a language used to access dissimilar parts of an XML document, such as elements and attributes.

Raid and its working, What is RAID and how does it work? The Redundant ...

What is RAID and how does it work? The Redundant Array of Independent Disks (RAID) is a term used for describing the technique of improving data availability through the use of

Wrapper for ffmpeg, Help with making a wrapper in c# for ffmpeg to extract ...

Help with making a wrapper in c# for ffmpeg to extract audio from video

How does cas works, How does CAS works? There are two key methods of CA...

How does CAS works? There are two key methods of CAS security policy- code groups and permissions. A code group contains assemblies in it in a manner that each .NET assembly is

CSS, Howto create a simple stylesheet for a web application

Howto create a simple stylesheet for a web application

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd