Rules of data normalisation, Database Management System

Assignment Help:

Rules Of Data Normalisation

 Let us now summarise Normalisation with the help of various clean rules. The following are the necessary rules for the Normalisation process:

1.   Eliminate Repeating Groups: Make an individual relation for each set of related attributes, and give every relation a primary key.

2.   Eliminate Redundant Data: If an attribute relies on only part of a multi- attribute key, remove it to an individual relation.

3.   Eliminate Columns Not Dependent On Key: If attributes do not give to a description of the key, remove them to a individual relation.

4.   Isolate Independent Multiple Relationships: No relation may have two or more 1:n or n:m relationships that are not directly linked.

5.   Isolate Semantically Related Multiple Relationships: There may be practical constrains on information that give explanation for separating logically related many-to-many relationships.

Let's define these steps of Normalisation through an instance:

 Let us make a file of all the employees in the company. In the original employee file, every employee name is pursued by any databases that the member has experience with. Some may know many, and others may not know any.

Emp-ID

Emp-Name

Database-Known

Department

Department- Loc

1

Gurpreet

Malhotra

Oracle,

A

N-Delhi

2

Faisal Khan

Access

A

N-Delhi

3

Manisha Kukreja

FoxPro

B

Agra

4

Sameer Singh

DB2, Oracle

C

Mumbai


Related Discussions:- Rules of data normalisation

What is a checkpoint, What is a checkpoint? List the operations to be perfo...

What is a checkpoint? List the operations to be performed by the system when a checkpoint is to be taken. What does the recovery system do if there is a crash? There is large n

Illustrate the deployment diagram, Illustrate the Deployment Diagram A...

Illustrate the Deployment Diagram A deployment diagram shows all nodes on network, their processor execution and interconnections. In a dynamic model, this is used to represen

How to deal with the authentication problem, Most computer systems authenti...

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,

Design and building a distributed information system, prototype of a distri...

prototype of a distributed information system for a national car part retail outlet chain.

Physical dbms architecture, PHYSICAL DBMS ARCHITECTURE  The physical ...

PHYSICAL DBMS ARCHITECTURE  The physical architecture defines the software components used to process and enter data, and how these software components are related and interc

Differance between open addressing and chaining collision, Differance betwe...

Differance between Open addressing and chaining for collision resolution ? In open addressing , proceeding from the occupied position specified by hash address the program che

A basic model of database access control, A basic model of Database Access ...

A basic model of Database Access Control Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple mode

Case-based online phone repair, please i request for your assistance in de...

please i request for your assistance in developing a case-based online phone repair

What is specialization, What is Specialization? Specialization: Special...

What is Specialization? Specialization: Specialization permits you to describe new types of information (new structural types or latest domains of information), although reusin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd