Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Relations create the database. They must satisfy various properties, like no duplicate tuples, no ordering of tuples, and atomic attributes, etc. Relations that satisfy these basic needs may still have some undesirable characteristics such as data redundancy, and anomalies.
What are these undesirable characteristics and how can we eliminate them from the database system? This part is an attempt to answer this question. Though, please note that most of these undesirable properties do not arise if the database modelling has been carried out very carefully using some method like the Entity-Relationship Model. It is still important to use the methods in this unit to check the database that has been acquired and ensure that no mistakes have been made in modeling.
The central thought in these discussions is the concept of Database integrity, the notion of functional dependency, which rely on understanding the semantics of the data and which deals with what information in a relation is dependent on what other information in the relation. Our prime objective in this section is to describe the concept of data integrity, functional dependence and then describes normal forms using functional dependencies and using other types of data dependencies.
OBJECTIVES
After reading this section you should be able to
What is a hashing function? What are the properties of a good hashing function? Describe the folding technique for hashing functions. Ans: Hashing function is a method
What are the technique to define a schema completely ? A schema is completely define by DDL and DML query language.
What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att
What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar
Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014
the of super market system done in database
Ask questApollo Hospitals (AH) is a popular medical service provider in Oman. AH wants to automate its business functions into an information system. The proposed information syst
To delete a particular column in a relation which command is used ? To delete a particular column in a relation ALTER command is used.
Explain four causes for failures in data warehouse projects
Define the term Domain. For each n every attribute there is a set of permitted values known as the domain of that attribute.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd