What are the three data anomalies, Database Management System

Assignment Help:

What are the three data anomalies that are likely to occur as a result of data redundancy?  Can data redundancy be completely eliminated in database approach?  Why or why not?

Ans: The three sorts of anomalies that can take place in the database due to redundancy are insertion, deletion and modification or updation anomalies. Refer a relation emp_dept along with attributes: E#, Ename, Address, D#, Dname, Dmgr# with the primary key as E#.

 Insertion anomaly:  Let us suppose that a new department has been started by the organization but basically there is no employee appointed for that department, after that the tuple for this department cannot be inserted into this table as the E# will have NULL, which is not permitted as E# is primary key. This type of a problem in the relation in which some tuple cannot be inserted is termed as insertion anomaly.

Deletion anomaly:   Now refer there is just only one employee in some department and that employee leaves the firm, after that the tuple of that employee has to be deleted from the table, but additionally to that the information about the department as well will get deleted. This type of a problem in the relation where deletion of some tuples can lead to loss of some other data not intended to be eliminated is termed as deletion anomaly.

 Modification /update anomaly: Assume the manager of a department has changed, this needs that the Dmgr# in all the tuples corresponding to that department should be changed to reflect the new status. If we fail to update all the tuples of the given department, then two dissimilar records of employee working in similar department might depict different Dmgr# leading to contradiction in the database. This is termed as modification/update anomaly. 

The data redundancy: it Cannot be totally removed from the database, although there should be controlled redundancy, for instance, consider a relation student_report(S#, Sname, Course#, SubjectName, marks) to store the marks of a student for a course comprising some optional subjects, but all the students should not chose similar optional papers. Now here the student name appears in every tuple, that is redundant and we can have two tables as students(S#, Sname, CourseName) and Report(S#, SubjectName, Marks). Though, if we want to print the mark-sheet for every student by using these tables then a join operation that is a costly operation, in terms of resources  needed to perform, has to be performed to get the name of the student. Thus to save on the resource utilization, we might opt to store a single relation, students_report just only.


Related Discussions:- What are the three data anomalies

What are the types of storage devices, What are the types of storage device...

What are the types of storage devices? Primary storage Secondary storage Tertiary storage Volatile storage Nonvolatile storage

Er schema can be represented by relation schemas , Q. Describe how an ER sc...

Q. Describe how an ER schema can be represented by relation schemas and constraints arising from ER design can be mapped to constraints on a relation schema.     The entity rela

Query to list the employee name have 10000 salary, Consider employee table ...

Consider employee table of (i) and list names of department(s) for which average salary for department is more than 10,000. (SELECT d_name FROM dept WHERE d_code IN (SELECT d_c

Execute sql queries, Consider the relations described below: PHYSICIAN (re...

Consider the relations described below: PHYSICIAN (regno, name, telno, city) PATIENT (pname, street, city) VISIT (pname, regno, date_of_visit, fee) Where the regno and pname ide

Query processor in database management system, Query Processor The qu...

Query Processor The query language processor is responsible for taking query language statements or shifting them from the English-like syntax of the query language to a form

Need website hacking security test, We want have a website; we need to test...

We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

What is recovery management component, What is recovery management componen...

What is recovery management component? Ensuring durability is the responsibility of a software component of the base system known as the recovery management component.

Estimate the transaction states, Suppose an instruction takes 1 nanosecond ...

Suppose an instruction takes 1 nanosecond to execute (on average), a page fault takes 20 microseconds of processor time, and it takes 300 microseconds of disk time to read or write

Define the notation for classes and atrributes, Define the notation for cla...

Define the notation for classes and atrributes The notation for class, attribute, and operations are shown below:     Figure: Class with attributes and operations A

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd