Define 2nf normal form, Database Management System

2NF Normal Form:

A relation schema process R is in 2NF if it is in 1NF and each non-prime attribute A in R is fully functionally related on primary key. Second normal form (2NF) is a normal process needed in database normalization. 2NF was originally described by E.F. Codd in 1971. A table that is in first normal form (1NF) must accept additional criteria if it is to accept for second normal form. A table is in 2NF if and only if, it is in 1NF and no non prime attribute is related on any proper subset of any candidate key of the table.

 

1801_2 NF Normal Form.png

Posted Date: 7/30/2012 2:11:33 AM | Location : United States







Related Discussions:- Define 2nf normal form, Assignment Help, Ask Question on Define 2nf normal form, Get Answer, Expert's Help, Define 2nf normal form Discussions

Write discussion on Define 2nf normal form
Your posts are moderated
Related Questions
Give short note on the following terms:Dirty pages and ETL a.) Dirty pages. These are buffer pages which comprise modifications which haven't been written to disk. b.

Speedup Query Processing: A query that includes data at various sites can be split into sub-queries. These sub- queries can be implemented in parallel by various sites. Such parall

What is a cascading update? Referential integrity constraints needs that foreign key values in one table correspond to primary key values in another. If the value of the primar

Problem: a) Briefly describe what you understand by Client-Server environment b) The File Server is a simple form of Client-Server. Describe the principles of the File Serve

What are the two methods for dealing deadlock problem? The two procedures for dealing deadlock problem is deadlock detection and deadlock recovery.

Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam

How many types of users works on database? Users are differentiated through the way they expect to interact along with the system (i) Application programmers-interact with

how to construct labelled precedence graph for view serialiability.please explain insteps with one solved examples

Limitations of File Based System The file-based system has some limitations. The limitations are listed as follows: Isolation and separation of data: When the data is

Which is another name for weak entity? Child is another name of weak entity.