Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Relations create the database. They must satisfy various properties, like no duplicate tuples, no ordering of tuples, and atomic attributes, etc. Relations that satisfy these basic needs may still have some undesirable characteristics such as data redundancy, and anomalies.
What are these undesirable characteristics and how can we eliminate them from the database system? This part is an attempt to answer this question. Though, please note that most of these undesirable properties do not arise if the database modelling has been carried out very carefully using some method like the Entity-Relationship Model. It is still important to use the methods in this unit to check the database that has been acquired and ensure that no mistakes have been made in modeling.
The central thought in these discussions is the concept of Database integrity, the notion of functional dependency, which rely on understanding the semantics of the data and which deals with what information in a relation is dependent on what other information in the relation. Our prime objective in this section is to describe the concept of data integrity, functional dependence and then describes normal forms using functional dependencies and using other types of data dependencies.
OBJECTIVES
After reading this section you should be able to
Define entity integrity and referential integrity. How does SQL allow specification of these? Ans: Entity Integrity Rule- If the attribute A of relation R is a prime attribut
Define the terms 1) physical schema 2) logical schema. Physical schema: The physical schema explains the database design at the physical level, which is the lowest lev
Question 1: Define the term business intelligence tools? Briefly explain how the data from one end gets transformed into information at the other end? Definition Exp
Use again the GE Flight Quest Data and build on the work done for homework 1 and 2. The goal is to create a classification model which classifies flights into "on-time" (you can de
What is the difference between SQL Server 2000 complete and differential backups? A complete backup makes a copy of the whole database. A differential backup creates a copy of
Explain the Deferred Update The deferred update methods do not physically update the database on disk till after a transaction reaches its commit point; after that the updates
Define weak and strong entity sets? Weak entity set: entity set that do not have key attribute of their own are known as weak entity sets. Strong entity set
Define the Third Normal Form: The third normal form (3NF) is a normal form employed in database normalization. 3NF was initially defined by E.F. Codd in 1971. Codd's definitio
What is the use of RAID? A variety of disk-organization methods, collectively called redundant arrays of independent disks are used to better the performance and reliability.
System R was developed and designed over a period of 1974-79 at IBM San Jose Research Company. Its purpose was to illustrate that it is possible to create a Relational System tha
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd