lec08.366 - Winter 2008 CPE/CSC 366 Database Modeling...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . . Winter 2008 CPE/CSC 366: Database Modeling, Design and Implementation Alexander Dekhtyar . . Theory of Normal Forms Overview What is a Normal Form? A normal form of a database is a collection of conditions (constraints) on the database schema. If the database schema satisfies these conditions, we say that the database is in the normal form . Normal Forms in a nutshell. Brief descriptions of normal forms. • First Normal Form (1NF): no repeated attribute groups, atomic values of all attributes. • Second Normal Form (2NF): attributes depend on entire keys. • Third Normal Form (3NF): no inderect dependencies. • Boyce-Codd Normal Form (BCNF): all functional dependencies involve su- perkeys. • Fourth Normal Form (4NF): no redundant independent multiple many-to- many relationships. • Fifth Normal Form (5NF)/Project-Join Normal Form (PJNF): semantically related multiple many-to-many relationships are isolated. • Domain-Key Normal Form (DKNF): only key and domain constraints are present in the relation. In the course, we study 1NF, 2NF, 3NF and BCNF . Higher forms of normal- ization (i.e., additional constraints on the structure of the database schema) are needed only on rare occasions. Why Normal Forms? Normal forms allow us to ensure that our database designs possess some de- sired properties. More importantly, normal forms eliminate database anoma- lies . 1 Database Anomalies. A database anomaly is a problem with database maintenance/management caused by the database schema . Some database anomalies are listed below. Redundancy: Same information may be repeated multiple times. This wastes disk space and may lead to wasted effort and inconsistencies when database is changed....
View Full Document

This note was uploaded on 05/19/2008 for the course CSC 365 taught by Professor Dekhtyar during the Spring '08 term at Cal Poly.

Page1 / 5

lec08.366 - Winter 2008 CPE/CSC 366 Database Modeling...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online