This document contains notes from a database management systems course taught by Sumit Mittu. It discusses E.F. Codd's 12 rules for relational database management systems and the concepts of database normalization. The notes cover the different normal forms including 1NF, 2NF, 3NF, BCNF, 4NF and 5NF. It also briefly discusses denormalization and provides examples to illustrate database normalization concepts.
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
fundamentals of software engineering a deep study of diagrams DFD ER use case Activity and many others functional and non functional requirements listed required by customer
Database means collection of inter-related data and relationships among those data. dbms means set of programs to access those data. The structure of dbms contains two components, They query processor and storage manager.
Enabling the Future of Healthcare Through Integration and Interoperability: V...Rahul Neel Mani
Integration is about connecting two or more systems so that they can share data. Interoperability means that two (or more) systems work together unchanged even though they weren't necessarily designed to work together.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
1. INT306
Database Management Systems
RELATIONAL DATABASE DESIGN
Text book
Database System Concepts
A. Silberschatz, H. F. Korth, S. Sudarshan
Course Instructor
Mr. Sumit Mittu
Assistant Professor and Placement Coordinator, CSE/IT
Lovely Professional University, Punjab (India)
sumit.12735@lpu.co.in sumit.mittu@gmail.com
http://tinyurl.com/askSumit
01-03-2014 11:40:41
2. IN THIS CHAPTER
• e. f. codd rules for rdbms
• normalization of database
01-03-2014 11:40:42
Sumit Mittu, Assistant Professor, CSE/IT
2
3. E. F. CODD RULES
• Codd's Rules for RDBMS
• E.F Codd was a Computer Scientist who invented Relational
model for Database management.
• Based on relational model, Relation database was created.
• Codd proposed 13 rules popularly known as Codd's 12 rules to
test DBMS's concept against his relational model.
• Codd's rule actually define what quality a DBMS requires in
order to become a Relational Database Management
System(RDBMS).
• Till now, there is hardly any commercial product that follows all
the 13 Codd's rules.
• Even Oracle follows only eight and half out(8.5) of 13.
01-03-2014 11:40:42
Sumit Mittu, Assistant Professor, CSE/IT
3
4. E. F. CODD RULES
Rule zero
Rule 1 :
Information rule
Rule 2 :
Guaranteed Access
01-03-2014 11:40:42
• This rule states that for a system to qualify as an
RDBMS, it must be able to manage database
entirely through the relational capabilities.
• All information(including metadeta) is to be
represented as stored data in cells of tables. The
rows and columns have to be strictly unordered.
• Each unique piece of data(atomic value) should
be accesible by : Table Name + primary
key(Row) + Attribute(column).
Sumit Mittu, Assistant Professor, CSE/IT
4
5. E. F. CODD RULES
Rule 3 : Systemetic
treatment of NULL
•Null has several meanings, it can mean missing data, not
applicable or no value. It should be handled consistently.
Primary key must not be null. Expression on NULL must give
null.
Rule 4 : Active
Online Catalog
•Database dictionary(catalog) must have description of
Database. Catalog to be governed by same rule as rest
of the database. The same query language to be used
on catalog as on application database.
Rule 5 : Powerful
language
•One well defined language must be there to provide all
manners of access to data. Example: SQL. If a file
supporting table can be accessed by any manner
except SQL interface, then its a violation to this rule.
01-03-2014 11:40:42
Sumit Mittu, Assistant Professor, CSE/IT
5
6. E. F. CODD RULES
Rule 6 : View
Updation rule
Rule 7 : Relational
Level Operation
Rule 8 : Physical
Data
Independence
01-03-2014 11:40:43
•All view that are theoretically updatable should be
updatable by the system.
•There must be Insert, Delete, Update operations at each
level of relations. Set operation like Union, Intersection
and minus should also be supported.
•The physical storage of data should not matter to the
system. If say, some file supporting table were renamed or
moved from one disk to another, it should not effect the
application.
Sumit Mittu, Assistant Professor, CSE/IT
6
7. E. F. CODD RULES
Rule 9 :
Logical Data
Independence
•If there is change in the logical structure(table structures) of
the database the user view of data should not change. Say, if
a table is split into two tables, a new view should give result as
the join of the two tables. This rule is most difficult to satisfy.
Rule 10 : Integrity
Independence
•The database should be able to enforce its own integrity
rather than using other programs. Key and Check constraints,
trigger etc. should be stored in Data Dictionary. This also make
RDBMS independent of front-end.
Rule 11 : Distribution
Independence
•A database should work properly regardless of its distribution
across a network. This lays foundation of distributed database.
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
7
8. E. F. CODD RULES
Rule 12 :
Nonsubversion
rule
01-03-2014 11:40:43
• If low level access is allowed
to a system it should not be
able to subvert or bypass
integrity rule to change data.
This can be achieved by some
sort of looking or encryption.
Sumit Mittu, Assistant Professor, CSE/IT
8
11. NORMALIZATION
• Normal Forms
• Phases/Levels of Normalization
•
•
•
•
•
•
•
•
1 NF – First Normal Form
2 NF – Second Normal Form
3 NF – Third Normal Form
BCNF – Boyce Codd Normal Form
4 NF – Fourth Normal Form
5 NF – Fifth Normal Form
DKNF – Domain Key Normal Form
Etc.
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
11
12. NORMALIZATION
• Normal Forms •
•
•
•
1 NF
2 NF
3 NF
BCNF
• 4 NF
– Eliminate groups
+ Preserve Functional Dependencies
– Eliminate Transitive Dependencies
+ Preserve FDs that determinants are irreducible
candidate key
– Eliminate Multi-valued Dependencies
• at most 1 multi-valued dependency can be allowed
• 5 NF
01-03-2014 11:40:43
+ Preserve Join Dependency
Sumit Mittu, Assistant Professor, CSE/IT
12
13. NORMALIZATION
• First Normal Form
•
•
•
•
•
The data must be represented as tables
Fields must be atomic domains
There should be no multivalued attributes
Data must be represented as non-repeating groups
Do not have null values against record fields
• Example…
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
13
14. NORMALIZATION
• Second Normal Form
• Tables must be in 1NF
• There must be a candidate key in each table
• Preserve Fully-Functional Dependencies
• Partial FDs should not exist
• Determinant may be composite key
• All non-key attributes must be dependent on key attribute
• Example…
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
14
15. NORMALIZATION
• Third Normal Form
• Tables must be in 2NF
• There must be a candidate key in each table
• Eliminate all Transitive Dependencies
• Example…
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
15
16. NORMALIZATION
• Boyce-Codd Normal Form
•
•
•
•
Tables must be in 2NF
There must be a candidate key in each table
Every determinant must be non-composite (irreducible)
Every irreducible determinant must be a candidate key
• Example…
01-03-2014 11:40:42
Sumit Mittu, Assistant Professor, CSE/IT
16
17. NORMALIZATION
• Fourth Normal Form
• Tables must be in 3NF / BCNF
• Eliminate all multi-valued dependencies
• If not possible, decompose the relations such that each relation
after decomposition must not have more than one multi-valued
dependency
• Example…
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
17
18. NORMALIZATION
• Fifth Normal Form
• Tables must be in 4NF
• Preserve Join Dependency
• There are certain conditions under which after decomposing a
relation, it cannot be reassembled losslessly back into its original
form.
• It is 5NF when this stage is reached
• This normal form is also known as Project-Join normal Form
(PJNF)
• Example…
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
18
19. DE-NORMALIZATION
• De-normalization
• In order to improve performance, the designers sometimes
choose a schema that has redundant information
• De-normalization presents a trade-off between
performance and modification anomalies / data
redundancy.
• Example…
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
19
20. DE-NORMALIZATION
• The relation CUSTOMER (CustomerID, Name, Address,
City, State, Zip) can be normalized as:
• CUSTOMER (CustomerID, Name, Address, Zip)
• ZIPCODES (Zip, City, State)
• This suffers with a performance penalty like:
• Each customer address lookup requires we look in two relations
(tables).
• More technically, obtaining a complete customer and address
record requires us to join CUSTOMER and ZIPCODES together.
• Hence, de-normalization is performed
• re-assemble the original CUSTOMER relation we started with
that will contain all of the attributes.
01-03-2014 11:40:43
Sumit Mittu, Assistant Professor, CSE/IT
20