SlideShare a Scribd company logo
Prepare for Learn
Text about stuff
Learning Outcomes
By the end of today’s lesson;
• All of you will understand what 1st, 2nd
  and 3rd normal form are
• Most of you will design a database in
  1NF, 2NF and 3NF
• Some of you will convert a database
  between 1NF, 2NF and 3NF
Normalisation
Normalisation is when we ensure a
database is working in its most efficient
way. Its main purpose is to;
• Organise the data efficiently
• Eliminate redundant data
• Ensure that only related data is
  stored in a table.
1st Normal Form
The rules for 1NF are;
• There are no columns with repeated
  or similar data
• Each data item is atomic
• Each row is unique
• Each field has a unique name
1NF Example
Which is NOT in 1NF?
2nd Normal Form
The rules for 2NF are;
• Non-key attributes must depend on
  every part of the primary key
• The table must already be in 1NF
2NF Example
How can we change this 1NF database
to 2NF?
3rd Normal Form
The rules for 3NF are;
• There are no non-key attributes that
  depend on another non-key attribute
• The table must already be in 2NF
3NF Example
Task 1
On your whiteboards convert this
database to 1NF.
Task 2
On your whiteboards convert this
database to 2NF.

Once you have done this create a design
for a database in 3NF for an online
game database that stores player
details, games they play and high scores
(max 3 games).

More Related Content

Viewers also liked

L3
L3L3
Fire of london_questions
Fire of london_questionsFire of london_questions
Fire of london_questions
mariarosadomorales
 
L5
L5L5
L3 more networking
L3   more networkingL3   more networking
L3 more networking
listergc
 
L5
L5L5
Rainforests by Chloe
Rainforests by ChloeRainforests by Chloe
Rainforests by Chloe
Danuta W-Piwko
 
Volcano presentation by Tan
Volcano presentation by TanVolcano presentation by Tan
Volcano presentation by Tan
Danuta W-Piwko
 
L2
L2L2
Pp t3
Pp t3Pp t3
Pp t3
listergc
 
Rainforests by Veronica
Rainforests by VeronicaRainforests by Veronica
Rainforests by Veronica
Danuta W-Piwko
 
L4
L4L4
L2
L2L2
L3
L3L3
Kane's Presentation
Kane's Presentation Kane's Presentation
Kane's Presentation
Danuta W-Piwko
 
Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.
Danuta W-Piwko
 
Presentation Sophie
Presentation SophiePresentation Sophie
Presentation Sophie
Danuta W-Piwko
 
L7
L7L7
L4
L4L4
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
listergc
 
Sitton Spelling Review
Sitton Spelling ReviewSitton Spelling Review
Sitton Spelling Review
hansenmsu
 

Viewers also liked (20)

L3
L3L3
L3
 
Fire of london_questions
Fire of london_questionsFire of london_questions
Fire of london_questions
 
L5
L5L5
L5
 
L3 more networking
L3   more networkingL3   more networking
L3 more networking
 
L5
L5L5
L5
 
Rainforests by Chloe
Rainforests by ChloeRainforests by Chloe
Rainforests by Chloe
 
Volcano presentation by Tan
Volcano presentation by TanVolcano presentation by Tan
Volcano presentation by Tan
 
L2
L2L2
L2
 
Pp t3
Pp t3Pp t3
Pp t3
 
Rainforests by Veronica
Rainforests by VeronicaRainforests by Veronica
Rainforests by Veronica
 
L4
L4L4
L4
 
L2
L2L2
L2
 
L3
L3L3
L3
 
Kane's Presentation
Kane's Presentation Kane's Presentation
Kane's Presentation
 
Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.Volcanoes - presentation by Sam G.
Volcanoes - presentation by Sam G.
 
Presentation Sophie
Presentation SophiePresentation Sophie
Presentation Sophie
 
L7
L7L7
L7
 
L4
L4L4
L4
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
 
Sitton Spelling Review
Sitton Spelling ReviewSitton Spelling Review
Sitton Spelling Review
 

Similar to Normalisation

Kumar lav
Kumar lavKumar lav
Kumar lav
kumar Lav
 
Normalization
NormalizationNormalization
Normalization
Salman Memon
 
Bcnf
BcnfBcnf
Normalization of database tables
Normalization of database tablesNormalization of database tables
Normalization of database tables
Dhani Ahmad
 
Feb 2nd Makeup Class
Feb 2nd Makeup ClassFeb 2nd Makeup Class
Feb 2nd Makeup Class
George Saban
 
Normalization: A Workshop for Everybody Pt. 2
Normalization: A Workshop for Everybody Pt. 2Normalization: A Workshop for Everybody Pt. 2
Normalization: A Workshop for Everybody Pt. 2
Command Prompt., Inc
 
Normalization in SQL | Edureka
Normalization in SQL | EdurekaNormalization in SQL | Edureka
Normalization in SQL | Edureka
Edureka!
 
Normalization and three normal forms.pptx
Normalization and three normal forms.pptxNormalization and three normal forms.pptx
Normalization and three normal forms.pptx
Zoha681526
 

Similar to Normalisation (8)

Kumar lav
Kumar lavKumar lav
Kumar lav
 
Normalization
NormalizationNormalization
Normalization
 
Bcnf
BcnfBcnf
Bcnf
 
Normalization of database tables
Normalization of database tablesNormalization of database tables
Normalization of database tables
 
Feb 2nd Makeup Class
Feb 2nd Makeup ClassFeb 2nd Makeup Class
Feb 2nd Makeup Class
 
Normalization: A Workshop for Everybody Pt. 2
Normalization: A Workshop for Everybody Pt. 2Normalization: A Workshop for Everybody Pt. 2
Normalization: A Workshop for Everybody Pt. 2
 
Normalization in SQL | Edureka
Normalization in SQL | EdurekaNormalization in SQL | Edureka
Normalization in SQL | Edureka
 
Normalization and three normal forms.pptx
Normalization and three normal forms.pptxNormalization and three normal forms.pptx
Normalization and three normal forms.pptx
 

More from listergc

L2
L2L2
Validation, verification, output and backup
Validation, verification, output and backupValidation, verification, output and backup
Validation, verification, output and backup
listergc
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
listergc
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
listergc
 
L2 communication methods
L2   communication methodsL2   communication methods
L2 communication methods
listergc
 
L6
L6L6
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
listergc
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
listergc
 
L3 how do images work
L3   how do images workL3   how do images work
L3 how do images work
listergc
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
listergc
 
L7
L7L7
L6
L6L6
Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
listergc
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
listergc
 
Key database terms
Key database termsKey database terms
Key database terms
listergc
 
L1
L1L1
L2
L2L2

More from listergc (17)

L2
L2L2
L2
 
Validation, verification, output and backup
Validation, verification, output and backupValidation, verification, output and backup
Validation, verification, output and backup
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
 
L2 communication methods
L2   communication methodsL2   communication methods
L2 communication methods
 
L6
L6L6
L6
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
 
L3 how do images work
L3   how do images workL3   how do images work
L3 how do images work
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
 
L7
L7L7
L7
 
L6
L6L6
L6
 
Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Key database terms
Key database termsKey database terms
Key database terms
 
L1
L1L1
L1
 
L2
L2L2
L2
 

Normalisation

  • 2. Learning Outcomes By the end of today’s lesson; • All of you will understand what 1st, 2nd and 3rd normal form are • Most of you will design a database in 1NF, 2NF and 3NF • Some of you will convert a database between 1NF, 2NF and 3NF
  • 3. Normalisation Normalisation is when we ensure a database is working in its most efficient way. Its main purpose is to; • Organise the data efficiently • Eliminate redundant data • Ensure that only related data is stored in a table.
  • 4. 1st Normal Form The rules for 1NF are; • There are no columns with repeated or similar data • Each data item is atomic • Each row is unique • Each field has a unique name
  • 5. 1NF Example Which is NOT in 1NF?
  • 6. 2nd Normal Form The rules for 2NF are; • Non-key attributes must depend on every part of the primary key • The table must already be in 1NF
  • 7. 2NF Example How can we change this 1NF database to 2NF?
  • 8. 3rd Normal Form The rules for 3NF are; • There are no non-key attributes that depend on another non-key attribute • The table must already be in 2NF
  • 10. Task 1 On your whiteboards convert this database to 1NF.
  • 11. Task 2 On your whiteboards convert this database to 2NF. Once you have done this create a design for a database in 3NF for an online game database that stores player details, games they play and high scores (max 3 games).

Editor's Notes

  1. 1-No2-At least 1NF3-No4-Yes