SlideShare a Scribd company logo
1 of 26
Chapter 5
The Relational Model and
Normalization
David M. Kroenke
Database Processing
© 2000 Prentice Hall
Chapter 5
© 2000 Prentice Hall
The Relational Model
• Broad, flexible model
• Basis for almost all DBMS products
• E.F. Codd defined well-structured
“normal forms” of relations,
“normalization”
Page 113
Chapter 5
© 2000 Prentice Hall
Relation
• Two-dimensional table
• Rows are tuples
• Columns are attributes
Page 113
Equivalent Relational Terms
Page 114
Figure 5-1 © 2000 Prentice Hall
Functional Dependency
“relationship between or among
attributes”
Page 114
Figure 5-2 © 2000 Prentice Hall
Chapter 5
© 2000 Prentice Hall
Functional Dependency
Notation
SID  Major
ComputerSerialNumber  MemorySize
(SID, ClassName)  Grade
Page 115
Key
“a group of one or more attributes that
uniquely identifies a row”
Page 116
Figure 5-3 © 2000 Prentice Hall
Combination Key
Page 117
Figure 5-4 © 2000 Prentice Hall
Chapter 5
© 2000 Prentice Hall
Normalization
“the process of evaluating and
converting a relation to reduce
modification anomalies”
Page 118
Chapter 5
© 2000 Prentice Hall
Anomaly
“an undesirable consequence of data
modification in which two or more
different themes are entered
(insertion anomaly) in a single row or
two or more themes are lost if the
row is deleted (deletion anomaly)”
Page 118
Chapter 5
© 2000 Prentice Hall
Normal Forms
“classes of relations and techniques for
preventing anomalies”
DK/NF = Domain Key Normal Form
(free of modification anomalies)
Page 118
First Normal Form
“any table of data that meets the
definition of a relation”
Figure 5-3 © 2000 Prentice Hall
Second Normal Form
“when all of a relation’s nonkey attributes
are dependent on all of the key”
Figure 5-5 © 2000 Prentice Hall
Third Normal Form
“if it is in second normal form and has
no transitive dependencies”
Figure 5-7 © 2000 Prentice Hall
Boyce-Codd Normal Form
“if every determinant is a candidate key”
Figure 5-8 © 2000 Prentice Hall
Fourth Normal Form
“if in BCNF and has no multi-value
dependencies”
Figure 5-11 © 2000 Prentice Hall
Chapter 5
© 2000 Prentice Hall
Fifth Normal Form
?
Page 125
Chapter 5
© 2000 Prentice Hall
Domain Key Normal Form
“if every constraint on the relation is a
logical consequence of the definition
of keys and domains”
Page 125
Chapter 5
© 2000 Prentice Hall
DK/NF Terms
• Constraint “a rule governing static
values of attributes”
• Key “unique identifier of a tuple”
• Domain “description of an
attribute’s allowed values”
Page 126
DK/NF Example
Figure 5-13 © 2000 Prentice Hall
DK/NF Example
Figure 5-15 © 2000 Prentice Hall
DK/NF Example
Figure 5-16 © 2000 Prentice Hall
Summary of Normal Forms
Figure 5-18 © 2000 Prentice Hall
Chapter 5
© 2000 Prentice Hall
A  B relationships
A  B and B  A one-to-one
A  B but B not  A many-to-one
A not  B and B not  A many-to-many
Page 131
Summary of Relationships
Figure 5-19 © 2000 Prentice Hall
Chapter 5
© 2000 Prentice Hall
Optimization
• De-Normalization
• Controlled Redundancy
Page 135

More Related Content

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Unit0555555

  • 1. Chapter 5 The Relational Model and Normalization David M. Kroenke Database Processing © 2000 Prentice Hall
  • 2. Chapter 5 © 2000 Prentice Hall The Relational Model • Broad, flexible model • Basis for almost all DBMS products • E.F. Codd defined well-structured “normal forms” of relations, “normalization” Page 113
  • 3. Chapter 5 © 2000 Prentice Hall Relation • Two-dimensional table • Rows are tuples • Columns are attributes Page 113
  • 4. Equivalent Relational Terms Page 114 Figure 5-1 © 2000 Prentice Hall
  • 5. Functional Dependency “relationship between or among attributes” Page 114 Figure 5-2 © 2000 Prentice Hall
  • 6. Chapter 5 © 2000 Prentice Hall Functional Dependency Notation SID  Major ComputerSerialNumber  MemorySize (SID, ClassName)  Grade Page 115
  • 7. Key “a group of one or more attributes that uniquely identifies a row” Page 116 Figure 5-3 © 2000 Prentice Hall
  • 8. Combination Key Page 117 Figure 5-4 © 2000 Prentice Hall
  • 9. Chapter 5 © 2000 Prentice Hall Normalization “the process of evaluating and converting a relation to reduce modification anomalies” Page 118
  • 10. Chapter 5 © 2000 Prentice Hall Anomaly “an undesirable consequence of data modification in which two or more different themes are entered (insertion anomaly) in a single row or two or more themes are lost if the row is deleted (deletion anomaly)” Page 118
  • 11. Chapter 5 © 2000 Prentice Hall Normal Forms “classes of relations and techniques for preventing anomalies” DK/NF = Domain Key Normal Form (free of modification anomalies) Page 118
  • 12. First Normal Form “any table of data that meets the definition of a relation” Figure 5-3 © 2000 Prentice Hall
  • 13. Second Normal Form “when all of a relation’s nonkey attributes are dependent on all of the key” Figure 5-5 © 2000 Prentice Hall
  • 14. Third Normal Form “if it is in second normal form and has no transitive dependencies” Figure 5-7 © 2000 Prentice Hall
  • 15. Boyce-Codd Normal Form “if every determinant is a candidate key” Figure 5-8 © 2000 Prentice Hall
  • 16. Fourth Normal Form “if in BCNF and has no multi-value dependencies” Figure 5-11 © 2000 Prentice Hall
  • 17. Chapter 5 © 2000 Prentice Hall Fifth Normal Form ? Page 125
  • 18. Chapter 5 © 2000 Prentice Hall Domain Key Normal Form “if every constraint on the relation is a logical consequence of the definition of keys and domains” Page 125
  • 19. Chapter 5 © 2000 Prentice Hall DK/NF Terms • Constraint “a rule governing static values of attributes” • Key “unique identifier of a tuple” • Domain “description of an attribute’s allowed values” Page 126
  • 20. DK/NF Example Figure 5-13 © 2000 Prentice Hall
  • 21. DK/NF Example Figure 5-15 © 2000 Prentice Hall
  • 22. DK/NF Example Figure 5-16 © 2000 Prentice Hall
  • 23. Summary of Normal Forms Figure 5-18 © 2000 Prentice Hall
  • 24. Chapter 5 © 2000 Prentice Hall A  B relationships A  B and B  A one-to-one A  B but B not  A many-to-one A not  B and B not  A many-to-many Page 131
  • 25. Summary of Relationships Figure 5-19 © 2000 Prentice Hall
  • 26. Chapter 5 © 2000 Prentice Hall Optimization • De-Normalization • Controlled Redundancy Page 135