SlideShare a Scribd company logo
1
Information Management Centre, Thames Valley University
Relational Modelling
(Normalisation)
Abdisalam Issa-Salwe
Faculty of Professional Studies
Thames Valley University
Week 7 Seminar
Information Management Centre, Thames Valley University
Company Name
Company Number
Job Title
Job Ref Number
Applicant Address
Applicant Name
Applicant Number
1NFUNF
2
Information Management Centre, Thames Valley University
UNF – 1NF
Applicant
Applicant Number
Applicant Name
Applicant Address
Job Ref Number
Job Title
Company Number
Company Name
Information Management Centre, Thames Valley University
Company Name
Company Number
Job Title
Job Ref Number
Applicant Address
Applicant Name
Applicant Number
1NFUNF
3
Information Management Centre, Thames Valley University
UNF: Remove Repeating Groups
 Create a new group for the multi-valued
attributes
 Include the Primary Key attribute from
the original group as a Foreign Key in
the new group
 Choose a key for the new group
Information Management Centre, Thames Valley University
Company Name
Company Number
Job TitleCompany Name
Job Ref NumberCompany Number
Job Title
Job Ref Number
Applicant AddressApplicant Address
Applicant NameApplicant Name
Applicant NumberApplicant Number
1NFUNF
4
Information Management Centre, Thames Valley University
Company Name
Company Number
Job TitleCompany Name
Job Ref NumberCompany Number
*Applicant NumberJob Title
Job Ref Number
Applicant AddressApplicant Address
Applicant NameApplicant Name
Applicant NumberApplicant Number
1NFUNF
Information Management Centre, Thames Valley University
Applicant
Applicant's Job
Applicant Number
Applicant Name
Applicant Address
Job Ref Number
Job Title
Company Number
Company Name
5
Information Management Centre, Thames Valley University
Applicant
Applicant's Job
Applicant Number
Applicant Name
Applicant Address
Job Ref Number
Job Title
Company Number
Company Name
*Applicant Number
1NF – 2NF
Information Management Centre, Thames Valley University
1NF – 2NF
Applicant Number
Applicant Name
Applicant Address
*Applicant Number
*Job Ref Number
Applicant
Applicant's Job
Job
Job Reference Number
Job Title
Company Number
Company Name
6
Information Management Centre, Thames Valley University
1NF – 2NF
Applicant Number
Applicant Name
Applicant Address
*Applicant Number
*Job Ref Number
Applicant
Applicant's Job
Job
Job Reference Number
Job Title
Company Number
Company Name
Information Management Centre, Thames Valley University
1NF to 2NF: Remove Partial Dependencies
 Partial dependency only arises where
we have a compound key
 It describes the situation where there is
a functional dependency between one
part of the key and some non-key
attribute
 e.g. Job Reference Number determines Job
Title, Company Number and Company
Name
7
Information Management Centre, Thames Valley University
Partial Dependency example
 Job
Reference
Number
determines
Job Title
Job Ref
Number
Applicant
Number
Job Title
J24 A1001 Trainee SA
J24 A1002 Trainee SA
J99 A1002 IT Manager
Information Management Centre, Thames Valley University
1NF to 2NF: Remove Partial Dependencies (cont…)
 Create a new group for all the partially
dependent data items
 The Primary Key of the new group will
be the attribute(s) that the partially
dependent data items depended on
 The key of the original group does not
change
8
Information Management Centre, Thames Valley University
2NF
Company Name
Company Number
Job Title
Job Ref Number
*Applicant Number
1NF
Information Management Centre, Thames Valley University
2NF to 3NF: Remove Transitive Dependencies
 A transitive dependency arises where
there is a dependency between two
data items neither of which is a
candidate key for the data group in
question
 e.g. Company Number determines
Company Name
9
Information Management Centre, Thames Valley University
 Remove the data items that depend on
the non-candidate key attribute
 The attribute that determines them is
the Primary Key of the new group
 Leave behind a copy of this attribute as
a Foreign Key
2NF to 3NF: Remove Transitive Dependencies (cont…)
Information Management Centre, Thames Valley University
2NF – 3NF
Company Name
Company Number
Company Name
Company Number
Job TitleJob Title
Job Reference NumberJob Reference Number
3NF2NF
10
Information Management Centre, Thames Valley University
2NF – 3NF
2NF 3NF
Job Reference Number Job Reference Number
Job Title Job Title
Company Number
Company Name
Company Number
Company Name
Information Management Centre, Thames Valley University
2NF – 3NF
2NF 3NF
Job Reference Number Job Reference Number
Job Title Job Title
Company Number *Company Number
Company Name
Company Number
Company Name
11
Information Management Centre, Thames Valley University
2NF – 3NF
Applicant
Applicant's Job
Job
Job Ref Number
Title
Company Number
Company Name
Information Management Centre, Thames Valley University
2NF – 3NF
Applicant
Applicant's Job
Job
Company
Company Number
Company Name
Job Ref Number
Title
*Company Number
12
Information Management Centre, Thames Valley University
Functional Dependency
 A Function in mathematics is a relation between two
domains A,B such that
 for every a in A there is exactly one corresponding b in B
 e.g. A and B both real numbers:
 square(x) is a function
 but
 sqrt(x) is not a function
 sqrt(4) = (-2,2) since -2*-2 = 4 as well as 2*2=4
 this is an example of a non-functional dependency
Information Management Centre, Thames Valley University
Mnemonic
 “the key, the whole key and nothing but
the key”
 2NF
 “the key” : non-key fields depend on the key
 “the whole key”: non-key fields depend fully on
the key
 3NF
 “nothing but the key”: non-key fields are not
dependent on each other
13
Information Management Centre, Thames Valley University
Unnormalised Entity
Begin with an entity from
the logical data model
Information Management Centre, Thames Valley University
First Normal Form (1NF)
Look for repeating groups of attributes and
remove them into separate entities
14
Information Management Centre, Thames Valley University
Second Normal Form (2NF)
If an entity has a concatenated identifier, look for attributes that
depend only on part of the identifier. If found, remove to new entity.
Information Management Centre, Thames Valley University
Third Normal Form (3NF)
Look for attributes that depend only on another non-identifying attribute.
If found, remove to new entity. Also remove any calculated attributes.
15
Information Management Centre, Thames Valley University
Potential anomalies
 UPDATE the price per session of facility 1
 now different rates for squash courts - suspect
business rule is same rate for all facilities for a
‘sport’
 ADD a new tennis court
 must also ensure the same rate is used as for
other tennis courts
 DELETE facility 11
 lose the rate per session for skittles
Information Management Centre, Thames Valley University
Summary: Data modelling
 Data modelling answers the question:
 What data exists and what is the most efficient way of organising it?
 Data Modelling is the analysis of data in organisations,
departments, branches, etc.
 It captures all the data uses,
 It organises it into an efficient structure.
 Data modelling = the construction of a model of the data
requirements of the organisation.
 Data requirements are more stable that processing
requirements.
 There are two techniques:
 1. Entity-relationship modelling - a top down approach.
2. Normalisation - a bottom up approach.

More Related Content

Viewers also liked

Normalisation muzz
Normalisation muzzNormalisation muzz
Normalisation muzz
muzzii27
 
Normalisation student summary
Normalisation student summaryNormalisation student summary
Normalisation student summarymary_ramsay
 
Chapter 6 database normalisation
Chapter 6  database normalisationChapter 6  database normalisation
Chapter 6 database normalisation
baabtra.com - No. 1 supplier of quality freshers
 
Normalisation
NormalisationNormalisation
Normalisation
Forrester High School
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization emailharmeet
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examplesRahul Khanwani
 
7. Relational Database Design in DBMS
7. Relational Database Design in DBMS7. Relational Database Design in DBMS
7. Relational Database Design in DBMSkoolkampus
 
Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)
Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)
Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)
Beat Signer
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new features
Jakkrapat S.
 
How to Draw an Effective ER diagram
How to Draw an Effective ER diagramHow to Draw an Effective ER diagram
How to Draw an Effective ER diagramTech_MX
 
Oracle Database Overview
Oracle Database OverviewOracle Database Overview
Oracle Database Overviewhonglee71
 

Viewers also liked (12)

Normalisation muzz
Normalisation muzzNormalisation muzz
Normalisation muzz
 
Normalisation student summary
Normalisation student summaryNormalisation student summary
Normalisation student summary
 
Chapter 6 database normalisation
Chapter 6  database normalisationChapter 6  database normalisation
Chapter 6 database normalisation
 
Normalisation
NormalisationNormalisation
Normalisation
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examples
 
7. Relational Database Design in DBMS
7. Relational Database Design in DBMS7. Relational Database Design in DBMS
7. Relational Database Design in DBMS
 
Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)
Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)
Relational Database Design - Lecture 4 - Introduction to Databases (1007156ANR)
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new features
 
How to Draw an Effective ER diagram
How to Draw an Effective ER diagramHow to Draw an Effective ER diagram
How to Draw an Effective ER diagram
 
Oracle Database Overview
Oracle Database OverviewOracle Database Overview
Oracle Database Overview
 

Similar to Week 7 normalisation lecture (last)

Metadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin PresentationMetadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin Presentation
Embarcadero Technologies
 
A2 databases
A2 databasesA2 databases
A2 databasesc.west
 
training and placement cell portal
training and placement cell portal training and placement cell portal
training and placement cell portal
Panasa Ramaiah Sykam
 
Sql Lab 4 Essay
Sql Lab 4 EssaySql Lab 4 Essay
Sql Lab 4 Essay
Lorie Harris
 
Importance and Impact of ERP Systems on Industry
Importance and Impact of ERP Systems on IndustryImportance and Impact of ERP Systems on Industry
Importance and Impact of ERP Systems on Industry
Baker Khader Abdallah, PMP
 
A G S010 Taylor 091907
A G S010  Taylor 091907A G S010  Taylor 091907
A G S010 Taylor 091907
Dreamforce07
 
SA Chapter 10
SA Chapter 10SA Chapter 10
SA Chapter 10
Nuth Otanasap
 
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Sparkrock
 
Capstone Project - PPDWS Report 150807 1705 FINAL - Robert Balaam
Capstone Project - PPDWS Report 150807 1705 FINAL - Robert BalaamCapstone Project - PPDWS Report 150807 1705 FINAL - Robert Balaam
Capstone Project - PPDWS Report 150807 1705 FINAL - Robert BalaamRobert Balaam
 
Enterprise business systems
Enterprise business systemsEnterprise business systems
Enterprise business systems
Jaipal Dhobale
 
Normalization
NormalizationNormalization
Normalization
AbuSahama
 
Review the following scenarioAssume that you have recently be.docx
Review the following scenarioAssume that you have recently be.docxReview the following scenarioAssume that you have recently be.docx
Review the following scenarioAssume that you have recently be.docx
infantkimber
 
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docx
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docxENGIN 36 Final Exam Take Home Exam May 15, 2020 .docx
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docx
khanpaulita
 
Assignment 1 LASA 2—Company Analysis ReportReview the follo
Assignment 1 LASA 2—Company Analysis ReportReview the folloAssignment 1 LASA 2—Company Analysis ReportReview the follo
Assignment 1 LASA 2—Company Analysis ReportReview the follo
desteinbrook
 
Person model
Person modelPerson model
Person model
Pawan Mundhra
 
Df12 Performance Tuning
Df12 Performance TuningDf12 Performance Tuning
Df12 Performance Tuning
Stuart Bernstein
 
Page 1 of 17 Chapter 14 Operational.docx
Page 1 of 17  Chapter 14 Operational.docxPage 1 of 17  Chapter 14 Operational.docx
Page 1 of 17 Chapter 14 Operational.docx
gerardkortney
 
ISFM-300 Case Study, Stage 3 IT Requirements Before you .docx
ISFM-300 Case Study, Stage 3  IT Requirements Before you .docxISFM-300 Case Study, Stage 3  IT Requirements Before you .docx
ISFM-300 Case Study, Stage 3 IT Requirements Before you .docx
priestmanmable
 

Similar to Week 7 normalisation lecture (last) (20)

Metadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin PresentationMetadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin Presentation
 
Arizona green (10.12.14)
Arizona green (10.12.14)Arizona green (10.12.14)
Arizona green (10.12.14)
 
A2 databases
A2 databasesA2 databases
A2 databases
 
training and placement cell portal
training and placement cell portal training and placement cell portal
training and placement cell portal
 
Sql Lab 4 Essay
Sql Lab 4 EssaySql Lab 4 Essay
Sql Lab 4 Essay
 
Importance and Impact of ERP Systems on Industry
Importance and Impact of ERP Systems on IndustryImportance and Impact of ERP Systems on Industry
Importance and Impact of ERP Systems on Industry
 
A G S010 Taylor 091907
A G S010  Taylor 091907A G S010  Taylor 091907
A G S010 Taylor 091907
 
SA Chapter 10
SA Chapter 10SA Chapter 10
SA Chapter 10
 
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
 
Capstone Project - PPDWS Report 150807 1705 FINAL - Robert Balaam
Capstone Project - PPDWS Report 150807 1705 FINAL - Robert BalaamCapstone Project - PPDWS Report 150807 1705 FINAL - Robert Balaam
Capstone Project - PPDWS Report 150807 1705 FINAL - Robert Balaam
 
mohan-sc13m055
mohan-sc13m055mohan-sc13m055
mohan-sc13m055
 
Enterprise business systems
Enterprise business systemsEnterprise business systems
Enterprise business systems
 
Normalization
NormalizationNormalization
Normalization
 
Review the following scenarioAssume that you have recently be.docx
Review the following scenarioAssume that you have recently be.docxReview the following scenarioAssume that you have recently be.docx
Review the following scenarioAssume that you have recently be.docx
 
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docx
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docxENGIN 36 Final Exam Take Home Exam May 15, 2020 .docx
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docx
 
Assignment 1 LASA 2—Company Analysis ReportReview the follo
Assignment 1 LASA 2—Company Analysis ReportReview the folloAssignment 1 LASA 2—Company Analysis ReportReview the follo
Assignment 1 LASA 2—Company Analysis ReportReview the follo
 
Person model
Person modelPerson model
Person model
 
Df12 Performance Tuning
Df12 Performance TuningDf12 Performance Tuning
Df12 Performance Tuning
 
Page 1 of 17 Chapter 14 Operational.docx
Page 1 of 17  Chapter 14 Operational.docxPage 1 of 17  Chapter 14 Operational.docx
Page 1 of 17 Chapter 14 Operational.docx
 
ISFM-300 Case Study, Stage 3 IT Requirements Before you .docx
ISFM-300 Case Study, Stage 3  IT Requirements Before you .docxISFM-300 Case Study, Stage 3  IT Requirements Before you .docx
ISFM-300 Case Study, Stage 3 IT Requirements Before you .docx
 

More from Taibah University, College of Computer Science & Engineering

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
Taibah University, College of Computer Science & Engineering
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
Taibah University, College of Computer Science & Engineering
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
Taibah University, College of Computer Science & Engineering
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
Taibah University, College of Computer Science & Engineering
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
Taibah University, College of Computer Science & Engineering
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
Taibah University, College of Computer Science & Engineering
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
Taibah University, College of Computer Science & Engineering
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
Taibah University, College of Computer Science & Engineering
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
Taibah University, College of Computer Science & Engineering
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Taibah University, College of Computer Science & Engineering
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
Taibah University, College of Computer Science & Engineering
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
Taibah University, College of Computer Science & Engineering
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
Taibah University, College of Computer Science & Engineering
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
Taibah University, College of Computer Science & Engineering
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
Taibah University, College of Computer Science & Engineering
 

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Week 7 normalisation lecture (last)

  • 1. 1 Information Management Centre, Thames Valley University Relational Modelling (Normalisation) Abdisalam Issa-Salwe Faculty of Professional Studies Thames Valley University Week 7 Seminar Information Management Centre, Thames Valley University Company Name Company Number Job Title Job Ref Number Applicant Address Applicant Name Applicant Number 1NFUNF
  • 2. 2 Information Management Centre, Thames Valley University UNF – 1NF Applicant Applicant Number Applicant Name Applicant Address Job Ref Number Job Title Company Number Company Name Information Management Centre, Thames Valley University Company Name Company Number Job Title Job Ref Number Applicant Address Applicant Name Applicant Number 1NFUNF
  • 3. 3 Information Management Centre, Thames Valley University UNF: Remove Repeating Groups  Create a new group for the multi-valued attributes  Include the Primary Key attribute from the original group as a Foreign Key in the new group  Choose a key for the new group Information Management Centre, Thames Valley University Company Name Company Number Job TitleCompany Name Job Ref NumberCompany Number Job Title Job Ref Number Applicant AddressApplicant Address Applicant NameApplicant Name Applicant NumberApplicant Number 1NFUNF
  • 4. 4 Information Management Centre, Thames Valley University Company Name Company Number Job TitleCompany Name Job Ref NumberCompany Number *Applicant NumberJob Title Job Ref Number Applicant AddressApplicant Address Applicant NameApplicant Name Applicant NumberApplicant Number 1NFUNF Information Management Centre, Thames Valley University Applicant Applicant's Job Applicant Number Applicant Name Applicant Address Job Ref Number Job Title Company Number Company Name
  • 5. 5 Information Management Centre, Thames Valley University Applicant Applicant's Job Applicant Number Applicant Name Applicant Address Job Ref Number Job Title Company Number Company Name *Applicant Number 1NF – 2NF Information Management Centre, Thames Valley University 1NF – 2NF Applicant Number Applicant Name Applicant Address *Applicant Number *Job Ref Number Applicant Applicant's Job Job Job Reference Number Job Title Company Number Company Name
  • 6. 6 Information Management Centre, Thames Valley University 1NF – 2NF Applicant Number Applicant Name Applicant Address *Applicant Number *Job Ref Number Applicant Applicant's Job Job Job Reference Number Job Title Company Number Company Name Information Management Centre, Thames Valley University 1NF to 2NF: Remove Partial Dependencies  Partial dependency only arises where we have a compound key  It describes the situation where there is a functional dependency between one part of the key and some non-key attribute  e.g. Job Reference Number determines Job Title, Company Number and Company Name
  • 7. 7 Information Management Centre, Thames Valley University Partial Dependency example  Job Reference Number determines Job Title Job Ref Number Applicant Number Job Title J24 A1001 Trainee SA J24 A1002 Trainee SA J99 A1002 IT Manager Information Management Centre, Thames Valley University 1NF to 2NF: Remove Partial Dependencies (cont…)  Create a new group for all the partially dependent data items  The Primary Key of the new group will be the attribute(s) that the partially dependent data items depended on  The key of the original group does not change
  • 8. 8 Information Management Centre, Thames Valley University 2NF Company Name Company Number Job Title Job Ref Number *Applicant Number 1NF Information Management Centre, Thames Valley University 2NF to 3NF: Remove Transitive Dependencies  A transitive dependency arises where there is a dependency between two data items neither of which is a candidate key for the data group in question  e.g. Company Number determines Company Name
  • 9. 9 Information Management Centre, Thames Valley University  Remove the data items that depend on the non-candidate key attribute  The attribute that determines them is the Primary Key of the new group  Leave behind a copy of this attribute as a Foreign Key 2NF to 3NF: Remove Transitive Dependencies (cont…) Information Management Centre, Thames Valley University 2NF – 3NF Company Name Company Number Company Name Company Number Job TitleJob Title Job Reference NumberJob Reference Number 3NF2NF
  • 10. 10 Information Management Centre, Thames Valley University 2NF – 3NF 2NF 3NF Job Reference Number Job Reference Number Job Title Job Title Company Number Company Name Company Number Company Name Information Management Centre, Thames Valley University 2NF – 3NF 2NF 3NF Job Reference Number Job Reference Number Job Title Job Title Company Number *Company Number Company Name Company Number Company Name
  • 11. 11 Information Management Centre, Thames Valley University 2NF – 3NF Applicant Applicant's Job Job Job Ref Number Title Company Number Company Name Information Management Centre, Thames Valley University 2NF – 3NF Applicant Applicant's Job Job Company Company Number Company Name Job Ref Number Title *Company Number
  • 12. 12 Information Management Centre, Thames Valley University Functional Dependency  A Function in mathematics is a relation between two domains A,B such that  for every a in A there is exactly one corresponding b in B  e.g. A and B both real numbers:  square(x) is a function  but  sqrt(x) is not a function  sqrt(4) = (-2,2) since -2*-2 = 4 as well as 2*2=4  this is an example of a non-functional dependency Information Management Centre, Thames Valley University Mnemonic  “the key, the whole key and nothing but the key”  2NF  “the key” : non-key fields depend on the key  “the whole key”: non-key fields depend fully on the key  3NF  “nothing but the key”: non-key fields are not dependent on each other
  • 13. 13 Information Management Centre, Thames Valley University Unnormalised Entity Begin with an entity from the logical data model Information Management Centre, Thames Valley University First Normal Form (1NF) Look for repeating groups of attributes and remove them into separate entities
  • 14. 14 Information Management Centre, Thames Valley University Second Normal Form (2NF) If an entity has a concatenated identifier, look for attributes that depend only on part of the identifier. If found, remove to new entity. Information Management Centre, Thames Valley University Third Normal Form (3NF) Look for attributes that depend only on another non-identifying attribute. If found, remove to new entity. Also remove any calculated attributes.
  • 15. 15 Information Management Centre, Thames Valley University Potential anomalies  UPDATE the price per session of facility 1  now different rates for squash courts - suspect business rule is same rate for all facilities for a ‘sport’  ADD a new tennis court  must also ensure the same rate is used as for other tennis courts  DELETE facility 11  lose the rate per session for skittles Information Management Centre, Thames Valley University Summary: Data modelling  Data modelling answers the question:  What data exists and what is the most efficient way of organising it?  Data Modelling is the analysis of data in organisations, departments, branches, etc.  It captures all the data uses,  It organises it into an efficient structure.  Data modelling = the construction of a model of the data requirements of the organisation.  Data requirements are more stable that processing requirements.  There are two techniques:  1. Entity-relationship modelling - a top down approach. 2. Normalisation - a bottom up approach.