What is normalization? Explain different levels of
normalization?
Answer Posted / kumaresan chandran
Normalization:
Normalization is the process of designing a data
model to efficiently store data in a database. The end
result is that redundant data is eliminated, and only data
related to the attribute is stored within the table.
First normal form (1NF):
An entity type is in 1NF when it contains no repeating
groups of data.
Second normal form (2NF):
An entity type is in 2NF when it is in 1NF and when all of
its non-key attributes are fully dependent on its primary key.
Third normal form (3NF):
An entity type is in 3NF when it is in 2NF and when all of
its attributes are directly dependent on the primary key.
| Is This Answer Correct ? | 57 Yes | 21 No |
Post New Answer View All Answers
Which four data types cannot be used as a return type from a user-defined function?
How to use online Backups?
When installing the datastage7.5x2 edtion iam getting aproblem i.e the cpu count is 2 but the cpu count in installation is one . how can i install in my p.c (system is dual core).
A) Which two are benefits of Teradata's support for ANSI Standard SQL? (Choose two.) 1.data is distributed automatically 2.queries get optimized to better plans 3.submit queries from other database systems 4.can interface with BI tools B) Which statement is true when comparing the advantages of third normal form to star schema? 1.Star schema tends to have fewer entities. 2.Star schema requires additional data storage. 3.Third normal form tends to have fewer entities. 4.Third normal form requires additional data storage. C)Which two sets of functions does the Parsing Engine (PE) perform? (Select two.) 1.sorting, formatting, and aggregating of the final answer set 2.flow control of the data to and from the participating tables 3.SQL statement interpretation, syntax validation, and semantic evaluation 4.dispatching the step execution sequence to the AMP via the BYNET D) Which two can be achieved with Teradata Active System Management (TASM)? (Choose two.) 1.disable hardware 2.react to hardware failure 3.influence response times 4.collect metadata E) Which three mechanisms can be used to ensure security within the Teradata Database? (Choose three.) 1.views 2.spool limits 3.roles 4.access rights 5.profiles
Why does this query return 0?
Who are naive users?
Hi , any one can help me on the same,this is regarding the Informatica Function doc,i want to know how developer is will develop the mapping. pl forwar the any function doc .just for my references. svlc75@yahoo.co.in
How can I detect whether a given connection is blocked?
Explain the cube operator?
What is data modeling with example?
What are the key features of dbms?
What are the constraints on severity level in raiseerror?
There is a trigger defined for INSERT operations on a table, in an OLTP system. The trigger is written to instantiate a COM object and pass the newly insterted rows to it for some custom processing. What do you think of this implementation? Can this be implemented better?
Who are end users in dbms?
Explain about the hierarchical model of the database?