Database Design Instructor Resource Guide



Similar documents
City of Lathrop, California - Red Flags and Preventing Identity Theft

True. All that perfect systems need are correct programs.

Alzheimer s disease Guide for law enforcement

DATABASE INTRODUCTION

NEFE High School Financial Planning Program Unit One - Your Financial Plan: Where It All Begins. Unit 1 - Your Financial Plan: Where It All Begins

The Better Business Bureau. Student Assistance Foundation present. Common $ense. Tips to make college successful

Standard 4: The student will demonstrate the ability to balance a checkbook and reconcile financial accounts. Standard 4.

Premise vs. Hosted vs. Hybrid-Hosted

Standard 4: The student will demonstrate the ability to balance a checkbook and reconcile financial accounts. Standard 4.

Financial Literacy 101: Online Financial Education for College Students

Designing Databases. Introduction

How To Understand Insurance And How It Works

Planning for your new web site

Required Light Levels

Shopping Savvy. 2 days. What should shoppers know before they spend their hard earned money? Materials. Overview

Surface Temperature of Synthetic Turf

in this issue Vote For Your Board of Directors

FREQUENTLY ASKED TECHNOLOGY QUESTIONS

ONLINE CPD FOR SOCIAL SERVICES BUYING YOUR COURSE/S

Normalisation to 3NF. Database Systems Lecture 11 Natasha Alechina

MEN S BASKETBALL TICKETS - FREQUENTLY ASKED QUESTIONS

STUDENT MODULE 8.2 CREDIT CARDS AND ONLINE SHOPPING PAGE 1

Standard 10: The student will explain and compare the responsibilities of renting versus buying a home.


Database Design Basics

No car? No problem! Getting around your community without a car. PLAN AHEAD. KEEP MOVING.

Here is what you could save by having a Favorable Business Credit Profile:

What You Need to Know in Planning and Budgeting for Digital Signage in Healthcare

Advertising Creative Promotional Services

Enhanced Login Security Frequently Asked Questions

3.2 million consumer chats. 2 million consumer chats. Dealerships Use Chat WebWide. www. autodealerchat.com

ONLINE SHOPPING PRE-READING QUESTIONS

Video Game Design (Master) Content Skills Learning Targets Assessment Resources & Technology CEQ:

Protect Your Personal Information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Part 6. Normalization

CPN (Credit Privacy Number) How to Set Up & Use You re Credit Privacy Number

Standard 10: The student will explain and compare the responsibilities of renting versus buying a home.

Posting Your Initial Entries. Login

Designing an Identity Theft Prevention Program

Best Practice Pentasoft Corp. Avactis Ecommerce Shopping Cart Software. All Rights Reserved.

Database Design. Marta Jakubowska-Sobczak IT/ADC based on slides prepared by Paula Figueiredo, IT/DB

Get Found: Local SEO Marketing

MODULE 3 // CREDIT, DEBIT & PREPAID CARDS HALL OF FAME: AGES 18+

To Begin Customize Office

Factors in Considering a Shopping Centre Location

Standard 10: The student will explain and compare the responsibilities of renting versus buying a home.

Business Banking Customer Login Experience for Enhanced Login Security

Footprints Customer Interface Guide

INSTRUCTIONS FOR USING THE ONLINE BILL LOOKUP/BILL PAY

Thinking About Selling Your Home on Your Own? What You Should Know About... For Sale By Owner

Securing, Monitoring & Tracking Documents and Flow of Goods. Real Time Supply Chain Visibility

7 Biggest Mistakes in Web Design 1

Commercial Credit. Builder Program

BANKING BASICS ACCOUNTS: FROM SAVINGS TO CHECKING

PRV Outreach MediPASS Enrollment Overrides (Via Fax or Only)

Normalization. Functional Dependence. Normalization. Normalization. GIS Applications. Spring 2011

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Lesson 4 Annuities: The Mathematics of Regular Payments

CONSUMER PROTECTION SECTION OHIO CONSUMER LAWS

Using Microsoft Access

Topics. Database Essential Concepts. What s s a Good Database System? Using Database Software. Using Database Software. Types of Database Programs

WELCOME TO CORNERSTONE ONDEMAND LMS FUNCTIONALITY TRAINING

car2go San Diego Parking Rules and FAQs

The 3 Normal Forms: Copyright Fred Coulson 2007 (last revised February 1, 2009)

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Player & Parent Handbook

Online Banking Overview

J.C. TAYLOR MODIFIED AUTO INSURANCE APPLICATION TOLL FREE HOT RODS ( )

T&C. Definitions. General. 12.Membership and benefits of Lemon Tree Smiles are offered at the sole discretion of The Lemon Tree Hotels.

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Risk Management and Insurance

Mindex Certification Licensing Plan

BusinessOnline360.com Dominating Social Media Marketing 1

WEBSITE & SOCIAL MEDIA PRIVACY POLICY

FY13 Core Training. Click next to continue

Trevor Moore. Western Oregon University

Unit One Employability Skills

Using Credit Wisely LESSON 14: TEACHERS GUIDE

Two Factor Authentication. Software Version (SV) 1.0

Database Design and Normalization

Assignment Discovery Online Curriculum. Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8. Subject Area: Forensic Science, Chemistry

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Improved Allegro to Pro/E Bidirectional Data Exchange

CST221, Dr. Zhen Jiang Normalization & design (see Appendix pages 42-55)

How to Choose a Tax Preparer

Elements of Security

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

Arsenal For Everyone Religious Education. World Religions Unit 4D What religions are represented in our neighbourhood?

How To Backup Your Data From A Datatron Tape To A Backup From A Backup To A Disk Drive

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO REFERENCE: Board Rule 2.16 PAGE 1 OF 6

WELCOME TO A NEW ERA IN HEALTH CARE COVERAGE FOR TENNESSEE.

Chapter 9: Normalization

Badminton England - Accessing Your Association

MSSU DUAL CREDIT & DUAL ENROLLMENT Student Guide to Online Application, Registration, & Payment

Provided free by Topcashoffer.co.uk

Using sentence fragments

CONTENIDOPAGO.COM TERMS AND CONDITIONS PREMIUM SMS SERVICES Please read this document. This establishes the terms and conditions that govern your

Frequently Asked Questions Najm Visa Platinum Credit Card

Online Banking Guide. Online Banking Overview. e-guide. Online Banking Security Getting Started

Transcription:

SECTION 6 LESSON 2: Normalization and First Normal Form Lesson Vocabulary Directions: Identify the vocabulary word for each definition below. First Normal Form (1NF) Normalization The outcome of the first step of database normalization. 1NF eliminates repeating groups by putting each into a separate table and connecting them with a 1:M relationship A series of steps followed to obtain a database design that allows for efficient access and storage of data in a relational database. These steps reduce data redundancy and the chances of data becoming inconsistent Try It / Solve It 1. When checking a database model for first normal form what are you doing exactly? Solution: Verifying that each entity contains attributes that are appropriate for it; insuring that the entity has a UID; checking each attribute against its UID and verifying that the attribute only contains a single value. 2. What is the rule of 1NF in the normalization process? Solution: 1NF rule has three parts: d) identify the related data parts (attributes) and place them together in one entity; if multiple entities exist, attributes should be listed one time only and in the best possible location e) identify the UID of the entity f) remove any attribute that contains repeating groups (multiple values) and place it in its own entity; create a 1:M relationship between the two entities 3. Check to see if each ERD is in 1NF. If not, make the necessary changes to correct it. a.

b. c. Solution: Problems a. and b. need to be altered. Problem c. is in 1NF..

SECTION 6 LESSON 3: Second Normal Form Lesson Vocabulary Directions: Identify the vocabulary word for the definition below. Second Normal Form (2NF) The outcome of the second step of database normalization Try It / Solve It 1. The UID of a library book includes its BOOK number and SHELF number. Does this ERD follow the rules of Second Normal Form? If you spot a violation, correct it. Solution: Give this example, if necessary: A BOOK UID is something like A961234G, where A96 refers to a SHELF number and 1234G is the BOOK number. No, it does not follow the rules of 2NF shelf size belongs in the SHELF entity.

2. Class Enrollment is the intersection entity that resolves the M:M between STUDENT and CLASS. Does the ERD follow the rules of Second Normal Form? If you spot a violation, correct it. Solution: Review the UID of ENROLLMENT. It is the relationships to CLASS and STUDENT. Do you need to know both the CLASS id and the STUDENT id to find out the room the class is being held in?

3. A store can be located in several shopping malls, and a shopping mall may house several stores. To locate a particular store in a specific neighborhood, you will need to know the name and address of the nearby shopping mall, plus the name of the store. Does the ERD follow the rules of Second Normal Form? If you spot a violation, correct it. Solution: Give an example, if necessary: There are several [give the name of a store with multiple locations in your area such as a specific sportinggoods chain or bakery chain or other type of chain store] stores. To find a specific one in your vicinity, you have to know the malls in the area. This example violates 2NF because the store specialty (books, shoes, etc.) depends solely on the store.

SECTION 6 LESSON 4: Third Normal Form Lesson Vocabulary Directions: Identify the vocabulary word for each definition below. Third Normal Form or 3NF Transitive dependency The form of database normalization where all nonkey fields are dependent on the key, the whole key, and nothing but the key. A condition that exists when any attribute in an entity is dependent upon any other non-uid attribute in that entity. Try It / Solve It 1. Identify the transitive dependency in the model below. State which attributes violate Third Normal Form. Solution: Store name and store address violates 3 rd NF, and they are not dependent on the Key of Product, which is Number. 2. Define the rule of Third Normal Form. Solution: All attributes must be dependent on the key, the whole key, and nothing but the key.

3. A color scheme for a car includes specifications for paint color for the body and the interior colors and materials. For example: The Desert color scheme includes silver paint and gray leather interior; the Sunburst color scheme includes gold paint and cream leather interior. Does the model below follow the rules of Third Normal Form? If you spot a violation, correct it. Solution: Paint color and interior color are attributes of color scheme. Create a new entity for color scheme and create a relationship to CAR. 4. Assume the following business rules: An athlete employs one agent. An agent may work for one or more athletes. An athlete may play for one team. A team may have one or more players Does the model below contain one or more transitive dependencies? Identify the attributes involved in the transitive dependencies. Solution: This can be tricky because there are two transitive dependencies: team coach depends on team, and agent commission depends on agent. Two new entities have to be created.

Team coach is an attribute of team. Agent commission is an attribute of agent. Create an entity TEAM and an entity AGENT, both with relationships to ATHLETE. 5. Now that you have an idea of what makes a good UID, you need to be aware of the controversy, benefits, and difficulty of uniquely identifying someone. Consider the idea of a national ID card. What kinds of problems would the card create and what kinds of problems would it solve? If your country already uses a national ID card, what are the benefits and issues associated with this? In your opinion, could DNA mapping become the national ID card? Why or why not? Solution: The goal of this activity is to have students think about the issue of personal identification and its implementation in a database. This issue could be a hot button for some students. The Internet has many articles about national ID cards and DNA profiling (use the keywords: identity cards, national ID cards, DNA profiling ). Encourage students to find data instead of just voicing unsubstantiated opinions. Possible responses for pros/cons might include: CONS o Potential loss of personal freedom o Use of database for other purposes, such as tracking buying patterns (e.g., book purchases) of individuals who belong to certain religious groups (this is a violation of privacy) PROS o Reduce identity theft o Reduce the number of pieces of identification one would need