Discuss the alternative ways that normalization can be used to support database design.

What will be an ideal response?


Normalization is a formal technique that can be used at any stage of database design. However
in this section we highlight two main approaches for using normalization as illustrated in
Figure 14.1. Approach (1) shows how normalization can be used as a bottom-up standalone
database design technique while Approach (2) shows how normalization can be used as a
validation technique to check the structure of relations, which may have been created using a
top-down approach such as ER modeling. No matter which approach is used the goal is the
same that of creating a set of well-designed relations that meet the data requirements of the
enterprise. Figure 14.1 shows examples of data sources that can be used for database design.
Although, the users’ requirements specification (see Section 10.5) is the preferred data source,
it is possible to design a database based on the information taken directly from other data
sources such as forms and reports as illustrated in this chapter and the next. Figure 14.1 also
shows that the same data source can be used for both approaches, however, although this is
true in principle, in practice the approach taken is likely to be determined by the size, extent,
and complexity of the database being described by the data sources and by the preference and
expertise of the database designer. The opportunity to use normalization as a bottom-up
standalone technique (Approach 1) is often limited by the level of detail that the database
designer is reasonably expected to manage. However, this limitation is not applicable when
normalization is used as a validation technique (Approach 2) as the database designer only
focuses on part of the database such as a single relation at any one time. Therefore, no matter
what the size or complexity of the database then normalization can be usefully applied.

Computer Science & Information Technology

You might also like to view...

The common field is called a(n) ____ key in the second table that it relates.

A. identification B. primary C. foreign D. corresponding

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. An iteration structure is always needed to process a menu selection made by a user. 2. An If-Then-Else statement can be used as one way to process a user's menu selection. 3. The user's menu selection can be validated using an input validation loop immediately after the input statements. 4. It is never possible to give a user a chance to make more than one selection without re-running the whole program.

Computer Science & Information Technology

Filenames with .exe as an extension are considered ________

A) executable B) programmable C) documents D) enhanced

Computer Science & Information Technology

Which statement is false?

a) Bit field manipulations are machine dependent. b) Bit fields may never cross a word boundary. c) Bit fields are not “arrays of bits.” d) It is not possible to take the address of a bit field.

Computer Science & Information Technology