
Explanation of Solution
Three components of
The three components of the database design are as follows:
- Tables
- When data are organized in rows and columns, it is called as table.
- Relationship
- The relationship laid between two tables are established using a row.
- Metadata
- Metadata gives information about other data or simply, it is a data about the data.
Normalization:
When an unstructured table is converted in a way to form one or more properly structured table is called as normalization.
Importance of the normalization:
The main purpose of normalization is to convert the unstructured table into structured table and the importances to perform normalization are as follows:
- Eliminate data redundancy.
- Isolating the data such that any changes made in the table does not affect other contents.
- Ensures proper data dependencies.
- Makes data to be consistent through the table.
Data integrity problem:
Data integrity problem arises when the accuracy and consistency of the data stored in the database is not maintained.
- Consider the information present in a table needs to be updated and that change should be reflected to the entire database contents and if the contents are not properly updated then the data integrity problem arises.
Consequence of data integrity problem:
The main consequence of the data integrity problem is that the data contents present in the table are not properly updated and any action that needs to be processed for that table and those contents can produce inconsistency in the results.
- The results obtained from that table will be incorrect and inconsistent.
Example table with data integrity problem:
Consider the below table named “Bank” with the necessary contents:
Table name: Bank
Name | Date_of_join | Branch_id | BranchName |
James | Mar 3,2014 | 101 | S1B |
Rita | Jan 22,2011 | 100 | MB |
Ron | Oct 2,2000 | 108 | S8B |
joules | Aug 21,2002 | 100 | MB |
Zita | Jan 22,2011 | 100 | MB |
Larry | Apr 2,2000 | 108 | S8B |
In the above the table, the name of the branch “MB” has to be changed to “MSB”:
Table name: Bank
Name | Date_of_join | Branch_id | BranchName |
James | Mar 3,2014 | 101 | S1B |
Rita | Jan 22,2011 | 100 | MSB |
Ron | Oct 2,2000 | 108 | S8B |
joules | Aug 21,2002 | 100 | MB |
Zita | Jan 22,2011 | 100 | MSB |
Larry | Apr 2,2000 | 108 | S8B |
In the above table, the highlighted content of the table is found to be improperly updated and will lead to data integrity problem. When the data of the account holders whose branch name of “MSB” needs to be counted but since the data has been improperly updated the count of the result produced will be incorrect and to avoid this kind of problem normalization is the best choice.
Normalization of a table:
The above table “Bank” is being normalized to avoid the data integrity problem and needs to be split into two tables to obtain data consistency in them.
Table name: Bank
Name | Date_of_join | Branch_id |
James | Mar 3,2014 | 101 |
Rita | Jan 22,2011 | 100 |
Ron | Oct 2,2000 | 108 |
joules | Aug 21,2002 | 100 |
Zita | Jan 22,2011 | 100 |
Larry | Apr 2,2000 | 108 |
Table name: NameofBranch
Branch_id | BranchName |
100 | MSB |
101 | S1B |
108 | S8B |
Therefore, from the above table, the redundancy of the data is being avoided, thus avoiding the inconsistency with the contents of the table...

Want to see the full answer?
Check out a sample textbook solution
Chapter 5 Solutions
Using MIS (10th Edition)
- The attached picture shows the RTCAPI memory mapped register which has the address 0x180. 1) Program the MCU's registers so that a) SIRC is the clock source b) the clock is divided by 16K c) the clock is enabled d) load is enabledarrow_forwardWhat is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?arrow_forwardIn the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using a programming language of your choice. The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher keyarrow_forward
- Case Study Instructions: Offshore Wind Energy in the North Sea For this case study, students will analyze the institutional challenges and social rules surrounding offshore wind energy development in the Dutch North Sea, as explored in the case study from the textbook (pages 44-46). Additional resources in this week’s learning module will provide further perspectives on the impact of wind energy on different stakeholders. Students should refer to the syllabus for specific guidelines regarding length, format, and content requirements. Reflection Questions to Consider: What are the key institutional challenges in implementing offshore wind energy in the North Sea? How do formal and informal social rules shape the use of this shared space? What conflicts arise between different stakeholders (e.g., fishermen, naval transport, military, and wind energy developers)? How can policymakers balance economic, environmental, and social considerations when allocating space for wind energy?…arrow_forwardAlphabetic Telephone Number TranslatorMany companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B, and C = 2 D, E, and F = 3 G, H, and I = 4 J, K, and L = 5 M, N, and O = 6 P, Q, R, and S = 7 T, U, and V = 8 W, X, Y, and Z = 9 Write a program that asks the user to enter a 10-character telephone number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD, the application should display 555-438-3663.arrow_forwardI would like help to resolve the following casearrow_forward
- 7. Character AnalysisIf you have downloaded the source code you will find a file named text.txt in the Chapter 08 folder. Write a program that reads the file’s contents and determines the following: The number of uppercase letters in the file The number of lowercase letters in the file The number of digits in the file The number of whitespace characters in the filearrow_forwardProvide the full blue terminal commands & output and other things that are usefularrow_forwardHomework You have the row vector (A) that has values from (-100 to 100), write MATLAB codes to: (1) Interchange the first 10 elements with last ten elements. (2) Replace the elements at indices (93,9,17,50) of A with 99. (3) Return the second element and the element before the last of A as a column vector (C1). (4) Extract the first five elements and the last five elements of A and append them as a row vector (R). (5) Set the elements of A with odd indices to zeros(0).arrow_forward
- if the error in a closed-loop Servo motor system is zero, why does the motor Contimac ranning instead of stoppingarrow_forwardWhen the FCC added Color Television to the Industry Standards, they went with the system developed in the 1940s by Peter Goldman for CBS. Question 15 options: True False Part of the reason that many critics disliked 1950s gameshows was the fact that gameshows offered one of the few opportunities to see unscripted interactions with "real" (average/non-famous) people on television. Question 16 options: True False The Andy Griffith Show is an example of the "rural revival" shows that become enormously popular on 1960s American television. Question 19 options: True False During the Network Era, the hours before primetime each day were exclusively devoted to locally-produced programming, not programming dictated by an affiliate station's parent network. Question 20 options: True Falsearrow_forwardAlthough color television was not added to the industry standard until 1956, CBS had been broadcasting selected special events in color as early as 1950. Question 1 options: True False Two key factors in creating the Network Era of American television were the FCC licensing freeze and ______________. Question 4 options: The Quiz Show Scandals Habitual Viewing Operation Frontal Lobes Drop-In Viewing Least Objectionable Programming was designed to embrace the public service-oriented vision of using television to elevate mass culture and enrich viewers. Question 6 options: True False By the end of the 1950s, all three remaining networks (NBC, CBS, & ABC) were broadcasting their entire nightly programming schedule in full color. Question 9 options: True Falsearrow_forward
- A Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology PtrDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning





