![EBK USING MIS](https://www.bartleby.com/isbn_cover_images/9780134658919/9780134658919_largeCoverImage.jpg)
Explanation of Solution
Three components of
The three components of the database design are as follows:
- Tables
- When data are organized in rows and columns, it is called as table.
- Relationship
- The relationship laid between two tables are established using a row.
- Metadata
- Metadata gives information about other data or simply, it is a data about the data.
Normalization:
When an unstructured table is converted in a way to form one or more properly structured table is called as normalization.
Importance of the normalization:
The main purpose of normalization is to convert the unstructured table into structured table and the importances to perform normalization are as follows:
- Eliminate data redundancy.
- Isolating the data such that any changes made in the table does not affect other contents.
- Ensures proper data dependencies.
- Makes data to be consistent through the table.
Data integrity problem:
Data integrity problem arises when the accuracy and consistency of the data stored in the database is not maintained.
- Consider the information present in a table needs to be updated and that change should be reflected to the entire database contents and if the contents are not properly updated then the data integrity problem arises.
Consequence of data integrity problem:
The main consequence of the data integrity problem is that the data contents present in the table are not properly updated and any action that needs to be processed for that table and those contents can produce inconsistency in the results.
- The results obtained from that table will be incorrect and inconsistent.
Example table with data integrity problem:
Consider the below table named “Bank” with the necessary contents:
Table name: Bank
Name | Date_of_join | Branch_id | BranchName |
James | Mar 3,2014 | 101 | S1B |
Rita | Jan 22,2011 | 100 | MB |
Ron | Oct 2,2000 | 108 | S8B |
joules | Aug 21,2002 | 100 | MB |
Zita | Jan 22,2011 | 100 | MB |
Larry | Apr 2,2000 | 108 | S8B |
In the above the table, the name of the branch “MB” has to be changed to “MSB”:
Table name: Bank
Name | Date_of_join | Branch_id | BranchName |
James | Mar 3,2014 | 101 | S1B |
Rita | Jan 22,2011 | 100 | MSB |
Ron | Oct 2,2000 | 108 | S8B |
joules | Aug 21,2002 | 100 | MB |
Zita | Jan 22,2011 | 100 | MSB |
Larry | Apr 2,2000 | 108 | S8B |
In the above table, the highlighted content of the table is found to be improperly updated and will lead to data integrity problem. When the data of the account holders whose branch name of “MSB” needs to be counted but since the data has been improperly updated the count of the result produced will be incorrect and to avoid this kind of problem normalization is the best choice.
Normalization of a table:
The above table “Bank” is being normalized to avoid the data integrity problem and needs to be split into two tables to obtain data consistency in them.
Table name: Bank
Name | Date_of_join | Branch_id |
James | Mar 3,2014 | 101 |
Rita | Jan 22,2011 | 100 |
Ron | Oct 2,2000 | 108 |
joules | Aug 21,2002 | 100 |
Zita | Jan 22,2011 | 100 |
Larry | Apr 2,2000 | 108 |
Table name: NameofBranch
Branch_id | BranchName |
100 | MSB |
101 | S1B |
108 | S8B |
Therefore, from the above table, the redundancy of the data is being avoided, thus avoiding the inconsistency with the contents of the table...
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Chapter 5 Solutions
EBK USING MIS
- Unit 1 Assignment 1 – Loops and Methods (25 points) Task: You are working for Kean University and given the task of building an Email Registration System. Your objective is to generate a Kean email ID and temporary password for every new user. The system will prompt for user information and generate corresponding credentials. You will develop a complete Java program that consists of the following modules: Instructions: 1. Main Method: ○ The main method should include a loop (of your choice) that asks for input from five users. For each user, you will prompt for their first name and last name and generate the email and password by calling two separate methods. Example о Enter your first name: Joe Enter your last name: Rowling 2.generateEmail() Method: This method will take the user's first and last name as parameters and return the corresponding Kean University email address. The format of the email is: • First letter of the first name (lowercase) + Full last name (lowercase) +…arrow_forwardI have attached my code, under I want you to show me how to enhance it and make it more cooler and better in graphics with following the instructions.arrow_forwardUsing R languagearrow_forward
- Using R languagearrow_forward(Using R language)arrow_forwardAfter our initial deployment for our ML home based security system, the first steps we took to contribute further to the project, we conducted load testing, tested and optimize for low latency, and automated user onboarding. What should be next?arrow_forward
- Why investing in skills and technology is a critical factor in the financial management aspect of system projects.arrow_forwardwhy investing in skills and technology is a critical factor in the financial management aspect of systems projects.arrow_forwardWhy are requirements changing a significant source of risks in system projects?arrow_forward
- A Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology PtrDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781111527273/9781111527273_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781285196145/9781285196145_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305627482/9781305627482_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305971776/9781305971776_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337097536/9781337097536_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305082168/9781305082168_smallCoverImage.gif)