SlideShare a Scribd company logo
DATABASE
NORMALIZATION
Normalization forms
Normalization example
Coming UP
Normalization forms
1st Normal Form
2nd Normal Form
3rd Normal Form
Boyce-Codd Normal Form
4th Normal Form
5th Normal Form
6th Normal Form
Key terms
Column – Attribute
Row – Tuple
Table – Relation
There are further enhancements to theory of normalization
and it is still being developed. There is even 6th normal
form but in any practical scenario, normalization achieves
its best shape in 3rd Normal form.
Entity – Any real world object that makes sense
Normalization example
Let us look at a library table that maintains all the books they rent
out in one single table:
Now let us push this data from various normal forms and see how we
can refine the data.
The rules of the first normal form are:
Each table cell should contain a single/atomic value
Every record in the table must be unique
1NF (First Normal Form)
Let us first convert the Books_Main_Table into 1NF
As per the 1NF rules, our Books Main Table looks good. Before we
proceed with 2NF and 3NF, we need to understand key columns.
Key / non-key columns
Any column (or group of columns) in a table which can uniquely identify each
row is known as key column. For example:
Phone number
Email ID
Student Roll Number
Employee ID
These are some columns which will always remain unique to every record inside
the table.
Such columns are known as key columns inside the table. Any column apart
from key columns is known as non-key column.
Primary key
A primary key is a single column value which uniquely identifies each
record in a table. In RDBMS, primary key must satisfy below:
Primary key must be unique
Primary key cannot be null
Every record will have primary key value
Composite Key
Sometimes its hard to define unique records with one single column. In
such cases, we can have two or more columns that uniquely identify each
record in a table. Such columns are known as composite key. For
example:
Name + Address
First Name + DOB + Father Name
Now that we know about key / non-key columns, let us move to 2NF.
2NF (Second Normal Form)
The rules of the second normal form are:
Table must be in 1NF
Every non-key attribute must be fully dependent on key attributes
We see that our Books_Main_Table does not have any primary key, in such
cases, we will have to introduce a new key column like Membership ID.
To make Books_Main_Table into 2NF, we need to see how columns are
closely related:
Membership ID has a salutation, name and address
Membership ID has books issued on their name
With this logic in mind, we will have to divide our Books_Main_Table
into two table:
Foreign Key
If you see the above tables, we have Membership ID in both tables
but in Membership_Details_table, it is a primary key column and
in Books_Issued_table, it is a non-key column.
Till now we have seen Primary key and composite key. A foreign
key refers to a primary key column of another table. This helps in
connecting two tables (and defines a relation between two tables).
A foreign key must satisfy below:
Foreign key column name can be different than primary key
column name
Unlike primary key, then need not be unique (see
Books_Issued_Table above)
Foreign key column can be null even though primary key
column cannot
Reason for Foreign key
When a user tries to insert a record into Books_Issued_Table
and if there is no membership ID exists in
Membership_Details_Table, it will be rejected. This way, we
maintain data integrity in RDBMS.
If there is no record with Membership ID in the parent table,
it will be rejected and database will throw an error.
3NF (Third Normal Form)
The rules of the third normal form are:
Data must be in 2NF
No transitive functional dependencies
What is transitive dependency?
In simple terms, if changing a non-key column causes any other non-key
column to change, then its called as transitive dependency.
In our example, if we change Full Name of the customer, it
might change Salutation
Final 3NF Tables
To move the Membership_Details_Table into 3NF, we need to further
divide the table into below:
Database Normalization
We have divided the Membership_Details_Table
into a new Salutation_table.
Assignment
If you see the Books_Issued_Table, it still does not have
a key column. What do you think should be the key
column for the Books_Issued_Table? Or do we need to
introduce a new column?
Courses | Projects | Bootcamps
Ad

More Related Content

What's hot (20)

Normalization in a Database
Normalization in a DatabaseNormalization in a Database
Normalization in a Database
Bishrul Haq
 
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NFNormalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Biplap Bhattarai
 
Sql subquery
Sql  subquerySql  subquery
Sql subquery
Raveena Thakur
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
Maulana Abul Kalam Azad University of Technology
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization
emailharmeet
 
joins in database
 joins in database joins in database
joins in database
Sultan Arshad
 
Relational algebra in dbms
Relational algebra in dbmsRelational algebra in dbms
Relational algebra in dbms
Vignesh Saravanan
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
Prateek Parimal
 
SQL Views
SQL ViewsSQL Views
SQL Views
baabtra.com - No. 1 supplier of quality freshers
 
Aggregate functions
Aggregate functionsAggregate functions
Aggregate functions
sinhacp
 
Dbms Notes Lecture 9 : Specialization, Generalization and Aggregation
Dbms Notes Lecture 9 : Specialization, Generalization and AggregationDbms Notes Lecture 9 : Specialization, Generalization and Aggregation
Dbms Notes Lecture 9 : Specialization, Generalization and Aggregation
BIT Durg
 
Joins in SQL
Joins in SQLJoins in SQL
Joins in SQL
Vigneshwaran Sankaran
 
Functional dependencies in Database Management System
Functional dependencies in Database Management SystemFunctional dependencies in Database Management System
Functional dependencies in Database Management System
Kevin Jadiya
 
Functional dependency
Functional dependencyFunctional dependency
Functional dependency
Sakshi Jaiswal
 
Relational model
Relational modelRelational model
Relational model
Dabbal Singh Mahara
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
Megha yadav
 
Integrity constraints in dbms
Integrity constraints in dbmsIntegrity constraints in dbms
Integrity constraints in dbms
Vignesh Saravanan
 
Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)
Oum Saokosal
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Oum Saokosal
 
Constraints In Sql
Constraints In SqlConstraints In Sql
Constraints In Sql
Anurag
 
Normalization in a Database
Normalization in a DatabaseNormalization in a Database
Normalization in a Database
Bishrul Haq
 
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NFNormalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Normalization | (1NF) |(2NF) (3NF)|BCNF| 4NF |5NF
Biplap Bhattarai
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization
emailharmeet
 
Aggregate functions
Aggregate functionsAggregate functions
Aggregate functions
sinhacp
 
Dbms Notes Lecture 9 : Specialization, Generalization and Aggregation
Dbms Notes Lecture 9 : Specialization, Generalization and AggregationDbms Notes Lecture 9 : Specialization, Generalization and Aggregation
Dbms Notes Lecture 9 : Specialization, Generalization and Aggregation
BIT Durg
 
Functional dependencies in Database Management System
Functional dependencies in Database Management SystemFunctional dependencies in Database Management System
Functional dependencies in Database Management System
Kevin Jadiya
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
Megha yadav
 
Integrity constraints in dbms
Integrity constraints in dbmsIntegrity constraints in dbms
Integrity constraints in dbms
Vignesh Saravanan
 
Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)Database Concept - Normalization (1NF, 2NF, 3NF)
Database Concept - Normalization (1NF, 2NF, 3NF)
Oum Saokosal
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Oum Saokosal
 
Constraints In Sql
Constraints In SqlConstraints In Sql
Constraints In Sql
Anurag
 

Similar to Database Normalization (20)

Data normailazation
Data normailazationData normailazation
Data normailazation
Lalit Kale
 
What is Database NormalizationExplain the guidelines for ensuring t.pdf
What is Database NormalizationExplain the guidelines for ensuring t.pdfWhat is Database NormalizationExplain the guidelines for ensuring t.pdf
What is Database NormalizationExplain the guidelines for ensuring t.pdf
arjunstores123
 
Database normalization
Database normalizationDatabase normalization
Database normalization
Jignesh Jain
 
B & c
B & cB & c
B & c
Vaibhav Kathuria
 
DATABASE CONCEPTS AND PRACTICAL EXAMPLES
DATABASE CONCEPTS AND PRACTICAL EXAMPLESDATABASE CONCEPTS AND PRACTICAL EXAMPLES
DATABASE CONCEPTS AND PRACTICAL EXAMPLES
NathRam2
 
relational data model in RDBMS USING KEYS.pptx
relational data model in RDBMS USING KEYS.pptxrelational data model in RDBMS USING KEYS.pptx
relational data model in RDBMS USING KEYS.pptx
urvashipundir04
 
relational data model in DBMS AND KEYS.pptx
relational data model in DBMS AND KEYS.pptxrelational data model in DBMS AND KEYS.pptx
relational data model in DBMS AND KEYS.pptx
urvashipundir04
 
relational data model In rdbms keys.pptx
relational data model In  rdbms keys.pptxrelational data model In  rdbms keys.pptx
relational data model In rdbms keys.pptx
urvashipundir04
 
1683368767418684.pdf
1683368767418684.pdf1683368767418684.pdf
1683368767418684.pdf
Janoakre
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
ShouaQureshi
 
The Relational Database Model
The Relational Database ModelThe Relational Database Model
The Relational Database Model
Shishir Aryal
 
Normalization
NormalizationNormalization
Normalization
Prabal Chauhan
 
Advance Sqlite3
Advance Sqlite3Advance Sqlite3
Advance Sqlite3
Raghu nath
 
Normalization in Relational database management systems
Normalization in Relational database management systemsNormalization in Relational database management systems
Normalization in Relational database management systems
backiyalakshmi14
 
Normalization in rdbms types and examples
Normalization in rdbms types and examplesNormalization in rdbms types and examples
Normalization in rdbms types and examples
BackiyalakshmiVenkat
 
Relational Model
Relational ModelRelational Model
Relational Model
Er. Nawaraj Bhandari
 
The Relational Model
The Relational ModelThe Relational Model
The Relational Model
Bhandari Nawaraj
 
Dbms interview questions
Dbms interview questionsDbms interview questions
Dbms interview questions
ambika93
 
Database Management Systems 4 - Normalization
Database Management Systems 4 - NormalizationDatabase Management Systems 4 - Normalization
Database Management Systems 4 - Normalization
Nickkisha Farrell
 
Understanding about relational database m-square systems inc
Understanding about relational database m-square systems incUnderstanding about relational database m-square systems inc
Understanding about relational database m-square systems inc
Muthu Natarajan
 
Data normailazation
Data normailazationData normailazation
Data normailazation
Lalit Kale
 
What is Database NormalizationExplain the guidelines for ensuring t.pdf
What is Database NormalizationExplain the guidelines for ensuring t.pdfWhat is Database NormalizationExplain the guidelines for ensuring t.pdf
What is Database NormalizationExplain the guidelines for ensuring t.pdf
arjunstores123
 
Database normalization
Database normalizationDatabase normalization
Database normalization
Jignesh Jain
 
DATABASE CONCEPTS AND PRACTICAL EXAMPLES
DATABASE CONCEPTS AND PRACTICAL EXAMPLESDATABASE CONCEPTS AND PRACTICAL EXAMPLES
DATABASE CONCEPTS AND PRACTICAL EXAMPLES
NathRam2
 
relational data model in RDBMS USING KEYS.pptx
relational data model in RDBMS USING KEYS.pptxrelational data model in RDBMS USING KEYS.pptx
relational data model in RDBMS USING KEYS.pptx
urvashipundir04
 
relational data model in DBMS AND KEYS.pptx
relational data model in DBMS AND KEYS.pptxrelational data model in DBMS AND KEYS.pptx
relational data model in DBMS AND KEYS.pptx
urvashipundir04
 
relational data model In rdbms keys.pptx
relational data model In  rdbms keys.pptxrelational data model In  rdbms keys.pptx
relational data model In rdbms keys.pptx
urvashipundir04
 
1683368767418684.pdf
1683368767418684.pdf1683368767418684.pdf
1683368767418684.pdf
Janoakre
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
ShouaQureshi
 
The Relational Database Model
The Relational Database ModelThe Relational Database Model
The Relational Database Model
Shishir Aryal
 
Advance Sqlite3
Advance Sqlite3Advance Sqlite3
Advance Sqlite3
Raghu nath
 
Normalization in Relational database management systems
Normalization in Relational database management systemsNormalization in Relational database management systems
Normalization in Relational database management systems
backiyalakshmi14
 
Normalization in rdbms types and examples
Normalization in rdbms types and examplesNormalization in rdbms types and examples
Normalization in rdbms types and examples
BackiyalakshmiVenkat
 
Dbms interview questions
Dbms interview questionsDbms interview questions
Dbms interview questions
ambika93
 
Database Management Systems 4 - Normalization
Database Management Systems 4 - NormalizationDatabase Management Systems 4 - Normalization
Database Management Systems 4 - Normalization
Nickkisha Farrell
 
Understanding about relational database m-square systems inc
Understanding about relational database m-square systems incUnderstanding about relational database m-square systems inc
Understanding about relational database m-square systems inc
Muthu Natarajan
 
Ad

More from Arun Sharma (20)

Important Linux Commands
Important Linux CommandsImportant Linux Commands
Important Linux Commands
Arun Sharma
 
Oracle Golden Gate Functions
Oracle Golden Gate FunctionsOracle Golden Gate Functions
Oracle Golden Gate Functions
Arun Sharma
 
Oracle Golden Gate Bidirectional Replication
Oracle Golden Gate Bidirectional ReplicationOracle Golden Gate Bidirectional Replication
Oracle Golden Gate Bidirectional Replication
Arun Sharma
 
Install Oracle 12c Golden Gate On Oracle Linux
Install Oracle 12c Golden Gate On Oracle LinuxInstall Oracle 12c Golden Gate On Oracle Linux
Install Oracle 12c Golden Gate On Oracle Linux
Arun Sharma
 
Configure Golden Gate Initial Load and Change Sync
Configure Golden Gate Initial Load and Change SyncConfigure Golden Gate Initial Load and Change Sync
Configure Golden Gate Initial Load and Change Sync
Arun Sharma
 
Oracle TKPROF Utility
Oracle TKPROF UtilityOracle TKPROF Utility
Oracle TKPROF Utility
Arun Sharma
 
Oracle Segment Advisor
Oracle Segment AdvisorOracle Segment Advisor
Oracle Segment Advisor
Arun Sharma
 
Oracle 11g Installation With ASM and Data Guard Setup
Oracle 11g Installation With ASM and Data Guard SetupOracle 11g Installation With ASM and Data Guard Setup
Oracle 11g Installation With ASM and Data Guard Setup
Arun Sharma
 
Oracle 11g to 12c Upgrade With Data Guard and ASM
Oracle 11g to 12c  Upgrade With Data Guard and ASMOracle 11g to 12c  Upgrade With Data Guard and ASM
Oracle 11g to 12c Upgrade With Data Guard and ASM
Arun Sharma
 
Oracle 11g to 12c Rolling Upgrade
Oracle 11g to 12c Rolling UpgradeOracle 11g to 12c Rolling Upgrade
Oracle 11g to 12c Rolling Upgrade
Arun Sharma
 
Convert Physical Standby Into Logical Standby
Convert Physical Standby Into Logical StandbyConvert Physical Standby Into Logical Standby
Convert Physical Standby Into Logical Standby
Arun Sharma
 
Enable Fast Start Failover Data Guard Broker
Enable Fast Start Failover Data Guard BrokerEnable Fast Start Failover Data Guard Broker
Enable Fast Start Failover Data Guard Broker
Arun Sharma
 
Data Guard Broker Failover
Data Guard Broker FailoverData Guard Broker Failover
Data Guard Broker Failover
Arun Sharma
 
Oracle Data Guard Physical Standby Configuration
Oracle Data Guard Physical Standby ConfigurationOracle Data Guard Physical Standby Configuration
Oracle Data Guard Physical Standby Configuration
Arun Sharma
 
Schedule RMAN Backups On Windows
Schedule RMAN Backups On WindowsSchedule RMAN Backups On Windows
Schedule RMAN Backups On Windows
Arun Sharma
 
RMAN Backup Compression Types
RMAN Backup Compression TypesRMAN Backup Compression Types
RMAN Backup Compression Types
Arun Sharma
 
Scheduling Jobs With DBMA_Scheduler
Scheduling Jobs With DBMA_SchedulerScheduling Jobs With DBMA_Scheduler
Scheduling Jobs With DBMA_Scheduler
Arun Sharma
 
Oracle User Management
Oracle User ManagementOracle User Management
Oracle User Management
Arun Sharma
 
Create Directory Under ASM Diskgroup
Create Directory Under ASM DiskgroupCreate Directory Under ASM Diskgroup
Create Directory Under ASM Diskgroup
Arun Sharma
 
Create Diskgroup Sqlplus Command
Create Diskgroup Sqlplus CommandCreate Diskgroup Sqlplus Command
Create Diskgroup Sqlplus Command
Arun Sharma
 
Important Linux Commands
Important Linux CommandsImportant Linux Commands
Important Linux Commands
Arun Sharma
 
Oracle Golden Gate Functions
Oracle Golden Gate FunctionsOracle Golden Gate Functions
Oracle Golden Gate Functions
Arun Sharma
 
Oracle Golden Gate Bidirectional Replication
Oracle Golden Gate Bidirectional ReplicationOracle Golden Gate Bidirectional Replication
Oracle Golden Gate Bidirectional Replication
Arun Sharma
 
Install Oracle 12c Golden Gate On Oracle Linux
Install Oracle 12c Golden Gate On Oracle LinuxInstall Oracle 12c Golden Gate On Oracle Linux
Install Oracle 12c Golden Gate On Oracle Linux
Arun Sharma
 
Configure Golden Gate Initial Load and Change Sync
Configure Golden Gate Initial Load and Change SyncConfigure Golden Gate Initial Load and Change Sync
Configure Golden Gate Initial Load and Change Sync
Arun Sharma
 
Oracle TKPROF Utility
Oracle TKPROF UtilityOracle TKPROF Utility
Oracle TKPROF Utility
Arun Sharma
 
Oracle Segment Advisor
Oracle Segment AdvisorOracle Segment Advisor
Oracle Segment Advisor
Arun Sharma
 
Oracle 11g Installation With ASM and Data Guard Setup
Oracle 11g Installation With ASM and Data Guard SetupOracle 11g Installation With ASM and Data Guard Setup
Oracle 11g Installation With ASM and Data Guard Setup
Arun Sharma
 
Oracle 11g to 12c Upgrade With Data Guard and ASM
Oracle 11g to 12c  Upgrade With Data Guard and ASMOracle 11g to 12c  Upgrade With Data Guard and ASM
Oracle 11g to 12c Upgrade With Data Guard and ASM
Arun Sharma
 
Oracle 11g to 12c Rolling Upgrade
Oracle 11g to 12c Rolling UpgradeOracle 11g to 12c Rolling Upgrade
Oracle 11g to 12c Rolling Upgrade
Arun Sharma
 
Convert Physical Standby Into Logical Standby
Convert Physical Standby Into Logical StandbyConvert Physical Standby Into Logical Standby
Convert Physical Standby Into Logical Standby
Arun Sharma
 
Enable Fast Start Failover Data Guard Broker
Enable Fast Start Failover Data Guard BrokerEnable Fast Start Failover Data Guard Broker
Enable Fast Start Failover Data Guard Broker
Arun Sharma
 
Data Guard Broker Failover
Data Guard Broker FailoverData Guard Broker Failover
Data Guard Broker Failover
Arun Sharma
 
Oracle Data Guard Physical Standby Configuration
Oracle Data Guard Physical Standby ConfigurationOracle Data Guard Physical Standby Configuration
Oracle Data Guard Physical Standby Configuration
Arun Sharma
 
Schedule RMAN Backups On Windows
Schedule RMAN Backups On WindowsSchedule RMAN Backups On Windows
Schedule RMAN Backups On Windows
Arun Sharma
 
RMAN Backup Compression Types
RMAN Backup Compression TypesRMAN Backup Compression Types
RMAN Backup Compression Types
Arun Sharma
 
Scheduling Jobs With DBMA_Scheduler
Scheduling Jobs With DBMA_SchedulerScheduling Jobs With DBMA_Scheduler
Scheduling Jobs With DBMA_Scheduler
Arun Sharma
 
Oracle User Management
Oracle User ManagementOracle User Management
Oracle User Management
Arun Sharma
 
Create Directory Under ASM Diskgroup
Create Directory Under ASM DiskgroupCreate Directory Under ASM Diskgroup
Create Directory Under ASM Diskgroup
Arun Sharma
 
Create Diskgroup Sqlplus Command
Create Diskgroup Sqlplus CommandCreate Diskgroup Sqlplus Command
Create Diskgroup Sqlplus Command
Arun Sharma
 
Ad

Recently uploaded (20)

Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentSecure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Shubham Joshi
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentSecure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Shubham Joshi
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 

Database Normalization

  • 3. Normalization forms 1st Normal Form 2nd Normal Form 3rd Normal Form Boyce-Codd Normal Form 4th Normal Form 5th Normal Form 6th Normal Form
  • 4. Key terms Column – Attribute Row – Tuple Table – Relation There are further enhancements to theory of normalization and it is still being developed. There is even 6th normal form but in any practical scenario, normalization achieves its best shape in 3rd Normal form. Entity – Any real world object that makes sense
  • 5. Normalization example Let us look at a library table that maintains all the books they rent out in one single table: Now let us push this data from various normal forms and see how we can refine the data.
  • 6. The rules of the first normal form are: Each table cell should contain a single/atomic value Every record in the table must be unique 1NF (First Normal Form) Let us first convert the Books_Main_Table into 1NF
  • 7. As per the 1NF rules, our Books Main Table looks good. Before we proceed with 2NF and 3NF, we need to understand key columns.
  • 8. Key / non-key columns Any column (or group of columns) in a table which can uniquely identify each row is known as key column. For example: Phone number Email ID Student Roll Number Employee ID These are some columns which will always remain unique to every record inside the table. Such columns are known as key columns inside the table. Any column apart from key columns is known as non-key column.
  • 9. Primary key A primary key is a single column value which uniquely identifies each record in a table. In RDBMS, primary key must satisfy below: Primary key must be unique Primary key cannot be null Every record will have primary key value
  • 10. Composite Key Sometimes its hard to define unique records with one single column. In such cases, we can have two or more columns that uniquely identify each record in a table. Such columns are known as composite key. For example: Name + Address First Name + DOB + Father Name Now that we know about key / non-key columns, let us move to 2NF.
  • 11. 2NF (Second Normal Form) The rules of the second normal form are: Table must be in 1NF Every non-key attribute must be fully dependent on key attributes We see that our Books_Main_Table does not have any primary key, in such cases, we will have to introduce a new key column like Membership ID. To make Books_Main_Table into 2NF, we need to see how columns are closely related: Membership ID has a salutation, name and address Membership ID has books issued on their name
  • 12. With this logic in mind, we will have to divide our Books_Main_Table into two table:
  • 13. Foreign Key If you see the above tables, we have Membership ID in both tables but in Membership_Details_table, it is a primary key column and in Books_Issued_table, it is a non-key column. Till now we have seen Primary key and composite key. A foreign key refers to a primary key column of another table. This helps in connecting two tables (and defines a relation between two tables). A foreign key must satisfy below: Foreign key column name can be different than primary key column name Unlike primary key, then need not be unique (see Books_Issued_Table above)
  • 14. Foreign key column can be null even though primary key column cannot
  • 15. Reason for Foreign key When a user tries to insert a record into Books_Issued_Table and if there is no membership ID exists in Membership_Details_Table, it will be rejected. This way, we maintain data integrity in RDBMS. If there is no record with Membership ID in the parent table, it will be rejected and database will throw an error.
  • 16. 3NF (Third Normal Form) The rules of the third normal form are: Data must be in 2NF No transitive functional dependencies What is transitive dependency? In simple terms, if changing a non-key column causes any other non-key column to change, then its called as transitive dependency.
  • 17. In our example, if we change Full Name of the customer, it might change Salutation
  • 18. Final 3NF Tables To move the Membership_Details_Table into 3NF, we need to further divide the table into below:
  • 20. We have divided the Membership_Details_Table into a new Salutation_table.
  • 21. Assignment If you see the Books_Issued_Table, it still does not have a key column. What do you think should be the key column for the Books_Issued_Table? Or do we need to introduce a new column?
  • 22. Courses | Projects | Bootcamps