Solved

data normalization

Posted on 2008-06-12
2
215 Views
Last Modified: 2010-03-19
Can some one  explain to me first  3 forms of normalization.They are not very explanatory  in text books.Thanks.
0
Comment
Question by:mahmood_786
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 8

Assisted Solution

by:sbagireddi
sbagireddi earned 240 total points
ID: 21772550
The best explaination there is with examples;

http://en.wikipedia.org/wiki/Database_normalization
0
 
LVL 5

Accepted Solution

by:
fesnyng earned 260 total points
ID: 21772826
3NF:   The key, the whole key and nothing but the key, so help me Codd.

The following is not too bad an explanation.
http://www.informit.com/articles/article.aspx?p=102167&seqNum=3

0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There are some very powerful Data Management Views (DMV's) introduced with SQL 2005. The two in particular that we are going to discuss are sys.dm_db_index_usage_stats and sys.dm_db_index_operational_stats.   Recently, I was involved in a discu…
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question