Benefit Of Normalization Essay

Improved Essays
In order to have a good relational database and to avoid unnecessary data in your database systems you are required to perform normalisation. According to Rob et al., (2008) Normalization is a process for evaluating and correcting table structures to minimize data redundancies, thereby reducing the likelihood of data anomalies. √
Normalisation helps us to structure our database tables effectively in order to improve the performance of the database systems. Once you have a good structured table, it makes easier and more efficient when you retrieve data from the database. √
The main role of normalisation could be also described as removing duplication from the database system. For example if a name of a person appeared in more than one table
…show more content…
Data redundancy is minimised, which saves disk space and reduces inconsistencies
It is simpler to modify a small table with small amounts of data than to modify a large complex table.

Security is also improved as the DBA can allow access to limited tables to certain users. Security is easier to control when normalisation has occurred.
Data integrity means the users know they have consistent and accurate data within a database.

Drawbacks of Normalisation

Most databases have some level of normalisation. However this can lead to reduced database performance.

This is because when a query is sent to the database, there are issues involved, such as CPU usage, memory usage, and input/output . A normalized database needs more CPU, memory, and Input/Output to process that query than a deformalized database.

A normalized database has to find the relevent tables and match data from the tables to get the requested information and process

Related Documents

  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Some of its functions include storing data securely, supporting best practices, etc. It can handle workloads ranging from small applications to large applications with many concurrent users(Wikipedia October 18, 2015). Metasploit uses…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Homework #1 1. The search term I used is “database security” because I am interested in it when I read through it. Moreover, I want to know more about the term “database”, and it found it means a controlled collection of data, and metadata, stored on computer. I also want to learn about ways to protect against threats that specifically target databases. Besides, I searched about “Relational Databases” because most databases are relational database, and they store their data in relation.…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Pt2520 Week 2 Assignment

    • 517 Words
    • 3 Pages

    This week we learned lots about the decomposition of our relations we are creating in the database as well how to make the relations into normal forms, which there are three normal forms. I learned that there can be data that is redundant and therefore not useful for the database. This data has no integrity and can be misplaced and even confuse how the data can be used and retrieved. This type of problem must be avoided. I had a hard time understanding how the breaking down of one relation into two or more would help keep all the data from being redundant.…

    • 517 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Unit 10 D2

    • 502 Words
    • 3 Pages

    Task 11 (M1) Explain referential integrity and the purpose of primary keys in building the relationships between tables. Referential…

    • 502 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Its fast Because there are less commands then other software, MySQL offers the majority of coding with a speed that no other software’s offer Stability issue This means that when the user is accessing the software there may be issues with the software itself, some of which have been experienced whilst doing this assessment. This table sums up some of the advantages and disadvantages of MySQL software however there are some intertwining reason the can be expressed separately, for example how the user would react by issues, although these where not as appropriate so they would be classed under customer satisfaction rather than the actual operation of the software. Query by Example QBE Advantages…

    • 1173 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    College to Career: A recent survey commissioned by Bentley University in 2014 found that “compared with business decision-makers and corporate recruiters, high school and college students were far less likely to define preparedness in terms of personal traits or work ethic” (Chase, 2015). This means skills and experience rank high for college students when they evaluate preparedness. Unfortunately, the same survey found “thirty-seven percent of recent college graduates give themselves a grade of “C” or lower on their individual level of preparedness” (Chase, 2015).…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Quartiles are a procedure of diagnosing the way values are utilized to part an arrangement of numbers into four equivalent gatherings. You initiate by putting the numbers in numerical request after that separation them down the middle utilizing the middle. On the left part of the middle the numbers ought to be isolated over once more, towards the privilege of the middle a third division is required, your information should now be separated into four gatherings. These three markers you have made are really quartiles. Despite the fact that they have been isolated into four separate gatherings, this is finished with three quartiles.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Meaningful Use is a set of standards that goes abut the use of EHR and allows the eligibility of the providers and hospitals that earn and incentive . This is a great way to interact with families so that they know what is going on with their patient and such . As a medical assistant it could make our life a whole lot a heck easier, if we were to be gone days at a time and come back to the office. The privacy that the EHR has is also great because it keeps the patients information more secure than some of the other ways they have been logged in the past. I really like what you have to say here, because it does making find information on a patient easier.…

    • 267 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cookie-Cutter Strategies

    • 384 Words
    • 2 Pages

    There is no silver bullet that will transform student retention rates in a few days. Student success will happen over time, not overnight. We cannot dismiss the urgency of the moment. We must be fully committed to perform every function, take advantage of every opportunity, and be accountable for every responsibility so that student success becomes a reality. Academic institutions have developed best practices that we can follow.…

    • 384 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    For example, if you are in an area affected by a disaster, like Hurricane Katrina, your health information can be stored safely in electronic form. Keep in mind when Hurricane Katrina occurred all records were stored in paper format and therefore destroyed by the flooding. So when…

    • 562 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    620 words Yahya Alhinai ESL 320 October 14, 2015 Writing Assignment 2, Draft 2 Everyone wants to change for the better, so why I wouldn’t change? Change is the learning that make you adapt new things. The desire of changing for better is critical in all of us, so it’s natural to change or got affected because of missing home. Missing home has changed a lot of things in my life for the better since I moved to the US.…

    • 619 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    A Comparison of the Organizational Strategies between Chevron and ExxonMobil MBAA 604: International Business Administration Embry Riddle Aeronautical University Worldwide Submitted to: Dr. Lahlou Rose Carlson Anthony Davis Carlos Diaz Michael Dinnell George Faris Table of Contents ABSTRACT 3 CHEVRON’S STRATEGY 4 EXXONMOBIL’S STRATEGY 4 STRATEGY COMPARISON 5 CONCLUSION 28 REFERENCES 29 Abstract Chevron’s Strategy Chevrons’ organizational structure is the geographic area structure. According to a press release pertaining to the merger of Chevron and Texaco, “For the company’s businesses, the new organization relies mainly on decentralized operating companies segmented by business and geography, with "strategic business units" managing relevant operations” (Chevron, 2014). This is basically the definition of a geographic area structure which organizes the MNE according to different geographic areas…

    • 706 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Odoo Case Study

    • 904 Words
    • 4 Pages

    Why Odoo? ( Selection Criteria) Odoo allows you to consolidate your applications, to centralize your data and to make your daily work easier, in a nice and unified interface. In terms of product, Odoo is going way beyond traditional ERP. What's usually interfaced with third party apps is fully native with Odoo CMS, E-Commerce, Point of Sale, and a Business Intelligence engine.…

    • 904 Words
    • 4 Pages
    Improved Essays

Related Topics