Professional Documents
Culture Documents
ASSIGNMENT 2 Normalisation Diploma
ASSIGNMENT 2 Normalisation Diploma
Employee table
EMPLOYEE_ID NAME
E001 Alice
E002 Bob
E003 Alice
Job table
JOB_CODE JOB
J01 Chef
JO2 Waiter
J03 Bartender
Location Table
STATE_CODE STATE
26 Michigan
56 wyoming
viii. Explain what is indexing and discuss various significances of appropriate indexing
strategies in optimizing database performance during the physical database design
stage.
Indexing is the creation of data structures that optimize retrieval speed of specific database operations,
especially filtering and joining tables
Significance of Indexing:
1. Faster Queries: Significantly improves query performance, especially for complex searches.
2. Efficient Joins: Optimizes joins by quickly finding matching rows across tables.
ix. Discuss constraints and various of constraints as applied in database systems.
Constraints are rules enforced by the database management system to maintain data integrity and
consistency.
Types of constraints
1. NOT NULL Constraint: Ensures a column cannot contain NULL values, maintaining data
completeness.
2. CHECK Constraint: Defines a specific condition that column values must satisfy, offering more
granular control over data validity.
3. Primary Key Constraint: Uniquely identifies each row in a table. A table can only have one primary
key.
4. Unique Constraint: Guarantees that a specific column or set of columns has unique values within a
table, preventing duplicate entries.
x. Discuss various different ways you would establish user privileges and access
controls to ensure robust security measures within a database?
Role-Based Access Control : Assigning permissions to roles and then assigning roles to users, simplifying
the management of access rights.
Granting and Revoking Privileges: Granting specific privileges (such as SELECT, INSERT, UPDATE,
DELETE) to users or roles, and revoking them when necessary.
Access Control Lists : Defining access control lists for individual objects in the database, specifying which
users or groups have permissions to access them.
Encryption and Authentication: Implementing encryption techniques and strong a uthentication
mechanisms to secure data and control access.
xi. Explain the difference between NULL values and empty values, and discuss when it
is appropriate to allow NULL values in a database schema.