1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
9

discuss the benefits of normalization, and do you think we should normalize our designs to higher levels than 3NF? Why or why no

t?
Computers and Technology
1 answer:
Yuliya22 [10]3 years ago
4 0

Answer:

Normalization allows us to design database tables efficently.it reduces data redundancy and avoid data anomalies

Explanation:

Normalization on database can go till 3rd NormalForm.BCNF is always not possible to apply on all tables .so BCNF and Higher Normal forms which is dependent on BCNF is always not possible to apply on all database designs. In general we will go till 3rd normal form.1st normal form illustrates that there should not be any repeating data in a record it should be atomic.2nd normal form illustrates that it should be in 1st normal form and  if any composite key exist then all remaining  values should dependent on that composite key. 3rd normal form illustrates that if should be in 2nd normal form and all keys should dependent directly on primary key.

You might be interested in
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
Lady_Fox [76]

Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

<h3>What are the three main causes of security breaches?</h3>

The major reasons for data breaches are:

  • Old, Unpatched Security Vulnerabilities.
  • Human Error
  • Malware, etc.

Therefore, Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

Learn more about Cybersecurity from

brainly.com/question/12010892

#SPJ1

5 0
2 years ago
F he continues to make monthly payments of $100, and makes no new purchases, how many more payments will he have to make before
castortr0y [4]

What is the interest rate?

Divide the total amount due by 100.

8 0
3 years ago
Calculate the average high and low in python code for beginners pls
Nikolay [14]

Answer:

There are two ways to find the average of a list of numbers in Python. You can divide the sum() by the len() of a list of numbers to find the average. Or, you can find the average of a list using the Python mean() function

Explanation:

3 0
3 years ago
Is windows 7 professional faster than home premium?
Olin [163]
Widows 7 is no longer supported for anti virus, I recommend a windows 10 license
8 0
3 years ago
As a result of 5G networks &amp; edge computing there will be an increasing number of different internet connection
vfiekz [6]

Explanation:

<h2><em><u>Edge computing with 5G creates tremendous opportunities in every industry. It brings computation and data storage closer to where data is generated, enabling better data control, reduced costs, faster insights and actions, and continuous operations. In fact, by 2025, 75% of enterprise data will be processed at the edge, compared to only 10% today.¹</u></em></h2><h2 /><h2><em><u>Edge computing with 5G creates tremendous opportunities in every industry. It brings computation and data storage closer to where data is generated, enabling better data control, reduced costs, faster insights and actions, and continuous operations. In fact, by 2025, 75% of enterprise data will be processed at the edge, compared to only 10% today.¹IBM provides an autonomous management offering that addresses the scale, variability and rate of change in edge environments. IBM also offers solutions to help communications companies modernize their networks and deliver new services at the edge.</u></em></h2>

Hope this answer is helpful

8 0
3 years ago
Other questions:
  • Which of the following locations is the option to show hidden files or folders location
    7·2 answers
  • What are all the folders located on the DOCK called?
    11·1 answer
  • Which statements best describe slaves in ancient times? Select all that apply.
    8·1 answer
  • 3.
    5·1 answer
  • When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router?
    11·1 answer
  • Virus warning don’t go on bit l y links it’s a virus
    12·2 answers
  • How scientist and technology beliefs society
    14·1 answer
  • Update thejavafile names to include your initials at the end, send .java file only.1. Completein-place heapSort, which takes an
    11·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • You are starting a small web hosting business and
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!