Retro video games delivered to your door every month!
Click above to get retro games delivered to your door ever month!
X-Hacker.org- dBsee 4.6 - The Library - Norton Guide http://www.X-Hacker.org [<<Previous Entry] [^^Up^^] [Next Entry>>] [Menu] [About The Guide]

   Finally, the steps necessary for defining the database can be summarised
   as follows:

   1.  Identify the files (articles, customers, invoices, etc.).

   2.  Describe the file structure, specifying the fields (article name,
       price, discount, description, etc.).

   3.  Identify the primary key for each file.

   4.  Identify the relation between the files.

   5.  Identify the integrity rules relative to each file and to each
       relationship defined.

   6.  Apply the second normal form to verify the correct choice of the
       primary key.

   7.  Apply the third normal form to verify the correct distribution of the
       fields among the files. In this stage, it could be necessary to create
       new files to avoid any transitive dependency.

   The database structure is usually designed on paper, and then afterwards
   the result is transferred into the application.

Online resources provided by: http://www.X-Hacker.org --- NG 2 HTML conversion by Dave Pearson