Database Principles: Fundamentals of Design, Implementation, and Management 3Rd Edition Carlos Coronel - Ebook PDF Download
Database Principles: Fundamentals of Design, Implementation, and Management 3Rd Edition Carlos Coronel - Ebook PDF Download
https://ebookluna.com/download/database-principles-fundamentals-
of-design-implementation-and-management-ebook-pdf/
https://ebookluna.com/product/original-pdf-database-processing-
fundamentals-design-and-implementation-14th/
https://ebookluna.com/product/ebook-pdf-database-processing-fundamentals-
design-and-implementation-15th-edition/
https://ebookluna.com/product/database-systems-design-implementation-
management-11th-edition-ebook-pdf/
https://ebookluna.com/product/ebook-pdf-database-systems-design-
implementation-management-13th-edition/
Database Systems: Design, Implementation, & Management 13th Edition (eBook
PDF)
https://ebookluna.com/product/database-systems-design-implementation-
management-13th-edition-ebook-pdf/
https://ebookluna.com/download/database-processing-fundamentals-design-and-
implementation-ebook-pdf/
https://ebookluna.com/product/original-pdf-principles-of-economics-by-
carlos-asarta/
https://ebookluna.com/product/ebook-pdf-innovation-management-effective-
strategy-and-implementation-3rd-ed-2017-edition/
https://ebookluna.com/product/ebook-pdf-foundation-design-principles-and-
practices-3rd-edition/
Australia Brazil Mexico South Africa Singapore United Kingdom United States
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Database Principles: Fundamentals of 2020 Cengage Learning EMEA
Senior Content Project Manager: Sue Povey written permission of Cengage Learning or under license
Cover Designer: Simon Levy Associates identified as Author(s) and Adapter(s) of this Work.
contact us at emea.info@cengage.com
emea.permissions@cengage.com
British Library.
ISBN: 978-1-4737-6804-8
United Kingdom
www.cengage.co.uk.
visit www.cengage.com.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Brief Contents
Glossary 912
Index 938
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
iv Brief Contents
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Contents
Preface xiii
Changes to the Third Edition xv
Acknowledgements xvi
About the Authors xvii
Walk Through Tour xviii
Dedication xx
Teaching and Learning Support Resources xxi
Parti Databasesystems 2
Business Vignette: The Relational Revolution An Historical Journey 3
2 Data Models 34
Preview 34
2.1 The importance of data models 35
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
vi Contents
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Contents vii
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
viii Contents
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Contents ix
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
x Contents
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Contents xi
Glossary 912
Index 938
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
PrefACe
We are excited to introduce the third edition of Database Principles, which is designed to provide a
solid and practical foundation for the design, implementation and management of database systems.
This foundation is built on the notion that, while databases are very practical things, their successful
creation depends on understanding the important concepts that define them.
This edition is suitable for a first course in databases at undergraduate level and will also provide
essential material for conversion postgraduate courses. Providing comprehensive and practical coverage
of core database concepts, it is an ideal text not only for those studying database management systems
in the context of computer science, but also those on courses in the areas of business technology,
introductory data science and data analytics.
Most difficult problems associated with database system management seem to be triggered
by poorly designed databases. It hardly seems worthwhile to use scarce resources to develop
excellent and extensive database system management skills in order to exercise them on crises
induced by poorly designed databases.
Design provides an excellent means of communication. Clients are more likely to get what they
need when database system design is approached carefully and thoughtfully. In fact, clients may
discover how their organisations really function once a good database design is completed.
Familiarity with database design techniques promotes ones understanding of current database
technologies. For example, because data warehouses derive much of their data from operational
databases, data warehouse concepts, structures, and procedures make more sense when the
operational databases structure and implementation are understood.
Because the practical aspects of database design are stressed, we have covered design concepts and
procedures in detail, making sure that the numerous end-of-chapter problems are sufficiently challenging
for students to develop real and useful design skills. We also make sure that students understand
the potential and actual conflicts between database design elegance, information requirements, and
transaction processing speed. For example, it makes little sense to design databases that meet design
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
xiv Preface
elegance standards while they fail to meet end-user information requirements. Therefore, we explore
the use of carefully defined trade-offs to ensure that the databases are capable of meeting end-user
requirements while conforming to high design standards.
This edition retains the use of UML (Unified Modelling Language) notation for data modelling.
Continual development by the Object Management Group has led to UML becoming an International
Standard (UML 2.5.1 is available as the 2017 edition standard: ISO/IEC 19505-1 and 19505-2), which
is continually reviewed. In keeping with the second edition, UML has continued to be used to produce
entity relationship models within this third edition. However, as organisations still use both Chen and
Crows Foot notation approaches to data modelling in order to maintain legacy systems, it is important
that familiarity is maintained. Appendix E, Comparison of ER Modelling Notations, contains coverage
of both these notations.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
ChAnges to the thirD eDition
In this third edition, we have added some new features and continued to strengthen the already strong
database design coverage. Here are just a few of the highlights:
To support the growth of Big Data and NoSQL technology, we have added a new Chapter 16: Big
Data and NoSQL. The chapter focuses in greater depth on the characteristics of Big Data and the
technologies that have been developed to support its use, including Hadoop and MongoDB.
New and expanded coverage of data visualisation tools and techniques in Chapter 15, Databases
for Business Intelligence.
New and updated Business Vignettes to provide topical discussion points in the classroom.
Coverage of MongoDB with hands-on exercises for querying MongoDB databases (Appendix Q).
An additional appendix containing coverage of Neo4j with hands-on exercises for querying graph
databases (Appendix R).
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
ACknoWLeDgeMents
The publisher acknowledges the contribution of the following lecturers, who provided invaluable
feedback on the second and third editions:
For this edition, I would like to say a special thanks to Pamela Quick, who previously worked as a
Senior Lecturer in the School of Computing, Maths and Digital Technology at Manchester Metropolitan
University. Her years of experience within the database field have been very valuable, specifically the
coverage of relational algebra.
On this third edition, I have been lucky to work with a very patient, supportive and professional
Publisher, Marinda Louw. Marinda provided fantastic support in answering all my emails. It has been
a pleasure working with you.
Last, and certainly not least, thank you to my family (my ohana) for your patience and support.
Keeley Crockett
January 2020
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
ABout the Authors
Carlos Coronel is currently the Lab Director for the College of Business Computer Labs at Middle
Tennessee State University. He has over 25 years of experience in various fields as a Database
Administrator, Network Administrator, Web Manager and Technology Specialist, and has taught
courses in Web development, database design and development, and data communications at the
undergraduate and graduate levels.
Steven Morris completed his Bachelor of Science and PhD from Auburn University. He has taught
Database Design and Development, Database Programming with Advanced SQL and PL/SQL, Systems
Analysis and Design, and Principles of MIS at Middle Tennessee State University. Steven has published
many articles, and currently serves on the review boards of several journals.
Dr Craig Blewett has been researching and teaching in the area of Information Systems and Technology
in South Africa for over 25 years. His Masters explored the application of Artificial Intelligence to
database transaction management. His PhD, in education technology, resulted in the development of
the Activated Classroom Teaching (ACT) model, a unique approach to teaching with technology. Craig
is the founder of multiple technology companies and is the author of numerous books covering topics
such as computer literacy, database systems, teaching with technology, running, and active living. He
is also an internationally acclaimed speaker who is using his innovative approaches to help change
education in our rapidly changing digital world.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
WALk-through tour
CHAPTER 1
The Database Approach
BUSINESS VIGNETTE What a database is, what the different types of databases are, and why they are
THE RELATIONAL REVOLUTION How modern databases evolved from file systems
What the database systems main components are and how a database system
difficult to navigate. Programmers needed to know what clients wanted to do with the data before The main functions of a database management system (DBMS)
the database was designed. Adding or changing the way the data were stored or analysed was
The role of open source database systems
article entitled A Relational Model of Data for Large Shared Data Banks. At the time, nobody
realised that Codds theories would spark a technological revolution on par with the development
of personal computers and the internet. Don Chamberlin, co-inventor of SQL, the most popular
database query language today, explains: There was this guy Ted Codd who had some kind of PREVIEW
strange mathematical notation, but nobody took it very seriously.
Then Ted Codd organised a symposium, and Chamberlin listened as Codd reduced complicated
five-page programs to one line. And I said, Wow, Chamberlin recalls. The symposium convinced
Good decisions require good information, which is derived from raw facts known as
IBM to fund System R, a research project that built a prototype of a relational database, which
data. Data are likely to be managed most efficiently when they are stored in a database.
would eventually lead to the creation of SQL and DB2. IBM, however, kept System R on the back
In this chapter, you learn what a database is, what it does and why it yields better
burner for a number of years, which turned out to be a crucial decision, because the company
results than other data management methods. You will also learn about different types
had a vested interest in IMS, a reliable, high-end database system that had been released in 1968.
At about the same time as System R started up, two professors from the University of California
Databases evolved from computer file systems. Although file system data
at Berkeley, who had read Codds work, established a similar project called Ingres. The competition
is important because they are the source of serious data management limitations. In
this research, IBM allowed its staff to publish these papers. Among those reading the papers was
this chapter, you will also learn how the database system approach helps eliminate
Larry Ellison, who had just founded a small company called Software Development Laboratories.
Navy, Ellison was able to market the first SQL-based relational database in 1979, well before IBM.
By 1983, the company (Software Development Laboratories) had released a portable version
of the database, had grossed over 3 910 000 annually, and had changed its name to Oracle.
Business Vignettes illustrate the parttopics with a Chapter Previews setthe scenefor the chapter and
genuine scenario and show how the subject integrates with provide an overview of the chapters contents.
the real world.
CHAPTER 3 The criticisms of field definitions and naming conventions shown in the file structure of Figure 1.3
1 are not unique to file systems. Because such conventions will prove to be important later, they are
introduced early. You will revisit field definitions and naming conventions when you learn about database
design in Chapter 5, Data Modelling with Entity Relationship Diagrams, and in Chapter 6, Data Modelling
Conceptual,
Concepts;
Logical and
and
Physical
when you
Database
learn about
Design.
database
Regardless
implementation
the
Chapter
design
11,
Characteristics whether
needs and
it involves
reporting
or
and
a database
processing
must
requirements.
always reflect
Both
the
types
designers
of needs
documentation
That the relational database model takes a logical view of data this book.
That the relational models basic components are relations implemented through
How relations are organised in tables composed of rows (tuples) and columns
(attributes)
NOTE
Key terminology used in describing relations
About the role of the data dictionary, and the system catalogue
No naming convention can fit all requirements for all systems. Some words or phrases are reserved for
Why indexing is important your DBMS might interpret a hyphen (-) as a command to subtract. Therefore, the field CUS-NAME would
be interpreted as a command to subtract the NAME field from the CUS field. Because neither field exists,
you would get an error message. On the other hand, CUS_NAME would work fine because it uses an
underscore.
PREVIEW
and data independence allow you to examine the models logical structure without
The file systems structure and lack of security make it difficult to combine data from multiple sources.
considering the physical aspects of data storage and retrieval. You also learnt that the
The organisational structure promotes the storage of the same basic data in different locations.
ERM may be used to depict entities and their relationships graphically through an ERD.
(Database professionals use the term islands of information for such scattered data locations.) As
In this chapter, you will learn some important details about the relational models logical
it is unlikely that data stored in different locations will always be updated consistently, the islands of
structure and more about how the ERD can be used to design a relational database.
information often contain different versions of the same data. For example, in Figures 1.3 and 1.4, the
You will learn how the relational databases basic data components fit into a
agent names and phone numbers occur in both the CUSTOMER and the AGENT files. You need only
logical construct known as a table. You will discover that one important reason for the
one correct copy of the agent names and phone numbers. Having them occur in more than one place
relational database models simplicity is that its tables can be treated as logical rather
produces data redundancy. Data redundancy exists when the same data are stored unnecessarily at
than physical units. You will also learn how the independent tables within the database
different places.
introduced to the basic concepts that shape the design of tables. Because the table is
Data inconsistency. Data inconsistency exists when different and conflicting versions of the same
such an integral part of relational database design, you will also learn the characteristics
data appear in different places. For example, suppose you change an agents phone number or
of well-designed and poorly designed tables. address in the AGENT file. If you forget to make corresponding changes in the CUSTOMER file,
Finally, you are introduced to some basic concepts that will become your gateway the files contain different data for the same agent. Reports will yield inconsistent results depending
to the next few chapters. For example, you will examine different kinds of relationships on which version of the data is used.
and the way in which those relationships might be handled in the relational database
Poor data security. Having multiple copies of data increases the chances of a copy of the data
environment.
Learning Objectives appear at the start of each chapter Online Content boxes draw attention to relevant material
to help you monitoryour understandingand progress onthe online platformfor this book.
through each chapter. Each chapter also ends with a Notes highlight important facts about the concepts
summary section that recaps the key content for revision introduced in the chapter.
purposes.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
154 PART I Database Systems
64 PART I Database Systems
User queries can be written as relational algebraic expressions. In order to write such as an
? Specify the relational operators and the intermediate results that are needed.
External High End-user views Hardware and software
Relational calculus is a formal language based upon a branch of mathematical logic called
Conceptual Global view of data Hardware and software
predicate calculus.
(independent of database model)
Tuple relational calculus allows users to describe what they want, rather than how to compute it,
Internal Specific database modelHardware
and underlines the appearance of Structured Query Language (SQL). Expressions in tuple
4
Physical Low Storage and access methods Neither hardware nor software
relational calculus return tuples for which a given predicate is true.
Domain relational calculus is different from tuple relational calculus as it uses domain variables
Database designers use data models to communicate with applications programmers and end SELECT s Selects a subset of tuples from a relation.
users. The basic data-modelling components are entities, attributes, relationships and constraints.
PROJECT P Selects a subset of columns from a relation.
Business rules are used to identify and define the basic modelling components within a specific DIFFERENCE - Selects tuples in Relation1 but not in Relation2*.
real-world environment.
INTERSECT Selects tuples in Relation1 or in Relation*.
The hierarchical and network data models were early models that are no longer used, but some of
UNION Selects tuples in Relation1 and Relation2, excluding duplicate tuples*.
The relational model is the current database implementation standard. In the relational model,
THETA JOIN u Allows two relations to be combined using one of the comparison operators
the end user perceives the data as being stored in tables. Tables are related to each other by { 5, ,, ,5, .5, , .}. When the operator is 5 the operator is known as an
means of common values in common attributes. The entity relationship (ER) model is a popular
EQUIJOIN.
graphical tool for data modelling that complements the relational model. The ER model allows
NATURAL JOIN |X|A version of the EQUIJOIN which selects those tuples where
database designers to visually present different views of the data as seen by database designers,
Relation1Tuple.Y 5 Relation2Tuple.Y. Y is a set of common attributes to
programmers and end users and to integrate the data into a common framework.
both relations which must share the same domain. Duplicate columns are
removed.
The object-orientated data model (OODM) uses objects as the basic modelling structure. An
object resembles an entity in that it includes the facts that define it. But unlike an entity, the object OUTERJOIN Based on the u-JOIN and natural JOIN, the OUTERJOIN in addition selects
also includes information about relationships between the facts as well as relationships with other all the tuples in Relation1 that have no corresponding values in the relation
Relation2.
objects, thus giving its data more meaning.
relational data model (ERDM). At this point, the OODM is largely used in specialised engineering EXISTENTIAL ' A formula must be true for at least one instance
and scientific applications, while the ERDM is primarily geared to business applications. Although UNIVERSAL The formula must be true for all instances
;
the most likely future scenario is an increasing merger of OODM and ERDM technologies, both are
* in the case of these operators, relations must be union-compatible.
NoSQL databases are a new generation of databases that do not use the relational model and
KEY TERMS
are geared to support the very specific needs of Big Data organisations. NoSQL databases offer
distributed data stores that provide high scalability, availability and fault tolerance by sacrificing data
Data modelling requirements are a function of different data views (global vs local) and the
domain relational calculus relational algebra theta join
level of data abstraction. The American National Standards Institute Standards Planning and
equijoin relational algebraic expression tuple relational calculus
conceptual and internal. There is also a fourth level of data abstraction (the physical level). This
join column(s) RESTRICT union-compatible
lowest level of data abstraction is concerned exclusively with physical storage methods.
left outer join right outer join
Summary Eachchapter ends witha comprehensive Key Terms arelisted atthe end ofthe chapter and
summary that provides a thorough recap of the issues in explained in full in a Glossary at the end of the book,
each chapter, helping you to assess your understanding and enabling you to find explanations of key terms quickly.
revise key content.
record structural independence Online Content The file structures you see in this problem set are simulated
semi-structured data Structured Query Language (SQL) in a Microsoft Access database named Ch01_Problems, available on the online
1 How many records does the file contain, and how many fields are there per record?
Codd, E.F. The Capabilities of Relational Database Management Systems. IBM Research Report, RJ3132, 1981.
Date, C.J. The Database Relational Model, A Retrospective Review and Analysis: a Historical Account and 2 What problem would you encounter if you wanted to produce a listing by city? How would you
Assessment of E.F. Codds Contribution to the Field of Database Technology. Addison Wesley, 2000.
solve this problem by altering the file structure?
Date, C.J. An Introduction to Database Systems, 8th edition. Addison Wesley, 2003.
Online Content Answers to selected Review Questions and Problems for this chapter PROJECT_ PROJECT_ MANAGER_ MANAGER_ADDRESS PROJECT_BID_
are available on the online platform accompanying this book. CODE MANAGER PHONE PRICE
21-5Z Holly B. Naidu 33-5-59200506 180 Boulevard Dr, Phoenix, 64700 13 179 975.00
25-2D Jane D. Grant 0181-898-9909 218 Clark Blvd., London, NW3 9 787 037.00
TRY
REVIEW QUESTIONS
25-5A Menzi F. Zulu 0181-227-1245 124 River Dr., Durban, 4001 25 458 005.00
25-9T Holly B. Naidu 33-5-59200506 180 Boulevard Dr, Phoenix, 64700 16 887 181.00
a data
27-4Q Menzi F. Zulu 0181-227-1245 124 River Dr., Durban, 4001 8 078 124.00
b field
29-2D Holly B. Naidu 33-5-59200506 180 Boulevard Dr, Phoenix, 64700 20 014 885.00
c record
31-7P William K. Moor 39-064885889 Via Valgia Silvilla 23, Roma, 00179 44 516 677.00
d file
2 What is data redundancy and which characteristics of the file system can lead to it?
3 If you wanted to produce alisting of the file contents by last name, area code, city, county or
3 Discuss the lack of data independence in file systems. postal code, how would you alter the file structure?
4 What data redundancies do you detect, and how could those redundancies lead to anomalies?
8 List and describe the different types of databases. NUM NAME NUM CODE HOUR HOURS
13 Use examples to compare and contrast structured and unstructured data. Which type is more 3 Satellite 110 Anne R. Ramoras CT 42.00 11.6 34-934412463
14 What are the six levels on which the quality of data can be examined? 3 Satelite 123 Mary D. Chen EE 65.00 19.1 0181-233-5432
Further Reading allows you to explore the subject further, Problems become progressively more complex as
and acts as a starting pointfor projects and assignments. students draw onthe lessons learnt from the completion of
Review Questions help reinforce and test your knowledge preceding problems.
and understanding, and provide a basis for group
discussions and activities.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
DeDiCAtion
To Craig, my best friend and patient husband. Thank you for supporting my crazy busy life without
you nothing would be possible. In memory of my father, Frank Crockett, who inspired me to be the
person I am today. To my mother, Norma Crockett, who is the angel in my life. Thank you for always
being there for me.
To my mother-and father-in-law Jackie and Bill Smith who have provided me with much love and
support.
Keeley Crockett
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Teaching & Learning
Support Resources
glossary terms.
BEUNSTOPPABLE!
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
DATABASE
PRINCIPLES
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
PartI
DATABASE
SySTEmS
1 The
Database
Approach
2 Data
Models
3 Relational
Model
Characteristics
4 Relational
Algebra
andCalculus
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
BuSINESS VIgNETTE
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
4 PART I Database Systems
Spurred on by competition, IBM finally released SQL/DS, its first relational database, in 1980.1
In 2008, a group of leading database researchers metin Berkeley and issued a report declaring
that the industry had reached an exciting turning point and was on the verge of another database
revolution.2
In 2010, Oracle acquired MySQL as part ofits acquisition of Sun. It has since maintained the
free open-source MySQL Community Edition while providing several versions (Standard Edition,
Enterprise Edition and Cluster Edition) for commercial customers. In 2019, the release of MySQL
Document Store brought together the SQL and the NoSQL languages, enabling developers to link
SQL relational tables to schema-less NoSQL databases.3 Oracles latest offering is Oracle Database
19c, where the c represents cloud; new versions now come out every year.
In our historical journey, we must also mention PostgreSQL, developed in1986 as part of the
POSTGRES project at the University of California at Berkeley. PostgreSQL4 is afree, open source,
object-relational database that extends the traditional SQL language by allowing creation of new
datatypes and functions, and the ability to write code in different programming languages. It is a
strong competitor to MySQL, given that it has had over 33 years of active development.
Analysts, journalists and business leaders continually see new developments with data
acquisition and its management, such as the explosion of unstructured data, the growing
importance of business intelligence, and the emergence of cloud technologies, which may require
the development of new database models. Although traditional relational databases meetrigorous
standards for data integrity and consistency, they do not scale unstructured data as well as new
database models such as NoSQL. NoSQL is also known as a non-relational database, which
allows the storage and retrieval of unstructured data using a dynamic schema. A key question
asked by database developers today is whether they need a NoSQL database or an SQL database
for their application. For example, Twitter and Facebook, which do not require high levels of data
consistency and integrity, have adopted NoSQL databases. In 2019, businesses are opting for
SQL and NoSQL multiple database combinations, which suggests that one size does not fit all.
As of March 2019, the most popular database management systems worldwide were Oracle,
MySQL, Microsoft SQL and PostgreSQL.5 So, whatis the future? Disruptive database technologies
are required for business to remain competitive and the key is real-time data. Alternative database
models such as cloud database platforms, which have the capability for real-time data analytics,
are for certain. Big data has a role to play as additional data sources must be processed using
data pipelines, all in accordance with the new General Data Protection Regulation (GDPR) data
regulations. The relational model will survive, but it will also adapt at unprecedented speed.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CHAPTER
1
The Database Approach
What the database systems main components are and how a database system
Preview
Good decisions require good information, which is derived from raw facts known as
data. Data are likely to be managed most efficiently when they are stored in a database.
In this chapter, you learn what a database is, what it does and why it yields better
results than other data management methods. You will also learn about different types
of databases and why database design is so important.
Databases evolved from computer file systems. Although file system data
management is now largely outmoded, understanding the characteristics of file systems
is important because they are the source of serious data management limitations. In
this chapter, you will also learn how the database system approach helps eliminate
most of the shortcomings of file system data management.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
6 PART I Database Systems
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 7
information is the result of processing raw data to reveal its meaning. Data processing may be as
simple as organising data to reveal patterns or as complex as making forecasts or drawing inferences 1
using statistical modelling. Such information can then be used as the foundation for decision making.
For example, the data summary for each question on the survey form can point out the labs strengths
and weaknesses, helping you to make informed decisions to better meet the needs of lab customers.
Raw data must be properly formatted for storage, processing and presentation. For example, the
student classification in Figure 1.1, Panel (c) is formatted to show the results based on the classifications
undergraduates years 1 to 3, postgraduates and a category other. The respondents yes/no responses
may need to be converted to a Y/N format for data storage. More complex formatting is required when
working with complex data types such as sounds, videos or images.
In this information age, production of accurate, relevant and timely information is the key to good
decision making. In turn, good decision making is the key to business survival in a global market. We are
now said to be entering the knowledge age.6 Data are the foundation of information, which is the
bedrock of knowledge that is, the body ofinformation and facts about a specific subject. Knowledge
implies familiarity, awareness and understanding of information as it applies to an environment. A key
characteristic of knowledge is that new knowledge can be derived from old knowledge.
Lets summarise some key points:
Accurate, relevant and timely information is the key to good decision making.
Timely and useful information requires accurate data. Such data must be generated properly, and they
must be stored in a format that is easy to access and process. And, like any basic resource, the data
environment must be managed carefully. Data management is a discipline that focuses on the proper
generation, storage and retrieval of data. Given the crucial role that data play, it should not surprise you
that data management is a core activity for any business, government agency, service organisation or
charity.
The quality of the data within the database is essential if the organisation is to make accurate short-and
long-term business decisions. Data must be fit for purpose and this often means that it can be used to
develop new strategies which aim to increase the income generation of an organisation. Data quality
can be examined at a number of different levels, including:
Accuracy: Is the data accurate and has it been obtained from a verifiable source?
Timeliness: Is the data updated frequently in order to meet the business requirements?
6 Peter Drucker coined the phrase knowledge worker in 1959 in his book Landmarks of Tomorrow. In 1994,
Ms Esther Dyson, Mr George Gilder, Dr George Keyworth and Dr Alvin Toffler introduced the concept of the
knowledge age.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
8 PART I Database Systems
The above list is not exhaustive. Most countries will have their own laws on the storage of data which an
organisation must adhere to. For example, the General Data Protection Regulation (GDPR), which governs
collecting and processing data, became alegal requirement for all organisations in Europe from 25 May
2018. One of the major changes detailed in Article 22 of the GDPR includes the rights of an individual not
to be subject to automated decision making, which includes profiling, unless explicit consent is given.
Individuals who are subject to such decision making have the right to ask for an explanation of how the
decision is reached and organisations must utilise appropriate mathematical and statistical procedures.
South Africa has the Protection of Personal Information Act (POPIA) which was signed into law in 2013.
POPIA promotes the protection of personal information by public and private bodies.
Data governance is the term used to describe a strategy or methodology defined by an organisation
to safeguard data quality. Each organisation produces its own data governance strategy that willinvolve
the development of a series of policies and procedures for managing availability, usability, quality,
integrity and security of data within the organisation. For example, the strategy defines who owns
the data within the organisation and who is authorised to create, update and delete new records in the
database. Master Data Management (MDM) is a component of a data governance strategy that provides
the technological foundation for implementation of the strategy. MDM ensures that data is consistent
and accurate across all systems within an organisation and provides technology to allow the auditing,
reporting and compliance of data.
Creating a data governance strategy is a complex and time-consuming task and willinvolve many people
working at different levels within the organisation. Once the strategy has been developed and put into
operation, it will take the organisation several months to ensure that all data complies with the strategy.
Once in place, the polices and the procedures of the strategy should be regularly measured and monitored
to ensure that they are being followed. This will allow continual monitoring of the data governance strategy
to ensure that it is still relevant and up to date for the purpose of the organisation. Data profiling and data
quality tools are often used as part of the monitoring process to keep track of data over time.
Efficient data management typically requires the use of a computer database. A database is a shared,
integrated computer structure that stores a collection of:
metadata, or data about data, through which the end-user data are integrated and managed.
The metadata provide a description of the data characteristics and the set of relationships that link
the data found within the database. In a sense, a database resembles a very well-organised electronic
filing cabinet in which powerful software, known as a database management system, helps manage
the cabinets contents. A database management system (DBMS) is a collection of programs that
manages the database structure and controls access to the data stored in the database.
Figure 1.2 illustrates that the DBMS serves as the intermediary between the user and the database.
The DBMS receives all application requests and translates them into the complex operations required
to fulfil those requests. The DBMS hides much of the databases internal complexity from the
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 9
application programs and users. The application program might be written by a programmer using a
programming language such as Python, Visual Basic, C++ or Java, or it might be created through a 1
DBMS utility program.
FIguRE 1.2 The DBmS managesthe interaction between the end user and
the database
End users
Metadata
Data
Customers
DBMS
database End-user
Invoices
management system data
End users
Application Products
request
Data
Having a DBMS between the end users applications and the database offers some important
advantages. First, the DBMS enables the data in the database to be shared among multiple applications
or users. Second, the DBMS integrates the many different users views of the data into a single all-encompassing
data repository.
Because data are the crucial raw material from which information is derived, you need a good way of
managing such data. As you will discover in this book, the DBMS helps make data management more
efficient and effective. In particular, a DBMS provides advantages such as:
Improved data sharing. The DBMS helps create an environment in which end users have better
access to more and better-managed data. Such access makes it possible for end users to
respond quickly to changes in their environment.
Better data integration. Wider access to well-managed data promotes an integrated view of the
organisations operations and a clearer view of the big picture. It becomes much easier to see how
actions in one segment of the company affect other segments.
Minimised data inconsistency. Data inconsistency exists when different versions of the same
data appear in different places. For example, data inconsistency exists when a companys sales
department stores a sales representatives name as Thobile Cele and the companys personnel
department stores that same persons name as Bathobile M. Cele or when the companys
regional sales office shows the price of product X as R390.00 in South African currency and
its national sales office shows the same products price as R350.00. The probability of data
inconsistency is greatly reduced in a properly designed database.
Improved data access. The DBMS makes it possible to produce quick answers to ad hoc queries.
From a database perspective, a query is a specific request for data manipulation (for example,
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
10 PART I Database Systems
to read or update the data) issued to the DBMS. Simply put, a query is a question and an ad hoc
1 query is a spur-of-the-moment question. The DBMS sends back an answer (called the query result
set) to the application. For example, end users, when dealing withlarge amounts of sales data,
might want quick answers to questions (ad hoc queries) such as:
? What was the volume of sales by product during the past six months?
? What is the sales bonus figure for each of our salespeople during the past three months?
? How many of our customers have credit balances of R5 000 (or 3 000) or more?
Improved decision making. Better-managed data and improved data access make it possible to
generate better-quality information, on which better decisions are based.
Increased end-user productivity. The availability of data, combined with the tools that transform
data into usable information, empowers end users to make quick, informed decisions that can be
the difference between success and failure in the global economy.
The advantages of using a DBMS are not limited to the few just listed. In fact, you will discover many
more advantages as you learn more about the technical details of databases and their proper design.
A DBMS can support many different types of databases. Databases can be classified according to
the number of users supported, where the data are located, the type of data stored, the intended data
usage and the degree to which the data are structured.
The number of users determines whether the database is classified as single-user or multi-user.
A single-user database supports only one user at a time. In other words, if user Ais using the database,
users B and C must wait until user Ais done. A single-user database that runs on a personal computer
is called a desktop database. In contrast, a multi-user database supports multiple users at the same
time. When the multi-user database supports a relatively small number of users (usually fewer than 50)
or a specific department within an organisation, it is called a workgroup database. Whenthe database
is used by the entire organisation and supports many users (more than 50, usually hundreds) across
many departments, the database is known as an enterprise database.
Location might also be used to classify the database. For example, a database that supports data
located at a single site is called a centralised database. A database that supports data distributed
across several different sites is called a distributed database. The extent to which a database can be
distributed, and the way in which such distribution is managed, is addressed in detail in Chapter 14,
Distributed Databases.
The most popular way of classifying databases today, however, is based on how they will be used
and on the time sensitivity of the information gathered from them. For example, transactions such as
product or service sales, payments and supply purchases reflect critical day-to-day operations. Such
transactions must be recorded accurately and immediately. A database that is designed primarily to
support a companys day-to-day operations is classified as an operational database, also referred
to as an online transaction processing (OLTP), transactional or production database.
Typically, analytical databases comprise two main components: a data warehouse and an online
analytical processing (OLAP) front end. The data warehouse is a specialised database that stores
data in a format optimised for decision support. The data warehouse contains historical data obtained
from the operational databases as well as data from other external sources. Online analytical processing
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 11
is a set of tools that work together to provide an advanced data analysis environment for retrieving,
processing and modelling data from the data warehouse. In recent times, this area of database 1
application has grown in importance and usage, to the point that it has evolved into its own discipline:
business intelligence. The term business intelligence describes a comprehensive approach to
capturing and processing business data with the purpose of generating information to support business
decision making. (See Chapter 15, Databases for Business Intelligence.)
Databases can also be classified to reflect the degree to which the data are structured. Unstructured
data are data that exist in their original (raw) state that is, in the format in which they were collected.
Therefore, unstructured data exist in a format that does not lend itself to the processing that yields
information. Structured data are the result of formatting unstructured data to facilitate its storage and
use, and the generation of information. You apply structure (format) based on the type of processing
that you intend to perform on the data. Some data might not be ready (unstructured) for some types of
processing, but they might be ready (structured) for other types of processing. For example, the data
value 37890 might refer to a postal code, a sales value or a product code. If this value represents a
postal code or a product code and is stored as text, you cannot perform mathematical computations
with it. On the other hand, if this value represents a sales transaction, it must be formatted as numeric.
To illustrate the concept of structure further, imagine a stack of printed paper invoices. If you
merely want to store these invoices as images for future retrieval and display, you can scan them and
save them in a graphic format. Onthe other hand, if you want to derive information such as monthly
totals and average sales, such graphic storage would not be useful. Instead, you could store the
invoice data in a (structured) spreadsheet format so that you can perform the requisite computations.
Actually, most data you encounter are best classified as semi-structured. Semi-structured data have
already been processed to some extent. For example, if you look at a typical Web page, the data are
presented in a prearranged format to convey some information. The database types mentioned thus
far focus on the storage and management of highly structured data. However, corporations are not
limited to the use of structured data. They also use semi-structured and unstructured data. Just think
of the valuable information that can be found in company emails, memos and documents such as
procedures, rules and Web pages. Unstructured and semi-structured data storage and management
needs are being addressed through a new generation of databases known as XML databases.
extensible Markup Language (XML) is a special language used to represent and manipulate data
elements in a textual format. An XML database supports the storage and management of semi-structured
XML data. XML databases will be discussed in more detail in Chapter 16, Database
Connectivity and Web Technologies.
Analytical databases focus primarily on storing historical data and business metrics used exclusively
for tactical or strategic decision making. Such analysis typically requires extensive data massaging
(data manipulation) to produce information on which to base pricing decisions, sales forecasts, market
strategies and so on. Analytical databases allow the end user to perform advanced data analysis of
business data using sophisticated tools.
In contrast, a data warehouse focuses primarily on storing data used to generate information
required to make tactical or strategic decisions. Such decisions typically require extensive data
massaging (data manipulation) to extract information to formulate pricing decisions, sales forecasts,
market positioning, etc. Most decisions supported by data are based on historical data obtained from
operational databases. Additionally, the data warehouse can store data derived from many sources.
To make it easier to retrieve such data, the data warehouse structure is quite different from that of a
transactional database. The design, implementation and use of data warehouses are covered in detail
in Chapter 15, Databases for Business Intelligence.
Table 1.1 compares features of several well-known database management systems.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
12 PART I Database Systems
Multi-user
Single
User workgroup enterprise Centralised Distributed Operational Analytical
MS X X X X X
Access
MS SQL X3 X X X X X X X
Server
IBM DB2 X3 X X X X X X X
MySQL X X X X X X X X
Oracle X3 X X X X X X X
RDBMS
All the database management systems shown in Table 1.1 (except MySQL) are provided by
commercial vendors and require a significant investment from a company in order to buy the actual
DBMS, its applications and ongoing support and maintenance. MySQL7 is an open source database
system which allows users to build and modify a database of their choice, distribute the database and
improve the actual MySQL DBMS product. The idea is that users can develop the database system
for any purpose, look at the source code and make any improvements, which will then be released
back to the general public.
The main benefit of open source software is that it is free to acquire and use the product itself. However,
there will be costs involved in the development and ongoing support of the software. The term LAMP is
used to define the most popular open source software, namely: Linux, Apache Web server, MySQL DBMS
and the Perl PHP/Python development languages. Together this software stack provides the basic building
blocks for developing websites. Typically, open source database management system products such as
MySQL and PostgreSQL8 are easier to use than large-scale vendor DBMS products as they stick to the
basic fundamental database principles. This makes them ideal for smaller companies and organisations to
develop database-centred applications quickly. A disadvantage of open source software is that it does not
provide the robust functionality and durability required by large-scale commercial systems.
Withthe emergence of the World Wide Web and internet-based technologies as the basis for the new
social media generation, great amounts of data are being stored and analysed. Social media refers to
Web and mobile technologies that enable anywhere, anytime, always on human interactions. Websites
such as Google, Facebook, Instagram, Twitter and LinkedIn capture vast amounts of data about end
users and consumers. These data grow exponentially and require the use of specialised database
systems. Over the past few years, this new breed of specialised database has grown in sophistication
and widespread usage. Currently, this new type of database is known as a NoSQL database. The
term NoSQL9 (Not only SQL) is generally used to describe a new generation of database management
systems that is not based on the traditional relational database model. You will learn more about NoSQL
in Chapter 16 Big Data and NoSQL.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 13
NOTE 1
Most of the database design, implementation and management issues addressed in this book are based on
production (transactional) databases. The focus on production databases is based on two considerations.
First, production databases are the databases most frequently encountered in common activities such as
enrolling in a class, registering a car, buying a product or making a bank deposit or withdrawal. Second, data
warehouse databases derive most of their data from production databases, and if production databases are
poorly designed, the data warehouse databases based on them will lose their reliability and value as well.
Database design refers to the activities that focus on the design of the database structure that will be
used to store and manage end-user data. A good database that is, a database that meets all user
requirements does not just happen; its structure must be designed carefully. In fact, database design is
such a crucial aspect of working with databases that most of this book is dedicated to the development
of good database design techniques. Even a good DBMS will perform poorly with a badly designed
database.
Proper database design requires the database designer to identify precisely the databases
expected use. Designing a transactional database emphasises accurate and consistent data and
operational speed. The design of a data warehouse database recognises the use of historical and
aggregated data. Designing a database to be used in a centralised, single-user environment requires
a different approach from that used in the design of a distributed, multi-user database. This book
emphasises the design of transactional, centralised, single-user and multi-user databases. Chapters 14
and 15 also examine critical issues confronting the designer of distributed and data warehouse
databases.
A well-designed database facilitates data management and generates accurate and valuable
information. A poorly designed database is likely to become a breeding ground for difficult-to-trace
errors that may lead to bad decision making and bad decision making can lead to the failure of an
organisation. Database design is simply too important to be left to luck. Thats why university students
study database design, why organisations of all types and sizes send personnel to database design
seminars, and why database design consultants often make an excellent living.
Understanding what a database is, what it does and the proper way to use it can be clarified by
considering what a database is not. A brief explanation of the evolution of file system data processing
can be helpful in understanding the data access limitations that databases attempt to overcome.
Understanding these limitations is relevant to database designers and developers because database
technologies do not make these problems magically disappear database technologies simply make
it easier to create solutions that avoid these problems. Creating database designs that avoid the
pitfalls of earlier systems requires that the designer understands these problems and how to avoid
them; otherwise, the database technologies are no better (and are potentially even worse!) than the
technologies and techniques they have replaced.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
14 PART I Database Systems
Generating reports from manual file systems was slow and cumbersome. In fact, some business
managers faced government-imposed reporting requirements that led to weeks of intensive effort
each quarter, even when a well-designed manual system was used. Therefore, a data processing
(DP) specialist was hired to create a computer-based system that would track data and produce
required reports. Initially, the computer files within the file system were similar to the manual files. A
simple example of a customer data file for a small insurance company is shown in Figure 1.3. (You will
discover later that the file structure shown in Figure 1.3, although typically found in early file systems, is
unsatisfactory for a database.)The description of computer files requires a specialised vocabulary. Every
discipline develops its own terminology to enable its practitioners to communicate clearly. The basic file
vocabulary shown in Table 1.2 will help you to understand subsequent discussions more easily.
Term Definition
Data Raw facts, such as a telephone number, a birth date, a customer name and a year-to-date (YTD)
sales value. Data have little meaning unless they have been organised in some logical manner. The
smallest piece of data that can be recognised by the computer is a single character, such as the
letter A, the number 5 or a symbol such as /. A single character requires 1 byte of computer storage.
Field A character or group of characters (alphabetic or numeric) that has a specific meaning. A field is used
to define and store data.
record Alogically connected set of one or morefields that describes a person, place or thing. For example,
the fields that constitute a record for a customer named J. D. Rudd might consist of J. D. Rudds
name, address, phone number, date of birth, credit limit and unpaid balance.
File A collection of related records. For example, a file might contain data about vendors of ROBCOR
Company, or a file might contain the records for the students currently enrolled at Gigantic University.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 15
Mpu K. 0181-894-1238 Box 12A Rd, N6 4WE Alex B. 0161-228-1249 T1 250.00 16-Jun-2018
Dlamini Highgate, Alby
Johannesburg
Fatima 0161-222-1672 Box 111 Dr., M15 REE Alex B. 0181-228-1249 T1 100.00 28-Dec-2018
Naidoo Chatsworth, Alby
Durban
Amy B. 0181-442-3381 387 Troll Dr., N6 LOP Menzi T. 0181-123-5589 T2 850.00 22-Sep-2018
OBrian Highgate, Ndlovu
East London
Anne G. 0181-382-7185 2119 Elm St., NW3 RTA Alex B. 0161-228-1249 T2 100.00 03-Dec-2018
Farriss Parkview, Alby
Johannesburg
Using the proper file terminology given in Table 1.2, you can identify the file components shown in
Figure 1.3. The CUSTOMER file shown in Figure 1.3 contains ten records. Each record is composed
of nine fields: C_NAME, C_PHONE, C_ADDRESS, C_POSTCODE, A_NAME, A_PHONE, TP, AMT and
REN. The ten records are stored in a named file. Because the file in Figure 1.3 contains customer data,
its filename is CUSTOMER.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
16 PART I Database Systems
When business users wanted data from the computerised file, they sent requests for the data to
1 the DP specialist. For each request, the DP specialist had to create programs to retrieve the data
from the file, manipulate it in whatever manner the user had requested and present it as a printed
report. If a request was for a report that had been run previously, the DP specialist could rerun
the existing program and provide the printed results to the user. As other business users saw the
new and innovative ways in which customer data were being reported, they wanted to be able to
view their data in similar fashions. This generated more requests for the DP specialist to create
more computerised files of other business data, which in turn meant that more data management
programs had to be created, and more requests for reports. For example, the sales department at
the insurance company created a file named SALES, which helped track daily sales efforts. The sales
departments success was so obvious that the personnel department manager demanded access to
the DP specialist to automate payroll processing and other personnel functions. Consequently, the
DP specialist was asked to create the AGENT file shown in Figure 1.4. The data in the AGENT file
were used to do electronic fund transfers (EFTs), keep track of taxes paid and summarise insurance
coverage, among other tasks.
A_NAMe A_PHONe A_ADDreSS POSTCODe HireD YTD_PAY YTD_iT YTD_Ni YTD_SLS DeP
Alex B. 0161-228-1249 Deken Van 5492 01-Nov-2001 20 806.00 5 201.00 1 664.00 103 963.00 3
Best
Nkita F. 27-21-410-7100 West Quay 8002 23-May-2004 25 230.00 6 308.00 2 018.00 108 844.00 0
Brown Road,
Waterfront,
Cape Town
Menzi T. 0181-123-5589 452 Elm St., 2193 15-Jun-2003 18 169.00 4 542.00 1 453.00 99 548.00 2
Ndlovu Parkview,
Johannesburg
As the number of files increased, a small file system, like the one shown in Figure 1.5, evolved. Each file
in the system used its own application programs to store, retrieve and modify data. And each file was
owned by the individual or the department that commissioned its creation.
As the file system grew, the demand for the DP specialists programming skills grew even faster, and
the DP specialist was authorised to hire additional programmers. The size of the file system also required
alarger, more complex computer. The new computer and the additional programming staff caused the
DP specialist to spend less time programming and more time managing technical and human resources.
Therefore, the DP specialists job evolved into that of a data processing (DP) manager, who supervised
a DP department. In spite of these organisational changes, however, the DP departments primary
activity remained programming, and the DP manager inevitably spent much time as a supervising senior
programmer and program troubleshooter.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 17
File File
Management Management
Programs Programs
File File
Report Report
Program Program
The file system method of organising and managing data was a definite improvement on a manual
system and served a useful purpose in data management for over two decades, a very long timespan
in the computer era. Nonetheless, many problems and limitations became evident in this approach. A
critique of the file system method serves two major purposes:
Understanding the shortcomings of the file system enables you to understand the development of
modern databases.
Many of the problems are not unique to file systems. Failure to understand such problems is likely
to lead to their duplication in a database environment, even though database technology makes it
easy to avoid them.
The following problems severely challenge the types of information that can be created from the data
as well as the accuracy of the information:
Lengthy development times. The first and most glaring problem with the file system approach
is that even the simplest data-retrieval task requires extensive programming. Withthe older file
systems, programmers had to specify what must be done and how to do it. As you will learn in
upcoming chapters, modern databases use a non-procedural data manipulation language that
allows the user to specify what must be done without specifying how.
Difficulty in getting quick answers. The need to write programs to produce even the simplest
reports makes ad hoc queries impossible. DP specialists who work with mature file systems often
receive numerous requests for new reports. They are often forced to say that the report will be
ready next week or even next month. If you need the information now, getting it next week or
next month will not serve your information needs.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
18 PART I Database Systems
Complex system administration. System administration becomes more difficult as the number of files in
1 the system expands. Even a simple file system with afew files requires creating and maintaining several
file management programs. Each file must have its own file management programs that allow the user
to add, modify and delete records; to list the file contents; and to generate reports. Because ad hoc
queries are not possible, the file reporting programs can multiply quickly. The problem is compounded
by the fact that each department in the organisation owns its data by creating its own files.
Lack of security and limited data sharing. Another fault of a file system data repository is alack of
security and limited data sharing. Data sharing and security are closely related. Sharing data among
multiple geographically dispersed users introduces a lot of security risks. In terms of creating data
management and reporting programs, security and data-sharing features are difficult to program
and consequently are often omitted from a file system environment. Such features include effective
password protection, the ability to lock out parts of files or parts of the system itself, and other
measures designed to safeguard data confidentiality. Even when an attempt is made to improve
system and data security, the security devices tend to be limited in scope and effectiveness.
Extensive programming. Making changes to an existing file structure can be difficult in a file
system environment. For example, changing just one field in the original CUSTOMER file would
require a program that:
In fact, any change to a file structure, no matter how minor, forces modifications in all of the programs
that use the data in that file. Modifications are likely to produce errors (bugs), and additional time is
spent using a debugging process to find those errors. Those limitations, in turn, lead to problems of
structural and data dependence.
Afile system exhibits structural dependence; that is, access to afile is dependent onits structure. For
example, adding a customer date-of-birth field to the CUSTOMER file shown in Figure 1.3 would require
the five steps described in the previous section. Given this change, none of the previous programs
will work with the new CUSTOMER file structure. Therefore, all of the file system programs must be
modified to conform to the new file structure. In short, because the file system application programs
are affected by change in the file structure, they exhibit structural dependence. Conversely, structural
independence exists when it is possible to make changes in the file structure without affecting the
application programs ability to access the data.
Even changes in file data characteristics, such as changing a field from integer to decimal, require
changes in all programs that access the file. Because all data access programs are subject to change when
any of the files data storage characteristics change (that is, changing the data type), the file system is said
to exhibit data dependence. Conversely, data independence exists when it is possible to make changes
in the data storage characteristics without affecting the application programs ability to access the data.
The practical significance of data dependence is the difference between the logical data format
(how the human being views the data) and the physical data format (how the computer sees the
data). Any program that accesses afile systems file must tell the computer not only what to do, but also
how to do it. Consequently, each program must contain lines that specify the opening of a specific file
type, its record specification and its field definitions. Data dependence makes the file system extremely
cumbersome from a programming and data management point of view.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 19
CUS_ADDRESS Customer street address or box number 123 Green Meadow Lane
Selecting proper field names is also important. For example, make sure that the field names are
reasonably descriptive. In examining the file structure shown in Figure 1.3, it is not obvious that the
field name REN represents the customers insurance renewal date. Using the field name CUS_RENEW_
DATE would be better for two reasons. First, the prefix CUS can be used as an indicator of the fields
origin, which is the CUSTOMER file. Therefore, you know that the field in question yields a CUSTOMER
property. Second, the RENEW_DATE portion of the field name is more descriptive of the fields contents.
With proper naming conventions, the file structure becomes self-documenting. That is, by simply looking
at the field names, you can determine which files the fields belong to and what information the fields
are likely to contain.
Some software packages place restrictions on the length of field names, so it is wise to be as
descriptive as possible within those restrictions. In addition, very long field names make it difficult to
fit more than a few fields on a page, thus making output spacing a problem. For example, the field
name CUSTOMER_INSURANCE_RENEWAL_DATE, while being self-documenting, is less desirable
than CUS_RENEW_DATE.
Another problem in Figure 1.3s CUSTOMER file is the difficulty of finding desired data efficiently.
The CUSTOMER file currently does not have a unique record identifier. For example, it is possible to
have several customers named James G. Khumalo. Consequently, the addition of a CUS_ACCOUNT
field that contains a unique customer account number would be appropriate.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
20 PART I Database Systems
The criticisms of field definitions and naming conventions shown in the file structure of Figure 1.3
1 are not unique to file systems. Because such conventions will prove to be important later, they are
introduced early. You will revisit field definitions and naming conventions when you learn about database
design in Chapter 5, Data Modelling with Entity Relationship Diagrams, and in Chapter 6, Data Modelling
Advanced Concepts; and when you learn about database implementation issues in Chapter 11,
Conceptual, Logical, and Physical Database Design. Regardless of the data environment, the design
whether it involves a file system or a database must always reflect the designers documentation
needs and the end users reporting and processing requirements. Both types of needs are best served
by adhering to proper field definitions and naming conventions.
NOTE
No naming convention can fit all requirements for all systems. Some words or phrases are reserved for
the DBMSs internal use. For example, the name ORDER generates an error in some DBMSs. Similarly,
your DBMS might interpret a hyphen (-) as a command to subtract. Therefore, the field CUS-NAME would
be interpreted as a command to subtract the NAME field from the CUS field. Because neither field exists,
you would get an error message. On the other hand, CUS_NAME would work fine because it uses an
underscore.
The file systems structure and lack of security makeit difficult to combine data from multiple sources.
The organisational structure promotes the storage of the same basic data in different locations.
Database professionals use the term islands of information for such scattered data locations. As
it is unlikely that data stored in different locations will always be updated consistently, the islands of
information often contain different versions of the same data. For example, in Figures 1.3 and 1.4, the
agent names and phone numbers occur in both the CUSTOMER and the AGENT files. You need only
one correct copy of the agent names and phone numbers. Having them occur in more than one place
produces data redundancy. Data redundancy exists when the same data are stored unnecessarily at
different places.
Uncontrolled data redundancy sets the stage for:
Data inconsistency. Data inconsistency exists when different and conflicting versions of the same
data appear in different places. For example, suppose you change an agents phone number or
address in the AGENT file. If you forget to make corresponding changes in the CUSTOMER file,
the files contain different data for the same agent. Reports will yield inconsistent results depending
on which version of the data is used.
Poor data security. Having multiple copies of data increases the chances of a copy of the data
being susceptible to unauthorised access.
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
CHAPTER 1 The Database Approach 21
NOTE 1
Data that display data inconsistency are also referred to as data that lack data integrity. Data integrity is
defined as the condition in which all of the data in the database are consistent with the real-world events
and conditions. In other words,
Data are verifiable; the data will always yield consistent results.
Data entry errors are more likely to occur when complex entries (such as 12-digit phone numbers)
are made in several different files and/or recur frequently in one or morefiles. In fact, the CUSTOMER
file shown in Figure 1.3 contains just such an entry error: the third record in the CUSTOMER file
has a transposed digit in the agents phone number (27-12-410-7100 rather than 27-21-410-1700).
It is possible to enter a non-existent sales agents name and phone number into the CUSTOMER
file, but customers are not likely to be impressed if the insurance agency supplies the name and
phone number of an agent who does not exist. And should the personnel manager allow a non-existent
agent to accrue bonuses and benefits? In fact, a data entry error such as an incorrectly
spelled name or an incorrect phone number yields the same kind of data integrity problems.
Data anomalies. The dictionary defines anomaly as an abnormality. Ideally, a field value change
should be made in only a single place. Data redundancy, however, fosters an abnormal condition
by forcing field value changes in many different locations. Look at the CUSTOMER file in Figure 1.3.
If agent Nikita F. Brown decides to get married and move, the agent name, address and phone are
likely to change. Instead of making just a single name and/or phone/address change in a single
file (AGENT), you also must make the change each time that agents name, phone number and
address occur in the CUSTOMER file. You could be faced with the prospect of making hundreds of
corrections, one for each of the customers served by that agent! The same problem occurs when
an agent decides to quit. Each customer served by that agent must be assigned a new agent.
Any change in any field value must be correctly made in many places to maintain data integrity.
A data anomaly develops when all of the required changes in the redundant data are not made
successfully. The data anomalies found in Figure 1.3 are commonly defined as follows:
? Update anomalies. If agent Nikita F. Brown has a new phone number, that number must be
entered in each of the CUSTOMER file records in which Ms Browns phone number is shown. In
this case, only three changes must be made. In a large file system, such changes might occur in
hundreds or even thousands of records. Clearly, the potential for data inconsistencies is great.
? Insertion anomalies. For example, if only the CUSTOMER file existed, to add a new agent, you
would also add a dummy customer data entry to reflect the new agents addition. Again, the
potential for creating data inconsistencies would be great.
? Deletion anomalies. If you delete Amy B. OBrian, Saajidah Maharaj and Olette K. Snyman, then
you will also delete Menzi T. Ndlovus agent data. Clearly, this is not desirable.
The problems inherent in file systems make using a database system very desirable. Traditional
file systems often made reference to several files such as the customer master file, the product
master file and the transaction file, which were stored separately. However, unlike the file system,
Copyright 2020 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it
Discovering Diverse Content Through
Random Scribd Documents
prepared so as to display not only the shape of the
crowns, but also the number and character of the
roots by which they are implanted.
Bay II. In bay No. II the two wall-cases contain a
Classification
of Mammals.
collection arranged to show in a serial manner the
orders and sub-orders of existing Mammals, by
examples selected to illustrate the predominating
characters by which these are distinguished. A brief
popular account of the characteristics of the group,
and a map showing its geographical distribution,
are placed with each. This is intended to serve not
only for an introduction to the study of the class by
visitors to the museum, but also as a guide to a
method of arrangement which may be adopted in
smaller institutions.
Among the illustrations of the order Primates is
placed the skeleton of a young Chimpanzee
dissected by Dr. Tyson, which formed the subject of
his work on the “Anatomy of a Pigmie,” published in
1699, the earliest scientific description of any Man-
like Ape.
Skin of The central case of this bay contains
Mammals. illustrations of the outer covering or skin and its
modifications in the class of Mammals, divided into
the following sections:
1. Expansion of skin to aid in locomotion, as the
webs between the fingers of swimming and flying
animals, the parachutes of flying animals.
2. The development of bony plates in the skin,
found among Mammals only in the Armadillos and
their allies. The cast of a section of the tail of a
gigantic extinct species (Glyptodon) shows a bony
external as well as an internal skeleton.
3. The outer covering modified into true scales,
much resembling in structure the nails of the
human hand. This occurs in only one family of
Mammals, the Pangolins, or Manidæ.
4. Hair in various forms, including bristles and
spines. The two kinds of hair composing the
external clothing of most Mammals, the long, stiffer
outer hair, and the short, soft under-fur, are shown
by various examples.
5. The special epidermal appendages found in
nearly all Mammals on the ends of the fingers and
toes, called according to the various forms they
assume, nails, claws, or hoofs.
6. The one or two unpaired horns of the
Rhinoceroses, shown by sections to consist of a
solid mass of hair-like epidermic fibres.
7. The horns of Oxen, Goats, and Antelopes,
each consisting of a hollow conical sheath of horn,
covering a permanent projection of the frontal bone
(the horn-core).
8. The antlers of Deer, forming solid, bony, and
generally branched projections, covered during
growth with soft hairy skin, and in most cases shed
and renewed annually.
On the wall is arranged a series of antlers of an
individual Stag or Red Deer (Cervus elaphus),
grown and shed (except the last) in thirteen
successive years, showing the changes which took
place in their size and form, and the development
of the branches, or tines, in each year. In old age
the number of these tines tends to diminish.
On the north side of the table-case are shown
dissections of the principal internal organs of
Mammals.
Bay III. Bay No. III is devoted to the class of Birds. An
General
structure of
Albatross (Diomedea exulans) mounted with the
Birds. wings expanded shows the most important
characters by which a Bird is externally
distinguished from other animals. The body is
clothed with feathers, which (in the majority of
Birds), by their great size and special arrangement
upon the fore-limbs, enable these to act as organs
of flight. The mouth is in the form of a horny beak.
A nestling Albatross shows that at this stage of its
existence the bird is not clothed with ordinary
feathers, but with soft down, which serves to keep
the body warm, although it confers no power of
flight. An Emu and an Apteryx in the lower
compartment of the case display the exceptional
condition (found only in a comparatively few
members of the class) of Birds with wings so small
as to be concealed beneath the general feathery
covering of the body, and quite useless. In the
Penguins, of which two species are shown in the
case, the wings are reduced to the condition of fins,
and are serviceable only for progress through water.
In the first wall-case the principal features of
the skeleton of the class are shown. Sections of
bones exhibit the large air-cavities within; a
complete skeleton of an Eagle, with the bones
separated and named, and mounted skeletons of
the Ostrich, Penguin, Pelican, Vulture, Night-Parrot,
Fowl, etc., show the chief modifications of the
skeleton. The Apteryx possesses the smallest, and
the Frigate-bird the longest bones of the wing, the
correspondence of which can be readily traced by
means of the labels attached to them. The under
surfaces of the skulls of various birds are shown
with the different bones coloured to indicate their
limits and relations; these are followed by a series
of the different types of sternum or breast-bone.
The second wall-case contains further
illustrations of the anatomy of Birds. In the left-
hand part a series of wings of Birds displays the
form characteristic of different groups; while above
them are a few of the different types of tails,
supplementing the series of tails in the table-case.
Very instructive is a series of skins of white chickens
of the same brood at different ages, displaying the
gradual replacement of the down by the adult
plumage.
The table-case in the middle of the bay
contains illustrations of the external characters, the
beak, the feathers, and the tail, as well as of the
fore and hind limbs, or wings and feet. By the aid
of the explanatory labels, the essential characters
and the principal modifications of all these parts
may easily be followed.
Two cases on the wall in the vestibule leading
to the Fish Gallery illustrate the chief modifications
of the eggs of Birds, and their differences in
structure, number, form, size, texture of surface,
and colour. On the side of the main staircase
opposite are specimens illustrating the parasitic
nesting habits of certain Cuckoos and various other
Birds; while near by is a remarkably fine series of
the eggs of Cuckoos with those of the Birds among
which they were respectively deposited. On the
opposite (east) side of the staircase the visitor will
find a case showing the remarkable variation in
colouring and markings displayed by the eggs of
the Guillemot.
Bay IV. The fourth bay on the west side of the hall
General exhibits the leading peculiarities in the structure of
structure of
Reptiles and
Reptiles and Amphibians. Owing to the large
Amphibians. number of groups in the former class now extinct,
many fossil specimens, or plaster reproductions of
the same, are shown. The wall-case on the south
side of this bay illustrates the different ordinal
groups of Reptiles—living and extinct. Very
instructive are the skeletons of Tortoises and
Turtles, showing the relations of the vertebræ and
limb-bones to the bony part of the shell. Lizards
and Snakes are mostly represented by coloured
casts. The extinct Dinosaurs are represented by a
small-sized model of Iguanodon, together with a
photograph of the skeleton and a plaster-cast of the
bones of the hind-foot showing the three toes.
The adjacent side of the table-case shows the
modifications of the backbone, or vertebral column,
of the ribs, and of the limbs, in the different groups
of the class. Specially noticeable are examples of
five types of Skink-like Lizards, exhibiting the
gradual diminution in the size of the limbs and their
final disappearance.
The opposite, or north, side of the table-case
displays the different modifications of the skull and
teeth of living and extinct Reptiles. In some, like
Crocodiles and Ichthyosaurs, the jaws are armed
with a full series of sharply pointed teeth, while in
others, like the Tortoises and Turtles, they are
devoid of teeth and encased in horn. Very
remarkable is the approximation to a carnivorous
mammalian type presented by the dentition of
some of the extinct mammal-like Reptiles, or
Theromorphs, and equally noticeable are the palatal
crushing teeth of certain other extinct Reptiles
known as Placodus and Cyamodus. The peculiar
dentition of the New Zealand Tuatera, and likewise
that of its extinct European and Indian ally
Hyperodapedon (fig. 9), are also shown.
WEST WING.
The whole of the west wing of the building is
devoted to the collections of recent Zoology.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookluna.com