Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure P1.9. (The file is meant to be used as a teacher class assignment schedule. One of the many problems with data redundancy is the likely occurrence of data inconsistencies—two different initials have been entered for the teacher named Maria Cordoza.)

Question

Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure P1.9. (The file is meant to be used as a teacher class assignment schedule. One of the many problems with data redundancy is the likely occurrence of data inconsistencies—two different initials have been entered for the teacher named Maria Cordoza.)

 

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Science

Databases

Related Computer Science Q&A

Find answers to questions asked by students like you.

Q: Why the input lines of the Mux do not appear in the truth table with its logic values?

A: Hey there, I am authorised to answer any one question at a time when there are multiple questions an...

Q: please do it in java

A: Introduction of the Program: The java program builds a calculator that calculates the basic operatio...

Q: Draw an example graph for each of these.(a) A planar graph has 5 vertices and 3 faces. How many edge...

A: Answer a) For any (connected) planar graph with v vertices, e edges and f faces, we have v-e+f=2 her...

Q: Describe about the growing use and trend of biometric technology.

A: Solution : With the pace of rapid innovation in today’s biometric technology field, new uses are app...

Q: int main{void main} { int myArray[100],numint,result; printf("How many numbers to be entered?"); sca...

A: Function prototype in C Function prototype means declaring a function before using it in a program b...

Q: What are the authorization, authentication, roles and mitigation strategies used to control access i...

A: Authorization Strategies used to control access in small, medium, and large hospitals are: 1) Author...

Q: I have a programming question here

A: Read a,b,c Declare a variable called sum and initialize to 0 average=(a+b+c)/3 print average

Q: Hash Search Design a hash table which the phone number is the key word and can be used to do search....

A: Code in C : #include <stdio.h>#include<stdlib.h>#include<string.h>#include<math...

Q: Answer this question, part (1), (2) & (3). Design a three-bit even-up counter using three JK fli...

A: Logic diagram of a 3-bit binary counter. (a) A counter is first described by a state diagram, which...