Figure 1.2 database
Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.
What is the difference between controlled and uncontrolled redundancy? Illustrate with examples.
Specify all the relationships among the records of the database shown in Figure 1.2.
Give some additional views that may be needed by other user groups for the database shown in Figure 1.2.
Cite some examples of integrity constraints that you think can apply to the database shown in Figure 1.2.
Give examples of systems in which it may make sense to use traditional file processing instead of a database approach.