Sabtu, 12 Juli 2008
Pengenalan Registry
Windows merupakan sistem operasi untuk PC yang paling populer saat ini, mulai dari Windows 95, 98, NT dan yang baru saja diluncurkan yaitu Windows 2000 dan Windows Millenium. Salah satu keunggulan Windows adalah kemudahan dalam penggunaannya. Misalnya kemudahan mulai dari install, konfigurasi sampai dengan adanya feature plug and play untuk hardware.

Tentunya semua konfigurasi dan setting tersebut disimpan dalam sistem operasi, dan untuk menyimpan informasi berbagai setting dan konfigurasi, Windows menggunakan registry. Registry merupakan database yang digunakan untuk menyimpan semua setting dan informasi hardware, software dan berbagai preferences untuk Windows 32 bit, termasuk Window 95, 98, NT, Millenium dan 2000. Salah satu contohnya adalah misalnya seseorang mengganti assosiasi file atau menginstall program, maka perubahan setting tersebut akan dituliskan pada registry. Contoh lainnya adalah mendisable Display Properties, menyembunyikan berbagai menu pada Menu Start.
Selain sebagai tempat untuk menyimpan informasi sistem operasi Windows sendiri, registry juga digunakan sebagai tempat untuk menyimpan berbagai informasi setting dan konfigurasi pada aplikasi atau program. Misalnya WinZip menggunakan registry untuk menyimpan informasi toolbar, aplikasi untuk membuka file (viewer), user name, serial number, dan lain-lain.

Registry diletakkan pada dua buah hidden file yaitu user.dat dan system.dat yang terletak pada directory Windows untuk Win 95/98/Me dan pada directory Windows/System32/Config untuk Windows NT. Selain menggunakan registry (system.dat dan user.dat), Windows juga menyimpan informasi setting tertentu pada file msdos.sys, system.ini dan win.ini.
source:klikkanan

Tentunya semua konfigurasi dan setting tersebut disimpan dalam sistem operasi, dan untuk menyimpan informasi berbagai setting dan konfigurasi, Windows menggunakan registry. Registry merupakan database yang digunakan untuk menyimpan semua setting dan informasi hardware, software dan berbagai preferences untuk Windows 32 bit, termasuk Window 95, 98, NT, Millenium dan 2000. Salah satu contohnya adalah misalnya seseorang mengganti assosiasi file atau menginstall program, maka perubahan setting tersebut akan dituliskan pada registry. Contoh lainnya adalah mendisable Display Properties, menyembunyikan berbagai menu pada Menu Start.
Selain sebagai tempat untuk menyimpan informasi sistem operasi Windows sendiri, registry juga digunakan sebagai tempat untuk menyimpan berbagai informasi setting dan konfigurasi pada aplikasi atau program. Misalnya WinZip menggunakan registry untuk menyimpan informasi toolbar, aplikasi untuk membuka file (viewer), user name, serial number, dan lain-lain.

Registry diletakkan pada dua buah hidden file yaitu user.dat dan system.dat yang terletak pada directory Windows untuk Win 95/98/Me dan pada directory Windows/System32/Config untuk Windows NT. Selain menggunakan registry (system.dat dan user.dat), Windows juga menyimpan informasi setting tertentu pada file msdos.sys, system.ini dan win.ini.
source:klikkanan
Jumat, 11 Juli 2008
Javascript And HTML Tricks
Here are some of my favorite JavaScript and HTML tricks. There are a wide variety of options: from storing and using hidden data to making HTML forms and lists look great. Each topic has a brief introduction showing you how it will improve your Web site. Then I'll go into each technique in detail.
* Embedding data in hidden HTML elements and retrieving text lines in a platform-independent fashion
* Randomizing data with JavaScript
* Using a stylish form fieldset
* Making clickable descriptions for checkboxes and radio buttons by using labels
* Using CSS list-style-image to make beautiful bulleted lists
Introduction
The last time we discussed How to Use a JavaScript Query String Parser. Now we will discuss five more valuable JavaScript and HTML techniques and tricks.
Many times I've stored data in hidden HTML elements for scripts. It's a great way to keep prices and product names handy for e-commerce, or for lists of data that will be formatted by a script. To do that, it's necessary to interpret the lines of data in an operating-system independent way. I've even used this technique to store the radio programming information for a weekly radio schedule. Data stored this way can be graceful at degrading for older browsers. As an example, the radio schedule I mentioned was typed as preformatted text visible to older browsers, but transformed into a dynamically navigable Web page by JavaScript.
Another thing that comes up frequently is randomizing data that is used by a JavaScript program. Random links, images, statisics research and mathematical analysis come to mind as immediate applications.
My Web programming has never been the same since I learned how to use fieldsets to make beautiful forms in Web pages. Best of all, there's no bandwidth intensive imagery to use - it's built into the HTML!
While on the topic of forms, usability and efficiency increase in importance when check boxes and radio buttons are provided with clickable descriptions. Many people expect to click the descriptions, anyway, from experience with other programs. It would be sad to disappoint them, especially when HTML provides an excellent and natural way of doing it.
As a Grand Finale, you'll learn about one of the classic tricks of stylesheets. Using deluxe bullets for your lists will make your Web site more professional and appealing.
Getting Data From Text Lines in Hidden HTML Elements
Data for a script program can be embedded efficiently directly into the HTML source code, either in a hidden input field or a hidden HTML element. A script which reads this data has to perform a small number of steps.
* Hide the data contents of the hidden field in the HTML document
* Refer to the data using the document object model
* Normalize the line breaks for cross-platform compatibility
* Separate the lines into an array using a simple JavaScript function
* Trim white space and remove empty lines or comments if desired

Webmasters click here
are unstable, and might not result in all data being truly randomized. In a sense, one could say that the sorting algorithm divides up the data too fast for the randomizing to occur. A truly random shuffling has the property that each element has the same probability of being assigned to each location, or equivalently, each permutation of objects is equally likely. As far as I know, Safari is the only browser which may have an unstable sorting algorithm, resulting in the domain uuuuu.us being sorted to the last position most of the time, although other domains appear to be randomly placed. Unstable sorting algorithms may be fine, depending on the application.
There are also iterative methods for sorting. Iterative sorting methods are useful because the computational cost of one iteration is O(N) rather than O(n log N). A precise estimate is typically from N/2 to 2N. The data is not completely sorted after one iteration, but that's fine when the data ranking is based on subjective criteria such as clicking popularity or Google PageRank. Usually a good iterative sorting method guarantees that at least the lowest and highest ranked items are sorted to the correct positions.
Source:Internet.Com
* Embedding data in hidden HTML elements and retrieving text lines in a platform-independent fashion
* Randomizing data with JavaScript
* Using a stylish form fieldset
* Making clickable descriptions for checkboxes and radio buttons by using labels
* Using CSS list-style-image to make beautiful bulleted lists
Introduction
The last time we discussed How to Use a JavaScript Query String Parser. Now we will discuss five more valuable JavaScript and HTML techniques and tricks.
Many times I've stored data in hidden HTML elements for scripts. It's a great way to keep prices and product names handy for e-commerce, or for lists of data that will be formatted by a script. To do that, it's necessary to interpret the lines of data in an operating-system independent way. I've even used this technique to store the radio programming information for a weekly radio schedule. Data stored this way can be graceful at degrading for older browsers. As an example, the radio schedule I mentioned was typed as preformatted text visible to older browsers, but transformed into a dynamically navigable Web page by JavaScript.
Another thing that comes up frequently is randomizing data that is used by a JavaScript program. Random links, images, statisics research and mathematical analysis come to mind as immediate applications.
My Web programming has never been the same since I learned how to use fieldsets to make beautiful forms in Web pages. Best of all, there's no bandwidth intensive imagery to use - it's built into the HTML!
While on the topic of forms, usability and efficiency increase in importance when check boxes and radio buttons are provided with clickable descriptions. Many people expect to click the descriptions, anyway, from experience with other programs. It would be sad to disappoint them, especially when HTML provides an excellent and natural way of doing it.
As a Grand Finale, you'll learn about one of the classic tricks of stylesheets. Using deluxe bullets for your lists will make your Web site more professional and appealing.
Getting Data From Text Lines in Hidden HTML Elements
Data for a script program can be embedded efficiently directly into the HTML source code, either in a hidden input field or a hidden HTML element. A script which reads this data has to perform a small number of steps.
* Hide the data contents of the hidden field in the HTML document
* Refer to the data using the document object model
* Normalize the line breaks for cross-platform compatibility
* Separate the lines into an array using a simple JavaScript function
* Trim white space and remove empty lines or comments if desired
Webmasters click here
are unstable, and might not result in all data being truly randomized. In a sense, one could say that the sorting algorithm divides up the data too fast for the randomizing to occur. A truly random shuffling has the property that each element has the same probability of being assigned to each location, or equivalently, each permutation of objects is equally likely. As far as I know, Safari is the only browser which may have an unstable sorting algorithm, resulting in the domain uuuuu.us being sorted to the last position most of the time, although other domains appear to be randomly placed. Unstable sorting algorithms may be fine, depending on the application.
There are also iterative methods for sorting. Iterative sorting methods are useful because the computational cost of one iteration is O(N) rather than O(n log N). A precise estimate is typically from N/2 to 2N. The data is not completely sorted after one iteration, but that's fine when the data ranking is based on subjective criteria such as clicking popularity or Google PageRank. Usually a good iterative sorting method guarantees that at least the lowest and highest ranked items are sorted to the correct positions.
Source:Internet.Com
Baca Email sendiri dibayar dengan Dolar
Pertama, Anda harus punya minimal satu account email!
Anda butuh minimal satu email tapi kami sarankan punya 3 email: satu untuk ke teman dan keluarga, satu lagi untuk kontak bisnis satunya lagi untuk menerima newsletter yang kadang campur spam. Silakan daftar mau produk lokal maupun luar tidak ada larangan, cuma saya perlu diingat yang lokal punya keterbatasan ruang, tidak seperti Yahoo ataupun GMail yang berkapasitas lebih dari 1 GB.
Yang kedua, Ikutan program baca email dapat duit!
Begitu sudah punya email, manfaatkan email ini dimana tiap baca email dapat duit. Sebagai contoh, jika anda bergabung dengan E-mailPayU anda akan dibayar setiap 1(satu) email yang dibaca dengan $0,02. Anggap $1 amerika seharga Rp.9000 maka anda akan memperoleh Rp 180 rupiah per email. Lalu dalam sehari anda memperoleh 3 email maka akan diperoleh Rp 540 perhari. Dalam sebulan anda akan memperoleh 540x30=Rp.16.200,-. Ingat email tersebut harus dibaca dan anda diwajibkan mengunjungi link yang tertera di bagian bawah email untuk memperoleh kredit. Jadi bukan asal menerima email saja, sehingga kita tidak mungkin membaca emailnya secara offline. Waduh!!! Kalau bacanya diwarnet atau pake dial-up tekor dong??????? Itu kalau anda sendirian yang membacanya, tapi kalau anda sudah mempunyai downline, tiap email yang dibaca oleh downline anda akan meningkatkan jumlah kredit poin anda. Setiap email yang dibaca oleh tiap downline anda hingga ke level 2, anda akan memperoleh $0.01. Bayangkan jika minimal anda sudah mempunyai downline langsung sebanyak 10 orang dan tiap orang membaca 3 email, maka dalam sehari anda tanpa mengeluarkan biaya tambahan sudah memperoleh 10x270= Rp 2700. Ingat TANPA MENGELUARKAN BIAYA APAPUN.
Kok bisa? Karena yang mengeluarkan biaya untuk berinternet untuk baca email adalah downline anda bukan anda. Itulah yang disebut pasif income. Artinya pendapatan tambahan yang datang tanpa anda harus berusaha.
Jadi dalam sebulan dapat berapa? Tinggal kalikan saja Rp 2700x30hari= Rp 81.000,- . Sekarang kalau masing-masing downline anda sudah mempunyai 10 downline lagi berarti anda mempunyai 10+10x10=110. Maka dalam sebulan anda mendapatkan 110x270x30= Rp891.000,-. Itu kalau downline anda sebanyak 110 orang lalu bagaimana kalau lebih dari 1000 orang? Tinggal hitung sendiri hasilnya. Mungkinkah? MUNGKIN SEKALI sebab E-mailPayU adalah program yang berbasis internasional, sehingga jika anda ingin punya downline dari luar negeri website anda harus berbahasa inggris. Selain itu bisa ikut Paid-2-Click yaitu dibayar $0.005 setiap mengklik iklan yang ditayangkannya setiap hari.
Tips: Anda yang tidak mempunyai internet gratis, dapat membacanya seminggu sekali. Lalu untuk menghemat waktu, saat membuka email pertama, untuk mendapatkan kreditnya, klik kanan di link yang ditunjuk lalu pilih Open Link in New Window ataupun Open Link in New Tab. Lalu hapus email tersebut dan buka email kedua, sementara itu biarkan browser membuka link tadi. Setelah link tadi terbuka dan anda setelah mendapat pesan bahwa anda sudah dapat poin kredit, tutup jendela browser yang membuka link tadi, lanjutkan membaca email kedua. Atau jika saat membuka link kedua lama sekali, anda dapat membaca email kedua jika memang email kedua sudah terbuka. Demikian seterusnya.
Untuk memperoleh poin tambahan, anda dapat mengunjungi E-mailPayU, lalu klik gambar uanglogam berkaki (paidtoclick), dan isi dibawahnya dengan username anda, lalu anda akan membuka situs pemasang iklannya, setelah halaman terbuka maka klik di tulisan diatas berupa "Click here to click another banner", lalu klik lagi di gambar kedua dst sampai gambar ke 7.
Mau ikutan sekarang, udah GRATIS + bonus $10 lagi ,
Klik Disini
Anda butuh minimal satu email tapi kami sarankan punya 3 email: satu untuk ke teman dan keluarga, satu lagi untuk kontak bisnis satunya lagi untuk menerima newsletter yang kadang campur spam. Silakan daftar mau produk lokal maupun luar tidak ada larangan, cuma saya perlu diingat yang lokal punya keterbatasan ruang, tidak seperti Yahoo ataupun GMail yang berkapasitas lebih dari 1 GB.
Yang kedua, Ikutan program baca email dapat duit!
Begitu sudah punya email, manfaatkan email ini dimana tiap baca email dapat duit. Sebagai contoh, jika anda bergabung dengan E-mailPayU anda akan dibayar setiap 1(satu) email yang dibaca dengan $0,02. Anggap $1 amerika seharga Rp.9000 maka anda akan memperoleh Rp 180 rupiah per email. Lalu dalam sehari anda memperoleh 3 email maka akan diperoleh Rp 540 perhari. Dalam sebulan anda akan memperoleh 540x30=Rp.16.200,-. Ingat email tersebut harus dibaca dan anda diwajibkan mengunjungi link yang tertera di bagian bawah email untuk memperoleh kredit. Jadi bukan asal menerima email saja, sehingga kita tidak mungkin membaca emailnya secara offline. Waduh!!! Kalau bacanya diwarnet atau pake dial-up tekor dong??????? Itu kalau anda sendirian yang membacanya, tapi kalau anda sudah mempunyai downline, tiap email yang dibaca oleh downline anda akan meningkatkan jumlah kredit poin anda. Setiap email yang dibaca oleh tiap downline anda hingga ke level 2, anda akan memperoleh $0.01. Bayangkan jika minimal anda sudah mempunyai downline langsung sebanyak 10 orang dan tiap orang membaca 3 email, maka dalam sehari anda tanpa mengeluarkan biaya tambahan sudah memperoleh 10x270= Rp 2700. Ingat TANPA MENGELUARKAN BIAYA APAPUN.
Kok bisa? Karena yang mengeluarkan biaya untuk berinternet untuk baca email adalah downline anda bukan anda. Itulah yang disebut pasif income. Artinya pendapatan tambahan yang datang tanpa anda harus berusaha.
Jadi dalam sebulan dapat berapa? Tinggal kalikan saja Rp 2700x30hari= Rp 81.000,- . Sekarang kalau masing-masing downline anda sudah mempunyai 10 downline lagi berarti anda mempunyai 10+10x10=110. Maka dalam sebulan anda mendapatkan 110x270x30= Rp891.000,-. Itu kalau downline anda sebanyak 110 orang lalu bagaimana kalau lebih dari 1000 orang? Tinggal hitung sendiri hasilnya. Mungkinkah? MUNGKIN SEKALI sebab E-mailPayU adalah program yang berbasis internasional, sehingga jika anda ingin punya downline dari luar negeri website anda harus berbahasa inggris. Selain itu bisa ikut Paid-2-Click yaitu dibayar $0.005 setiap mengklik iklan yang ditayangkannya setiap hari.
Tips: Anda yang tidak mempunyai internet gratis, dapat membacanya seminggu sekali. Lalu untuk menghemat waktu, saat membuka email pertama, untuk mendapatkan kreditnya, klik kanan di link yang ditunjuk lalu pilih Open Link in New Window ataupun Open Link in New Tab. Lalu hapus email tersebut dan buka email kedua, sementara itu biarkan browser membuka link tadi. Setelah link tadi terbuka dan anda setelah mendapat pesan bahwa anda sudah dapat poin kredit, tutup jendela browser yang membuka link tadi, lanjutkan membaca email kedua. Atau jika saat membuka link kedua lama sekali, anda dapat membaca email kedua jika memang email kedua sudah terbuka. Demikian seterusnya.
Untuk memperoleh poin tambahan, anda dapat mengunjungi E-mailPayU, lalu klik gambar uanglogam berkaki (paidtoclick), dan isi dibawahnya dengan username anda, lalu anda akan membuka situs pemasang iklannya, setelah halaman terbuka maka klik di tulisan diatas berupa "Click here to click another banner", lalu klik lagi di gambar kedua dst sampai gambar ke 7.
Mau ikutan sekarang, udah GRATIS + bonus $10 lagi ,
Klik Disini
Kamis, 10 Juli 2008
7 Tips to Keep Windows XP Running (For Years...)
f all goes as anticipated (and it never does), Windows 7 will arrive in 2010. Therefore, if you’ve done the math that means Windows XP, originally released in 2001, will be nine years old. A nine-year-old operating system is human equivalent of a centenarian.
As we know this is no easy feat it calls for some serious life extension techniques.
I think this is a fitting analogy actually, since running Windows XP for another 1-2 years is a very real possibility for some. After all, many who despised Vista will likely not only wait for Windows 7 to release. They will most likely wait for the first service pack to arrive before making a change. That would put us possibly into 2011.
So if you want to see Windows XP make it to the ripe old age of ten, you should likewise take steps to keep it in good health.
* Email Article
* Print Article
*
Share Articles
o Digg
o del.icio.us
o Newsvine
1) Run Windows Updates
As an IT Director, I cannot recall how many times I had someone bring me a PC with XP installed on it from home and tell me it does not work right. Nine times out of ten, the Windows updates were not done.
In a few cases, they had not even installed SP2. When XP was released, many of the technologies we have available today were in their infancy or non-existent. Keeping Windows updated will help keep you running well.
2) Add Memory and Move Data Online or to an External Drive
It is no secret Windows runs better with more memory, so maximize XP by adding RAM.
Another essential fact: Windows runs better if you have at least 20 percent disk space available. With the advent of downloadable Music and Movies (legally of course), you need to beware. Both RAM and storage are cheap these days so why not invest in some to keep your system in an optimal state. At a mere 38 years old (in human years) I wish I could just simply add some extra memory or possibly off-load some things to external memory. Perhaps they will have that available by 2010 as well…
3) Run System & Driver Updates
Another area that even many IT people are guilty of, is not updating the system itself. BIOS updates and driver updates go a long way to help keep things running smoothly.
It is important to remember, though, with driver updates, never run the “beta driver.” It is also a good idea to backup your system, in case the driver causes something to stop working.
Now it bears saying that if it’s not broke, don’t fix it, likewise you may be living with some issues. If you fit this description you need to decide if you’re happy with the issue from the driver. In that case perhaps you can live with it for a while longer.
4) Do Not Keep Up with the Joneses
The latest and greatest is always the smartest and efficient. Many of the software packages created today are built for the Vista platform or beyond. New software is always coded new systems and vice-versa.
So you need to decide if the latest version of Office or the newest Adobe Acrobat release is really necessary. If you can live without it (and be honest with yourself) than run the older version. Both you and XP will be happier.
As we know this is no easy feat it calls for some serious life extension techniques.
I think this is a fitting analogy actually, since running Windows XP for another 1-2 years is a very real possibility for some. After all, many who despised Vista will likely not only wait for Windows 7 to release. They will most likely wait for the first service pack to arrive before making a change. That would put us possibly into 2011.
So if you want to see Windows XP make it to the ripe old age of ten, you should likewise take steps to keep it in good health.
* Email Article
* Print Article
*
Share Articles
o Digg
o del.icio.us
o Newsvine
1) Run Windows Updates
As an IT Director, I cannot recall how many times I had someone bring me a PC with XP installed on it from home and tell me it does not work right. Nine times out of ten, the Windows updates were not done.
In a few cases, they had not even installed SP2. When XP was released, many of the technologies we have available today were in their infancy or non-existent. Keeping Windows updated will help keep you running well.
2) Add Memory and Move Data Online or to an External Drive
It is no secret Windows runs better with more memory, so maximize XP by adding RAM.
Another essential fact: Windows runs better if you have at least 20 percent disk space available. With the advent of downloadable Music and Movies (legally of course), you need to beware. Both RAM and storage are cheap these days so why not invest in some to keep your system in an optimal state. At a mere 38 years old (in human years) I wish I could just simply add some extra memory or possibly off-load some things to external memory. Perhaps they will have that available by 2010 as well…
3) Run System & Driver Updates
Another area that even many IT people are guilty of, is not updating the system itself. BIOS updates and driver updates go a long way to help keep things running smoothly.
It is important to remember, though, with driver updates, never run the “beta driver.” It is also a good idea to backup your system, in case the driver causes something to stop working.
Now it bears saying that if it’s not broke, don’t fix it, likewise you may be living with some issues. If you fit this description you need to decide if you’re happy with the issue from the driver. In that case perhaps you can live with it for a while longer.
4) Do Not Keep Up with the Joneses
The latest and greatest is always the smartest and efficient. Many of the software packages created today are built for the Vista platform or beyond. New software is always coded new systems and vice-versa.
So you need to decide if the latest version of Office or the newest Adobe Acrobat release is really necessary. If you can live without it (and be honest with yourself) than run the older version. Both you and XP will be happier.
Rabu, 09 Juli 2008
Database Normalization Basics
If you've been working with databases for a while, chances are you've heard the term normalization. Perhaps someone's asked you "Is that database normalized?" or "Is that in BCNF?" All too often, the reply is "Uh, yeah." Normalization is often brushed aside as a luxury that only academics have time for. However, knowing the principles of normalization and applying them to your daily database design tasks really isn't all that complicated and it could drastically improve the performance of your DBMS.

In this article, we'll introduce the concept of normalization and take a brief look at the most common normal forms. Future articles will provide in-depth explorations of the normalization process.
What is Normalization?
Normalization is the process of efficiently organizing data in a database. There are two goals of the normalization process: eliminating redundant data (for example, storing the same data in more than one table) and ensuring data dependencies make sense (only storing related data in a table). Both of these are worthy goals as they reduce the amount of space a database consumes and ensure that data is logically stored.
The Normal Forms
The database community has developed a series of guidelines for ensuring that databases are normalized. These are referred to as normal forms and are numbered from one (the lowest form of normalization, referred to as first normal form or 1NF) through five (fifth normal form or 5NF). In practical applications, you'll often see 1NF, 2NF, and 3NF along with the occasional 4NF. Fifth normal form is very rarely seen and won't be discussed in this article.
Before we begin our discussion of the normal forms, it's important to point out that they are guidelines and guidelines only. Occasionally, it becomes necessary to stray from them to meet practical business requirements. However, when variations take place, it's extremely important to evaluate any possible ramifications they could have on your system and account for possible inconsistencies. That said, let's explore the normal forms.
First Normal Form (1NF)
First normal form (1NF) sets the very basic rules for an organized database:
* Eliminate duplicative columns from the same table.
* Create separate tables for each group of related data and identify each row with a unique column or set of columns (the primary key).
Second Normal Form (2NF)
Second normal form (2NF) further addresses the concept of removing duplicative data:
* Meet all the requirements of the first normal form.
* Remove subsets of data that apply to multiple rows of a table and place them in separate tables.
* Create relationships between these new tables and their predecessors through the use of foreign keys.
Third Normal Form (3NF)
Third normal form (3NF) goes one large step further:
* Meet all the requirements of the second normal form.
* Remove columns that are not dependent upon the primary key.
Fourth Normal Form (4NF)
Finally, fourth normal form (4NF) has one additional requirement:
* Meet all the requirements of the third normal form.
* A relation is in 4NF if it has no multi-valued dependencies.
Remember, these normalization guidelines are cumulative. For a database to be in 2NF, it must first fulfill all the criteria of a 1NF database.
If you'd like to ensure your database is normalized, explore our other articles in this series:
* Database Normalization Basics
* Putting your Database in First Normal Form
* Putting your Database in Second Normal Form
* Putting your Database in Third Normal Form
If you want to receive notifications of new database articles posted on this site, Subscribe to our newsletter
By Mike Chapple, About.com

In this article, we'll introduce the concept of normalization and take a brief look at the most common normal forms. Future articles will provide in-depth explorations of the normalization process.
What is Normalization?
Normalization is the process of efficiently organizing data in a database. There are two goals of the normalization process: eliminating redundant data (for example, storing the same data in more than one table) and ensuring data dependencies make sense (only storing related data in a table). Both of these are worthy goals as they reduce the amount of space a database consumes and ensure that data is logically stored.
The Normal Forms
The database community has developed a series of guidelines for ensuring that databases are normalized. These are referred to as normal forms and are numbered from one (the lowest form of normalization, referred to as first normal form or 1NF) through five (fifth normal form or 5NF). In practical applications, you'll often see 1NF, 2NF, and 3NF along with the occasional 4NF. Fifth normal form is very rarely seen and won't be discussed in this article.
Before we begin our discussion of the normal forms, it's important to point out that they are guidelines and guidelines only. Occasionally, it becomes necessary to stray from them to meet practical business requirements. However, when variations take place, it's extremely important to evaluate any possible ramifications they could have on your system and account for possible inconsistencies. That said, let's explore the normal forms.
First Normal Form (1NF)
First normal form (1NF) sets the very basic rules for an organized database:
* Eliminate duplicative columns from the same table.
* Create separate tables for each group of related data and identify each row with a unique column or set of columns (the primary key).
Second Normal Form (2NF)
Second normal form (2NF) further addresses the concept of removing duplicative data:
* Meet all the requirements of the first normal form.
* Remove subsets of data that apply to multiple rows of a table and place them in separate tables.
* Create relationships between these new tables and their predecessors through the use of foreign keys.
Third Normal Form (3NF)
Third normal form (3NF) goes one large step further:
* Meet all the requirements of the second normal form.
* Remove columns that are not dependent upon the primary key.
Fourth Normal Form (4NF)
Finally, fourth normal form (4NF) has one additional requirement:
* Meet all the requirements of the third normal form.
* A relation is in 4NF if it has no multi-valued dependencies.
Remember, these normalization guidelines are cumulative. For a database to be in 2NF, it must first fulfill all the criteria of a 1NF database.
If you'd like to ensure your database is normalized, explore our other articles in this series:
* Database Normalization Basics
* Putting your Database in First Normal Form
* Putting your Database in Second Normal Form
* Putting your Database in Third Normal Form
If you want to receive notifications of new database articles posted on this site, Subscribe to our newsletter
By Mike Chapple, About.com
Langganan:
Postingan
(
Atom
)