Identify some informal queries and update operations that you would expect
to apply to the database shown in Figure 1.2.
What is the difference between controlled and uncontrolled redundancy?
Illustrate with examples.
Specify all the relationships among the records of the database shown in
Figure 1.2.
Give some additional views that may be needed by other user groups for the
database shown in Figure 1.2.
Cite some examples of integrity constraints that you think can apply to the
database shown in Figure 1.2.
Give examples of systems in which it may make sense to use traditional file
processing instead of a database approach.