Summary
In this chapter, we referred to the different forms of constraints that we recapitulated from the previous chapter, but in a little more depth. We learned how these constraints help in maintaining data integrity. Later, we learned about the different forms of data integrity.
We then moved on and looked at the concept of data normalization and looked at the first three normal forms, namely the first, second, and third, using data from a fictitious enterprise setup we created. As an exercise, create your own database using the steps from the previous chapters and create the tables that were mentioned in the first section of this chapter.
Run the queries that you saw here and find out about the different ways in which you can normalize this data. If you are inclined to, go ahead and learn about the more advanced forms of normalization to build on the knowledge you've gained from this chapter. In the next chapter, we will look at querying normalized data.