My database textbook states that "a data anomaly (update, insertion, deletion) develops when not all of the required changes in the redundant data are made successfully."
This does not make sense to me though, as I can easily make an example where a file is vulnerable to a deletion anomaly but does not contain redundant data.
1.4m articles
1.4m replys
5 comments
57.0k users