answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
2 years ago
7

14.28. Consider the relation R, which has attributes that hold schedules of courses and sections at a university; R = {Course_no

, Sec_no, Offering_dept, Credit_hours, Course_level, Instructor_ssn, Semester, Year, Days_hours, Room_no, No_of_students}. Suppose that the following functional dependencies hold on R: {Course_no} → {Offering_dept, Credit_hours, Course_level} {Course_no, Sec_no, Semester, Year} → {Days_hours, Room_no, No_of_students, Instructor_ssn} {Room_no, Days_hours, Semester, Year} → {Instructor_ssn, Course_no, Sec_no} Try to determine which sets of attributes form keys of R. How would you normalize this relation?
Computers and Technology
1 answer:
AlexFokin [52]2 years ago
7 0

Answer:

Check the explanation

Explanation:

Let us first of all make use the following shorthand notation:

C = the CourseNo,

SN = the SecNo,

OD = the OfferingDept,

CH = the CreditHours,

CL = for CourseLevel,

I = InstructorSSN,

S = Semester,

Y = Year,

D = the Days_Hours,

RM = RoomNo,

NS = NoOfStudents

Hence R = {C, SN, OD, CH, CL, I, S, Y, D, RM, NS}, and the following functional reliance holds –

Now {C} ―  {OD, CH, CL}

Then {C, SN, S, Y} ―  {D, RM, NS, I}

{RM, D, S, Y} ―  {I, C, SN}

Now let’s compute the closure for every left hand part of a functional dependency, given that these sets of attributable elements are the candidates to be keys:

{C}+ equals to {C, OD, CH, CL}

Since {C, SN, S, Y} ―  {D, RM, NS, I}, and

{C}+ = {C, OD, CH, CL} we get:

{C, SN, S, Y}+ equals to {C, SN, S, Y, D, RM, NS, I, OD, CH, CL} = R

Since {RM, D, S, Y} ―  {I, C, SN}, we all know that {RM, S, D, Y}+ contains {RM, D, S, Y, I, C, SN}.

But {C}+ contains {OD, CH, CL}, so these are also controlled in {RM, D, S, Y}+ since C is already there.

{RM, D, S, Y}+ equals to {RM, D, S, Y, I, C, SN, OD, CH, CL, NS} = R

Hence, both K1 = {C, SN, S, Y} and

K2 = {RM, D, S, Y}

When applying the universal explanation of 2NF,

We will discover that the practical dependency {C}―  {OD, CH, CL} is an incomplete dependency for K1 (since C is included in K1).

Hence, R is normalized into R1 and R2as follows:

R1 = {C, OD, CH, CL}

R2 = {RM, D, S, Y, I, C, SN, NS} with candidate keys K1 and K2.

given that neither R1 nor R2 have transitive dependencies on any of the candidate keys,

R1 and R2 are in 3NF form also.

In addition to this, they also satisfy and gratify the BCNF form.

You might be interested in
Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
Varvara68 [4.7K]

Answer:

Explanation:

Farmers are always both directly and indirectly connected to each other

Their network is mostly strong

Networks become weak only on the edges (ends) of the river but doesn't completely dimnish

With the available network length, the center of river bank forms the strongest network of all and becomes a key player in defining the balance property of overall network

The network is very well structurally balanced and we can see that through the below image

20 miles 10 20 30 40 50

See attachment file for diagram

Considering the total length of river as 50miles and and the center of the whole length will be at 25th mile. From that point, if we consider a farmer will be be having friends for a length of 20miles both along upstream and downstream.

By this he'll be in friend with people who are around 80% of the total population. As me move from this point the integrity increases and this results in a highly balanced structural network.

6 0
2 years ago
The term drive app is used to describe applications stored on a computer true or false
Volgvan
Hello <span>Areyano7475
</span>

Question: T<span>he term drive app is used to describe applications stored on a computer true or false


Answer: False


Hope this helps
-Chris</span>
7 0
2 years ago
Read 2 more answers
As an information user you should be skeptical of
Sati [7]
I should be skeptical of the credibility of sources that I have during the gathering. Be cautious and make sure that data comes of from trusted specialized sources. Trusted sources can be easily identified for their popularity on certain fields. Determine the purpose of the site and the data it contains.
5 0
2 years ago
Dr. Robbins wants to know if there are different opinions regarding the value of public school education between Native American
zmey [24]

Answer:

The independent variable is Native American participants

Explanation:

Why Native Americans is the independent variable is bacause the survey population is Native Americans and the result of the survey won't be affected by the gender and age of the native american participants. So it the independent variable.

5 0
2 years ago
If a user was complaining about a "slow computer" due to a program that uses a significant amount of memory, what part or parts
Sedaia [141]

Answer:

The Random-Access Memory (RAM) should be upgraded.

Explanation:

Since the particuar apllication is taking alot of memory space it means that an ugrade/ installation of a bigger RAM would help the system work better while using the program

6 0
1 year ago
Other questions:
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • Refer to the exhibit. pc1 issues an arp request because it needs to send a packet to pc3. in this scenario, what will happen nex
    9·1 answer
  • Which perspective is usually used in process simulations?
    6·1 answer
  • In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
    7·1 answer
  • Write a script that prints the multiples of 7 between 0 and 100. Print one multiple per line and avoid printing any numbers that
    14·1 answer
  • Write a function named max that accepts two integer values as arguments and returns the value that is the greater of the two. Fo
    12·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • Suppose two threads execute the following C code concurrently, accessing shared variables a, b, and c: Initialization int a = 4;
    15·1 answer
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    15·1 answer
  • The dealer's cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer's
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!