answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
1 year ago
7

14.28. Consider the relation R, which has attributes that hold schedules of courses and sections at a university; R = {Course_no

, Sec_no, Offering_dept, Credit_hours, Course_level, Instructor_ssn, Semester, Year, Days_hours, Room_no, No_of_students}. Suppose that the following functional dependencies hold on R: {Course_no} → {Offering_dept, Credit_hours, Course_level} {Course_no, Sec_no, Semester, Year} → {Days_hours, Room_no, No_of_students, Instructor_ssn} {Room_no, Days_hours, Semester, Year} → {Instructor_ssn, Course_no, Sec_no} Try to determine which sets of attributes form keys of R. How would you normalize this relation?
Computers and Technology
1 answer:
AlexFokin [52]1 year ago
7 0

Answer:

Check the explanation

Explanation:

Let us first of all make use the following shorthand notation:

C = the CourseNo,

SN = the SecNo,

OD = the OfferingDept,

CH = the CreditHours,

CL = for CourseLevel,

I = InstructorSSN,

S = Semester,

Y = Year,

D = the Days_Hours,

RM = RoomNo,

NS = NoOfStudents

Hence R = {C, SN, OD, CH, CL, I, S, Y, D, RM, NS}, and the following functional reliance holds –

Now {C} ―  {OD, CH, CL}

Then {C, SN, S, Y} ―  {D, RM, NS, I}

{RM, D, S, Y} ―  {I, C, SN}

Now let’s compute the closure for every left hand part of a functional dependency, given that these sets of attributable elements are the candidates to be keys:

{C}+ equals to {C, OD, CH, CL}

Since {C, SN, S, Y} ―  {D, RM, NS, I}, and

{C}+ = {C, OD, CH, CL} we get:

{C, SN, S, Y}+ equals to {C, SN, S, Y, D, RM, NS, I, OD, CH, CL} = R

Since {RM, D, S, Y} ―  {I, C, SN}, we all know that {RM, S, D, Y}+ contains {RM, D, S, Y, I, C, SN}.

But {C}+ contains {OD, CH, CL}, so these are also controlled in {RM, D, S, Y}+ since C is already there.

{RM, D, S, Y}+ equals to {RM, D, S, Y, I, C, SN, OD, CH, CL, NS} = R

Hence, both K1 = {C, SN, S, Y} and

K2 = {RM, D, S, Y}

When applying the universal explanation of 2NF,

We will discover that the practical dependency {C}―  {OD, CH, CL} is an incomplete dependency for K1 (since C is included in K1).

Hence, R is normalized into R1 and R2as follows:

R1 = {C, OD, CH, CL}

R2 = {RM, D, S, Y, I, C, SN, NS} with candidate keys K1 and K2.

given that neither R1 nor R2 have transitive dependencies on any of the candidate keys,

R1 and R2 are in 3NF form also.

In addition to this, they also satisfy and gratify the BCNF form.

You might be interested in
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
1 year ago
Write a second constructor as indicated. Sample output: User1: Minutes: 0, Messages: 0 User2: Minutes: 1000, Messages: 5000
Mashcka [7]

Complete Question:

Write a second constructor as indicated. Sample output:User1: Minutes: 0, Messages: 0User2: Minutes: 1000, Messages: 5000// ===== Code from file PhonePlan.java =====public class PhonePlan { private int freeMinutes; private int freeMessages; public PhonePlan() { freeMinutes = 0; freeMessages = 0; } // FIXME: Create a second constructor with numMinutes and numMessages parameters. /* Your solution goes here */ public void print() { System.out.println("Minutes: " + freeMinutes + ", Messages: " + freeMessages); return; }}

Answer:

The second constructor is given as:

//This defines the constructor, the name has to be the same as the class //name

PhonePlan(int numOfMinutes, int numberOfMessages) {

this.freeMinutes = numOfMinutes;

this.freeMessages = numberOfMessages

}

Explanation:

The second constructor is defined using java programming language.

  1. The given class has two constructors This is called "Constructor Overloading) which implements polymophism
  2. In the second constructor that we created, we pass in two arguments of type integer numOfMinutes and numberOfMessages.
  3. In the constructor's body we assign these values to the initially declared variables freeMinutes and freeMessages
6 0
1 year ago
Choose the response that best completes the following statement.
lisabon 2012 [21]
I am guessing. My guess is code.
7 0
1 year ago
Read 2 more answers
Wesley has to create a web banner to announce a “Back to School” sale by an online retailer. Which information should he determi
olganol [36]
I would say A :)))))))
4 0
2 years ago
Read 2 more answers
Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
marysya [2.9K]

The Wrap Text menu.

The positioning of text in Word is sometimes not lined up with the inserted picture. By default, when you insert an image or a picture, its layout is set to inline with text. To change that, double click on the picture and then click the Wrap Text option. A number of options will pop up with text graphics.


7 0
2 years ago
Read 2 more answers
Other questions:
  • In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
    7·1 answer
  • Which of the following best describes the concept behind Web 2.0
    5·1 answer
  • The final step of the DHCP Discovery process is known as ______.
    5·1 answer
  • An mp3 takes up about 16 kilobytes of memory per second of music. if you owned a one terabyte hard drive and filled it with only
    15·1 answer
  • Dr. Robbins wants to know if there are different opinions regarding the value of public school education between Native American
    11·1 answer
  • 1. Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in
    7·1 answer
  • Cloud storage refers to the storage of data on ______.a. your mobile device.b. your desktop computer.c. an external drive.d. a s
    7·1 answer
  • A colleague sent you an awesome article about using proper ergonomics while sitting at the computer. You don't have time to read
    11·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
  • Which business case is better solved by Artificial Intelligence (AI) than conventional programming
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!