answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
2 years ago
7

14.28. Consider the relation R, which has attributes that hold schedules of courses and sections at a university; R = {Course_no

, Sec_no, Offering_dept, Credit_hours, Course_level, Instructor_ssn, Semester, Year, Days_hours, Room_no, No_of_students}. Suppose that the following functional dependencies hold on R: {Course_no} → {Offering_dept, Credit_hours, Course_level} {Course_no, Sec_no, Semester, Year} → {Days_hours, Room_no, No_of_students, Instructor_ssn} {Room_no, Days_hours, Semester, Year} → {Instructor_ssn, Course_no, Sec_no} Try to determine which sets of attributes form keys of R. How would you normalize this relation?
Computers and Technology
1 answer:
AlexFokin [52]2 years ago
7 0

Answer:

Check the explanation

Explanation:

Let us first of all make use the following shorthand notation:

C = the CourseNo,

SN = the SecNo,

OD = the OfferingDept,

CH = the CreditHours,

CL = for CourseLevel,

I = InstructorSSN,

S = Semester,

Y = Year,

D = the Days_Hours,

RM = RoomNo,

NS = NoOfStudents

Hence R = {C, SN, OD, CH, CL, I, S, Y, D, RM, NS}, and the following functional reliance holds –

Now {C} ―  {OD, CH, CL}

Then {C, SN, S, Y} ―  {D, RM, NS, I}

{RM, D, S, Y} ―  {I, C, SN}

Now let’s compute the closure for every left hand part of a functional dependency, given that these sets of attributable elements are the candidates to be keys:

{C}+ equals to {C, OD, CH, CL}

Since {C, SN, S, Y} ―  {D, RM, NS, I}, and

{C}+ = {C, OD, CH, CL} we get:

{C, SN, S, Y}+ equals to {C, SN, S, Y, D, RM, NS, I, OD, CH, CL} = R

Since {RM, D, S, Y} ―  {I, C, SN}, we all know that {RM, S, D, Y}+ contains {RM, D, S, Y, I, C, SN}.

But {C}+ contains {OD, CH, CL}, so these are also controlled in {RM, D, S, Y}+ since C is already there.

{RM, D, S, Y}+ equals to {RM, D, S, Y, I, C, SN, OD, CH, CL, NS} = R

Hence, both K1 = {C, SN, S, Y} and

K2 = {RM, D, S, Y}

When applying the universal explanation of 2NF,

We will discover that the practical dependency {C}―  {OD, CH, CL} is an incomplete dependency for K1 (since C is included in K1).

Hence, R is normalized into R1 and R2as follows:

R1 = {C, OD, CH, CL}

R2 = {RM, D, S, Y, I, C, SN, NS} with candidate keys K1 and K2.

given that neither R1 nor R2 have transitive dependencies on any of the candidate keys,

R1 and R2 are in 3NF form also.

In addition to this, they also satisfy and gratify the BCNF form.

You might be interested in
Choose the correct function to convert the user’s response to the number 3.5. >>> answer = input("How much does the sam
FromTheMoon [43]

Answer:

The answer to the given question is given bellow in the explanation section:

Explanation:

<p>This is python code</p>

<p>In python when you enter input into the input function as given:</p>

<code> answer = input("How much does the sample weigh in grams? ") </code>

I will be taken as string.

So I have to convert this string to number format here the given data is float value i-e 3.5

so let convert it. using float function.

<code> answer = float (input("How much does the sample weigh in grams? ") )  </code>

6 0
1 year ago
Read 2 more answers
In one to three sentences describe one reason you would import data into a datebase
Bond [772]

The primary reason that you would import data into a database is because the data already exists somewhere else.

As an example, you may have a spreadsheet that contains names and telephone numbers of a group of people. It is much faster to import this data into a database instead of manually entering the information.

8 0
2 years ago
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
1 year ago
What is a commonly publicized password sql injection string?
aleksley [76]
The strings "or 1=1" and ""or ''=''"  can be commonly used to trick an SQL WHERE clause into becoming true.

So if you specify <span>' or ''=' as a password, you can log in if the query string would be:

</span><span>select username,pass from users where username='you' and password='' or ''='<span>' limit 0,1;</span></span>
7 0
2 years ago
What three things in the third generation of computing helped get programming enthusiasts more involved with computers? Select 3
andrew11 [14]

Answer:

ipods, windows 10,intengrated circut

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • What is a ribbon in word
    15·2 answers
  • Graphical elements that precede each item in a list are known as​ __________.
    8·1 answer
  • Two technicians are discussing lung protection in the shop. Technician A says that respiratory-protection devices can prevent yo
    5·2 answers
  • Lucas put a lot of thought into the design for his company's new white paper. He made sure to include repeating design elements
    13·2 answers
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • An expression containing the operator &amp;&amp; is true either or both of its operands are true. True/False
    15·1 answer
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • A computer has 4 GB of RAM of which the operating system occupies 512 MB. The processes are all 256 MB (for simplicity) and have
    11·1 answer
  • Your friend Margo is considering what type of display to purchase with her new desktop computer and she asks you for advice. You
    14·1 answer
  • As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!