answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
2 years ago
14

Assume each student is assigned an advisor from a department. Each classroom is assigned a classroom (class# determines Classroo

m). (Student#, Class#) is the primary key to this relation. Is this relation in 2NF? Justify your answer and decompose if necessary. Assuming each advisor is assigned an office and each advisor belongs to a particular department. Then argue whether further normalization to 3NF is necessary, and if so, perform it.
Computers and Technology
1 answer:
Luden [163]2 years ago
3 0

Answer:

Check the explanation

Explanation:

As we know that any relation will be in 2NF if it satisfies following two conditions

1> It should be in 1NF.

2> It should not contain any partial dependency i.e. all the non-prime attributes should fully functionally dependent on the relation key(s).

In the given table,

The primary key is (Student#,class#).

And one of functional dependency is

Class# determines Classroom (Class# ------> Classroom)

This functional dependency is a partial functional dependency because in this dependency a proper subset(Class#) of a relation key(Student#,Class#)  functionally determines a non-prime attribute(Classroom).

Since this table contains a partial dependency therefore as per the definition of 2NF this table is not in 2NF.

Now we can decompose it into 2NF by splitting the table into the following two tables(R1 and R2).

R1(Student#, Class#, Advisor, Advisor-office, Department) and R2(Class#, Classroom)

R1 table is shown below.

Student# Class# Advisor Advisor-office Department

1011                    101-07 Jones           212    CSCI

1011                    201-02 Jones           212    CSCI

1011                    310-11 Jones           212     CSCI

2010           101-07 Anderson   308    MATH

2010          201-02 Anderson   308    MATH

2010          120-12 Anderson   308    MATH

R2 table is shown below

Class# Classroom

101-07 WIL230

201-02 OVR212

310-11 WIL224

120-12 WIL306

Now these tables(R1 and R2) are in 2NF.

Argument For 3NF

As we know that any relation will be in 3NF if it satisfies following two conditions

1> It should be in 2NF.

Student# Class# Advisor

1011                 101-07 Jones

1011                 201-02 Jones

1011                  310-11 Jones

2010         101-07 Anderson

2010         201-02 Anderson

2010         120-12 Anderson

R12 is shown below

Advisor Advisor-office

Jones          212

Anderson  308

R13 is shown below

Advisor Advisor-office

Jones         CSCI

Anderson MATH

So these four tables (R11, R12, R13, R2) correctly represent the third normal form of the given table.

2> It should not contain any transitive dependency i.e. all the non-prime attributes should be non-transitively dependent on the relation key(s).

Now from the question, we come to know that

1> Each advisor is assigned an office, which means that following functional dependency exists in table R1

Advisor determines Advisor-office (Advisor------> Advisor-office).

2>Each advisor belongs to a particular department, which means that following functional dependency also exists in table R1

Advisor determines Department (Advisor------> Department).

So we have following two dependencies in table R1

1>  Advisor determines Advisor-office (Advisor------> Advisor-office).

2> Advisor determines Department (Advisor------> Department).

Since we know that (Student#,Class#) is a primary key, so it should determine Advisor functionally i.e.

(Student#,Class#)----> Advisor

and from above two conditions we have

Advisor--->Advisor-office and Advisor----->Department

We can clearly see that Advisor---->Advisor-office and  Advisor----->Department are two transitive dependency because Advisor itself is functionally dependent on (Student#, Class#) .

So here we can see that two non prime attributes (Advisor-office and Department) are transitively dependent on the Primary key(Student#,Class#).

Therefore as per definition R1 is not in 3NF. But R2 is in 3NF as per definition.

So we can decompose R1 into 3NF by splitting the table into the following three tables(R11, R12, and R13).

R11(Student#, Class#, Advisor), R12 (Advisor, Advisor-office), and R13(Advisor, Department)  

R11 is shown below

Student# Class# Advisor

1011                101-07 Jones

1011                201-02 Jones

1011                310-11 Jones

2010       101-07 Anderson

2010       201-02 Anderson

2010       120-12 Anderson

R12 is shown below

Advisor Advisor-office

Jones      212

Anderson 308

R13 is shown below

Advisor Advisor-office

Jones          CSCI

Anderson MATH

So these four tables (R11, R12, R13, R2) correctly represent the third normal form of the given table.

You might be interested in
Dillard’s wants to learn about its consumers' attitudes toward online purchases. There are numerous studies that are available a
Kamila [148]

Answer:

Indirect/secondary source; direct/original source.

Explanation:

Data is a vital piece of information. It is generated from various physical or abstract activities. There are different sources of data. They are direct source, indirect source, static source, dynamic source etc.

The direct source is also called the original source data because information gotten from it is directly retrieved from a target audience or observed samples. Indirect or secondary source data is gotten from an already existing databases, which may or may not have been used for analysis.

Static source data hardly changes or updates while dynamic sources updates constantly.

4 0
2 years ago
+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~
Karo-lina-s [1.5K]

+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.

Messages can still be blocked at the server level.

Messages cannot be blocked at the network firewall.

Most obvious spam messages will still reach the client computer.+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.

Messages can still be blocked at the server level.

Messages cannot be blocked at the network firewall.

Most obvious spam messages will still reach the client computer.+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.

Messages can still be blocked at the server level.

Messages cannot be blocked at the network firewall.

Most obvious spam messages will still reach the client computer.+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.

Messages can still be blocked at the server level.

Messages cannot be blocked at the network firewall.

Most obvious spam messages will still reach the client computer.+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.

Messages can still be blocked at the server level.

Messages cannot be blocked at the network firewall.

Most obvious spam messages will still reach the client computer.

<em><u>please</u></em><em><u> </u></em><em><u>mark</u></em><em><u> </u></em><em><u>me</u></em><em><u> </u></em><em><u>as</u></em><em><u> </u></em><em><u>brainliest</u></em><em><u>. </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

<em><u>follow</u></em><em><u> </u></em><em><u>me</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>my</u></em><em><u> </u></em><em><u>fr</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

6 0
2 years ago
Write a function called add_tuples that takes three tuples, each with two values, and returns a single tuple with two values con
Leni [432]

In Python, tuples are indeed a data structure that also stores an ordered sequence of unchanging values, and following are the Python program to the given question:

Program Explanation:

  • Defining a method "add_tuples" that takes three variables "firstTuple, secondTuple, thirdTuple" into the parameter.
  • After accepting the parameter value a return keyword is used that adds a <em><u>single tuple with two values</u></em> and returns its value into the form of (x,y).
  • Outside the method, two print method is declared that calls the above method by passing value into its parameters.

Program:

def add_tuples(firstTuple, secondTuple, thirdTuple):#defining a method add_tuples that takes three variable in parameters

   return firstTuple[0]+secondTuple[0]+thirdTuple[0],firstTuple[1]+secondTuple[1]+thirdTuple[1] #using return keyword to add value

print(add_tuples((1,4), (8,3), (14,0)))#defining print method that calls add_tuples method takes value in parameters

print(add_tuples((3,2), (11,1), (-2,6)))#defining print method that calls add_tuples method takes value in parameters    

Output:

Please find the attached file.  

Learn more:

brainly.com/question/17079721

4 0
2 years ago
Define a structure type auto_t to represent an automobile. Include components for the make and model (strings), the odometer rea
yulyashka [42]

Answer:

see explaination

Explanation:

#include <stdio.h>

#include <string.h>

#define BUFSIZE 1000

struct auto_t scan_auto(char *);

struct date_t {

char day[2];

char month[2];

char year[4];

};

struct tank_t {

char tankCapacity[10];

char currentFuelLevel[10];

};

struct auto_t {

char make[50];

char model[50];

char odometerReading[10];

struct date_t manufactureDate;

struct date_t purchaseDate;

struct tank_t gasTank;

};

int main(int argc, char *argv[]) {

/* the first command-line parameter is in argv[1]

(arg[0] is the name of the program) */

FILE *fp = fopen(argv[1], "r"); /* "r" = open for reading */

char buff[BUFSIZE]; /* a buffer to hold what you read in */

struct auto_t newAuto;

/* read in one line, up to BUFSIZE-1 in length */

while(fgets(buff, BUFSIZE - 1, fp) != NULL)

{

/* buff has one line of the file, do with it what you will... */

newAuto = scan_auto(buff);

printf("%s\n", newAuto.make);

}

fclose(fp); /* close the file */

}

struct auto_t scan_auto(char *line) {

int spacesCount = 0;

int i, endOfMake, endOfModel, endOfOdometer;

for (i = 0; i < sizeof(line); i++) {

if (line[i] == ' ') {

spacesCount++;

if (spacesCount == 1) {

endOfMake = i;

}

else if (spacesCount == 2) {

endOfModel = i;

}

else if (spacesCount == 3) {

endOfOdometer = i;

}

}

}

struct auto_t newAuto;

int count = 0;

for (i = 0; i < endOfMake; i++) {

newAuto.make[count++] = line[i];

}

newAuto.make[count] = '\0';

count = 0;

for (i = endOfMake+1; i < endOfModel; i++) {

newAuto.model[count++] = line[i];

}

newAuto.model[count] = '\0';

count = 0;

for (i = endOfModel+1; i < endOfOdometer; i++) {

newAuto.odometerReading[count++] = line[i];

}

newAuto.odometerReading[count] = '\0';

return newAuto;

}

8 0
2 years ago
Which of the following is NOT a benefit of virtual memory? speed up of process creation increases in the effective access time o
lubasha [3.4K]

Answer:

speed up of process creation increases in the effective access time of memory

Explanation:

Virtual memories are often used in order to save up ram for other applications and not being limited by the actual physical memory that we have, in this case the virtual memory is slower than normal memories since they are not actual memories and are restricted to the spee of the connection or the speed of the disk where they are located.

8 0
2 years ago
Other questions:
  • The part of the computer that contains the brain, or central processing unit, is also known as the A.monitor B.modem C.keyboard
    10·1 answer
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • When a machine on the public network wants to reach the server at 172.30.0.10, which ip will it use?
    6·2 answers
  • When you park on a hill, think about which way _____.
    6·2 answers
  • Prompt: Which references and reference formats are you most likely to use? Why?<br><br><br> ED2020
    13·2 answers
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables ca
    5·1 answer
  • Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to
    13·1 answer
  • Write a C program that creates two threads to run the Fibonacci and the Runner processes. Threads will indicate the start and th
    14·1 answer
  • Which option in the Caption dialog box configures whether the caption appears above or below the image
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!