Decompose grade report into a set of 3nf relations

Assignment Help Management Information Sys
Reference no: EM131229068

1) For each of the following relations, indicate the normal form for that relation. If the relation is not in third normal form, decompose it into 3NF relations. Functional dependencies (other than those implied by the primary key) are shown where appropriate.

a. CLASS(CourseNo, SectionNo)

b. CLASS(CourseNo, SectionNo, Room)

c. CLASS(CourseNo, SectionNo, Room, Capacity)
[FD:Room-Capacity]

d. CLASS(CourseNo, SectionNo, CourseName, Room, Capacity) [FD:FD:ourseNo->CourseRoom; CRoom-Capacity]

2) The Relation below stores information about weather observations made in the Albany area. You can assume that there are many observations made each day, that observer names are all unique, and that each observer measures the weather at just one location per day. Convert the relation them into a 3NF model and show the referential relationships. Don't add any additional fields.

(Date, ObserverName, Location, ObserverPhone, ObserverAddress, Time, CloudCover, Temperature, Humidity)

3) The Grade Report Table below shows a relation called Grade Report for a university. For this relation:

Draw a relational model and diagram the functional dependencies in the relation.

In what normal form is this relation in?

Decompose Grade Report into a set of 3NF relations.

Draw a relational model for your 3NF relations and show the referential relationships.

StudentID

StudentName

CampusAddress

Major

CourseID

CourseTitle

Instructor Name

Instructor Location

Grade

168300458

Williams

208 Brooks

IS

IS 350

Database Mgt

Codd

B104

A

168300458

Williams

208 Brooks

IS

IS 465

Systems Analysis

Parsons

B317

B

543291073

Baker

104 Phillips

Acctg

IS 350

Database Mgt

Codd

B104

C

543291073

Baker

104 Phillips

Acctg

Acct 201

Fund Acctg

Miller

H310

B

543291073

Baker

104 Phillips

Acctg

Mkgt 300

Into Mktg

Bennett


 

Reference no: EM131229068

Questions Cloud

Discuss the disproportionate risk of holding inventory : Discuss the disproportionate risk of holding inventory by retailers ,wholesalers, and manufactures. why has there been a trend to push inventory back up the channel of distribution?
Derive the stability criteria for the second order : Stability of the Runge-Kutta methods. Derive the stability criteria for the second order and fourth-order Runge Kutta methods, applied to ODEs. Consider the model equation dy/dt = λy, and find the criteria for λ such that the methods are stable. R..
Differences between reactive and planning inventory logics : Discuss the differences between reactive and planning inventory Logics. what are the advantages of each? what are the major implications of each ?
How does this depend on the length x of your simulation : Choose t0 such that the pulse slowly ramps up from zero; generally t0 ≥ 3τ is sufficient. Vary the time step ?t, without changing the pulse shape, and investigate the stability of this algorithm. You will find it is most illustrative to look at th..
Decompose grade report into a set of 3nf relations : In what normal form is this relation in? Decompose Grade Report into a set of 3NF relations. Draw a relational model for your 3NF relations and show the referential relationships.
Research replacement desktops for our dell optiplex : You have been asked to research replacement desktops for our Dell Optiplex 755 systems running 4GB of RAM with 500GB of storage. Take time to research this model and come up with a vialble replacement solution. Explain how CPU speed, amount of mem..
Reads the same forwards and backward : 1. If an array contains n elements, what are the maximum number of recursive calls made by the binary search algorithm? 2. A palindrome is a string that reads the same forwards and backward. consider some example
Prominent black professor takes unpaid leave of absence : A prominent black professor takes an unpaid leave of absence to protest the fact that his extremely prominent university has failed to ever hire any black females in tenure-track (regular, permanent) positions on the faculty. When he does not return ..
Write a 2d tm mode fdtd simulation that is 100 grid cells : Now, investigate the stability of this problem by varying ?t; how large can you make ?t before the simulation goes unstable? Can you surpass the CFL condition? Why or why not?

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Risk, return and portfolios in general

Risk, return, and portfolios in general. Technology stocks in particular - How would you respond to such a comment?

  A new economy of sharing has fuelled an old approach to

internet impacts and support for new business modelssocial networking has provided new models of business. companies

  Difference between tacit knowledge and explicit knowledge

The uses of blogs, wikis, and social networking technologies are becoming powerful tools for business collaboration and as a way for organizations to leverage tacit knowledge. The difference between tacit knowledge and explicit knowledge

  Key considerations in organizing the software

key considerations in organizing the software enterprisewhat would you consider some of the key considerations in

  It governance archetypes and cloud computingwhy can an it

it governance archetypes and cloud computingwhy can an it governance archetype be good for one type of is decision but

  Explain why it projects fail

Why IT Projects Fail - What do you envision are the primary contributors to this dismal record of performance?

  Create an enterprise system that uses a shared data base

Create an enterprise system that uses a shared data-base. Change the diagram you created in your answer to question 2 to include this database.

  Examples of the growing use of blogs for politics

Examples of the growing use of BLOGS for politics - Address the features, functions of a key statistics for BLOGGING.

  Assess bcp as a process that adds business value

Assess BCP as a process that adds business value. Give your opinion on whether or not the argument that states BCP adds value is a credible argument. Explain why or why not

  Focus on technologyhave you ever gone phishing probably not

focus on technologyhave you ever gone phishing? probably not but the internet enables unscrupulous individuals to phish

  Assigment present an example owhere data mining is crucial

present an example owhere data mining is crucial to the success of a business.what data mining functions does this

  Describe how information systems can support

Describe how information systems can support each of the following competitive strategies and identify the major type/types of information system/systems that exists/exist in the organisation you are working in, or any other organization you are de..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd