Determine the functional dependencies

Assignment Help Basic Computer Science
Reference no: EM13922101

Give an example of a column A and a column B such that B is functionally dependent  on A. Give an example of a column C and a column D such that D is not fictionally dependent on C.

1. Using your knowledge of TAL Distributors, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an equivalent collection of tables that are in third normal form.

Item (ItemNum, Description, OnHand, Category, Price, (OrderNum, OrderDate, CustomerNum, CustomerName, RepNum, LastName, FirstName, NumOrdered, QuotedPrice))

2. List the functional dependencies in the following table that concern invoicing ( an application TAL Distributors is considering adding to its database). subject to the specified conditions. For a given invoice ( identified by the invoicenum), there will be a single customer. The customer's number, name, and complete address appear on the invoice, as does the date. Also, there may be several different items appearing on the invoice. For each item that appears, display the item number, description, price and number shipped. Each customer that orders a particular item pays the same price. Convert this table to an equivalent collection of tables that are in third normal form.

Invoice (invoiceNum, Customerum, LastName, FirstName, Street, City, State, PostalCode, Date, (ItemNum, Description, Price, NumShipped.))

3. The requirements for TAL distributors have changed. A number and a name now identify each storehouse. Units of each item may be stored in multiple storehouses, and it is important to know precisely how many items are stored in each storehouse. I addition, TAL Distributors needs to know the number view full and name of each supplier as well as the expected lead time for delivering each item. (Lead time is the amount of time a suppliers, and each supplier can supply many items. Using this information, convert the following unormalized relation to fourth normal form: Item( ItemNum, Description, Category, Price, (StorehouseNum, StorehouseName, OnHand), (SupplierNum, SupplierName, LeadTime)

4. What changes would you need to make to the normalized table to support the following additional requirements:

a. TAL needs to keep track of the price a supplier charges for an item. Different suppliers can charge different prices for the same item.

b. Each storehouse has a manager who is identified by a manager number, a manger last name, and a manager first name.

5. TAL distributors is considering changing its business model so that many sales reps can represent one customer and one sales rep can represent many cutomers. Using this information, convert the following unnormalized relation to fourth normal form.

Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, (RepNum, LastName, FirstName, Street, City, State, PostalCode, Comission, Rate))

6. Convert the following unnormailzed relation to fourth normal form using the same requirements as in Question 5 (many sales reps can represent one customer and one sales rep can represent many customers)

Rep (RepNum, LastName, FirstName, Street, City, State, Postalcode,Commission, Rate, (CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit))

7. Is there any difference between the tables you created in Question 5 and 6? Why or Why not?

Reference no: EM13922101

Questions Cloud

What can company do to induce juan to purchase more clothing : The Johnson Company is the sole producer of clothing. What can the company do to induce Juan to purchase more clothing? Show graphically. (The graph does not have to be exact.)
Departments that perform a single functional task : managers are responsible for departments that perform a single functional task and have employees with similar training and skills.
Discuss the operations of an insurance company : This week we discuss the operations of an insurance company. As stated before, the primary technique for risk management is transferring the risk, usually to an insurance company. Ask the risk manager of your company who provides the property insuran..
Financial ratios-identify some of financial strengths : Financial ratios help us identify some of the financial strengths and weaknesses of a company. Identify four ratios we can use and explain why they are important. Provide an example of each ratio used.
Determine the functional dependencies : Using your knowledge of TAL Distributors, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an equivalent collection of tables that are in third normal for..
Discuss kurt lewin change process model : What are two reasons that Maxene gives for thinking it is important for different learning styles to be recognized? How does identifying the intended outcomes of a training shape the training itself? Discuss Kurt Lewin's change process model and how ..
Market risk premium-required return on genetics stock : Wendy purchased 800 shares of Robotics Stock at $3 per share on 1/1/09. Wendy sold the shares on 12/31/09 for $3.45. Genetics stock has a beta of 1.3, the risk-free rate of return is 3%, and the market risk premium is 8%. The required return on Genet..
Trading, profit and loss account for the year ended 30 june : Trading, profit and loss account for the year ended 30 June 2000. Hire purchase debtors account, Repossessions account.
Straight fromprograms or software packages : Show all of your work and reasoning. In particular, when there arecalculations involved, you must show how you come up with your answerswith critical work and/or necessary tables. Answers that come straight fromprograms or software packages will n..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Read in information systems

Discuss communication in Unix vs other communication tools we use outside of the operating system (example:text, IM). Discuss anything you have read in Information Systems this past week or tell me what is on your mind about Information Systems.

  Is the difference y-x exactly representable

Is the difference y-x exactly representable, regardless of exponent range, if gradual underflow is allowed? WHy?

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Practice cost-benefit question zhengxi

Practice Cost-Benefit Question Zhengxi, aged 21, is considering whether or not to go to university for four years. For simplicity assume that he is paid, and pays tuition, at the beginning of each year, and that his alternative income streams are bot..

  What technologies should be used to secure these areas

On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

  Demonstrate skills in drawing tools

To begin to combine and demonstrate skills in drawing tools, tweens, working with text, and telling a story

  What are the functional control types?

What are the functional control types? provide an example for each type.

  Function that uses a switch statement

To locate nearest numbered cross street for a given avenue address, the following algorithm can be used: cancel last diget of the address, divide by two,

  Describe the concept of concurrency

Write 2 pages.Describe the concept of concurrency. Use examples to discuss how concurrency is used in distributed enterprise systems and why concurrency is important in these scenarios.

  What is the value of the key and the new register

In the n-stage nonlinear feedback shift register (NLFSR), if the current register is 0010, function f is f(R3, R2, R1, R0) = R3 or R2 or R1 or R0,what is the value of the key and the new register?

  Write a program to create a customer''s bill for a company

Write a program to create a customer's bill for a company. The company sells five computer gadgets which are CD, keyboard, printer, pen drive and speaker.

  Use the smallest possible array to solve this problem

Use the smallest possible array to solve this problem. Display the complete set of unique value input after the user inputs each new value.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd