Identify the form of normalization

Assignment Help Basic Computer Science
Reference no: EM13859341

Part 1. Identify the Form of Normalization

For each of the examples below, indicate the normal form for each relation.  If the relation is NOT in third normal form, decompose it into 3NF relations. Enter 1NF, 2NF or 3NF in the blank next to each item.

_____1. EMPLOYEE (Emp_ID, F_name, L_name, DOB, email, street, city, state, zip, phone, hire_date)

_____2.  CLASS (Course_No, Section_No, Room

_____3.  CLASS (Course_No, Section_No, Room, Capacity) {Note: Capacity isfuncationally dependent on Room}

_____4.  PART SUPPLIER (Part_No, Description, Vendor_Name,  Address, Unit_Cost)

Part 2: 3NF Normalization

Using the normalization methods described in the second part of Chapter 5, decompose the user view for  the Patient Bill displayed on the next page into a set of relations in 3NF.  The schema is to show PK, FK, and referential integrity.

You are to show:

  1. A 2-D Table with no multivalued attributes  (1NF)Hint: Your table should have 4 rows of data in addition to the column headings.
  2. A functional dependencies diagram (see page  217 in your text)
  3. A set of relations (tables) with no transitive dependencies (3NF)
  •  
    • Note:  If there are no transitive dependencies, then 2NF = 3NF

Suggestion: Copy and paste the text from the invoice below into your table and relations.

Mountview Community Hospital

200 Forrest Dr.

Mountview, CO









Statement of Account for:






Patient Name:

Baker, Mary


Patient #:  3249


Patient Address:

200 Oak St.


Date Admitted:  9-15-14

City-State-Zip:

Mountain View,


Date Discharged:  9-18-14



CO 80608






















Item Code


Description


Charge









200



Room semi-pr


     1,800.00


205



ECG



           75.00


307



X-ray



         100.00


413



Lab tests



         200.00





Balance Due


     2,225.00










Reference no: EM13859341

Questions Cloud

Calculate equilibrium products at 500k for the reaction : Calculate equilibrium products at 500K for the reaction of 1 mole CO and 1 mole H2O according to the water-gas shift reaction (CO • H2O CO2 • H2) as a function of temperature four ways
Recognize the elements and correct use of a thesis statement : Recognize the elements and correct use of a thesis statement
Database with data about a university : This assignment uses a database with data about a university; the database resides in our Oracle servers. The schema of the database is provided below. Keys are in bold face and underlined, field types are omitted; assume that appropriate foreign ..
Create a new custom form that contains a subform : 1) You are going to create a new custom form that contains a subform, the main from will contain the classes and the subform will contain the students , when the user navigate the classes from the main form, the subform will display the students f..
Identify the form of normalization : For each of the examples below, indicate the normal form for each relation.  If the relation is NOT in third normal form, decompose it into 3NF relations. Enter 1NF, 2NF or 3NF in the blank next to each item.
Understand first about the debate or disagreement : understand first about the debate or disagreement
Write paper about causes and symptoms of alzheimer : Write paper about causes and symptoms of Alzheimer's and Dementia
Prepare general journal entries to record the transactions : Prepare general journal entries to record the transactions and events for the reporting period ended 30 June 2013 (narrations are not required).
Where vs having in sql : Using WHERE or HAVING in your SQL statement, answer the following questions using the MOVIES Database available with this assignment.  Be sure to include your SQL code and a screen capture of your output for EACH question.  Do NOT decrease the size..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that reads strings from the user

Write a program that reads strings from the user and writes them to an output file called userStrings.txt.  Stop processing when the user enters the string "DONE".

  Frequent shopper program

Hardware platform: Describe the hardware environment to support the development and production of this system.

  Write a multithreaded program

Make sure it is able to compile a program prog.c with pthread, do "gcc -lpthread -o prog prog.c" Need the: a) The code b) Screenshot of the terminal showing your program running with at least 8 (different) numbers as run-time input.

  What are some causes of the number of bytes exceeding

What are some causes of the number of bytes on the wire exceeding the number of bytes being captured

  Use karatsuba''s integer multiplication algorithm

Use Karatsuba's integer multiplication algorithm as a subroutine.

  How many memory banks are needed

How many memory banks are needed so that a stream of loads can, on average, require only one cycle per load?

  Design combinational circuit that compute 4-bit leading zero

Design a combinational circuit that computes the 4-bit leading zero detecting function. A leading zero detecting function counts the number of zeros in the most significant bits before the first '1'.

  What is a prototype and how might it be used

What is a prototype and how might it be used in the interface design process. Should an organization have internal interface design standards. What are the benefits and drawbacks of these standards. Give examples of what some of these standards mi..

  Create a if function formula to determatine

Create a if function formula to determatine which boats include a stove with galley. Boats must be able to seat 8 or more people to have stove in the galley.

  Guidelines to pre-test the designed survey

One of the guidelines is to pre-test the designed survey on a few participants to see what might be unclear or weak in the survey design.

  Design a ram chip

Design a RAM chip that is 128K x 8. For each sub-part below, show the array of RAM cells and its dimensions, the decoder(s) required to access the array, and tabulate the numbers of gates required to implement the decoding.

  Two vulnerability analysis tools used in research

two Vulnerability Analysis tools used in research and/or commercially available and describe their main features and functionality. Compare and contrast their relative strengths and weaknesses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd