List the primary key and functional dependencies

Assignment Help Computer Engineering
Reference no: EM13327805

Advanced Normalization

List the primary key and functional dependencies in the following table, subject to the specified conditions. Convert this table to an equivalent collection of tables that are in third normal form (3NF).

INVOICE

INVOICE NUMBER

CUSTOMER_NUMBER

LAST_NAME

FIRST_NAME

STREET

CITY

STATE

ZIP_CODE

INVOICE_DATE

PARTNUMBER

PARTDESCRIPTION

UNIT_PRICE

NUMBER_SHIPPED

 

This table concerns invoice information. For a given invoice (identified by the invoice number) there will be a single customer. The customer's number, name, and address appear on the invoice as well as the invoice date. Also, there may be several different parts appearing on the invoice. For each part that appears, the Part Number, Part Description, Unit Price, and Number Shipped will be displayed. The price is from the current master price list.

 

Using your knowledge of a college environment, determine the primary key and functional dependencies that exist in the following table. After these have been determined, convert this table to an equivalent collection of tables that are in 3NF.

 

STUDENT

STUDENT_NUMBER

STUDENT_NAME

NUMBER_CREDITS

ADVISOR_NUMBER

ADVISOR_NAME

DEPT_NUMB

DEPT_NAME

COURSE_NUMBER

COURSE_DESCRIPTION

COURSE_TERM

GRADE

 

For both questions, you will need to submit:

  1. The attribute or, in the case of composite keys the attributes, that would most likely be used as the primary key.
  2. A listing of all the functional dependencies among the attributes listed in the initial table.
  3. A three-stage set depicting the normalization process, showing the tables after first, second, and third normal form.

Reference no: EM13327805

Questions Cloud

Is it possible that making investments with expected returns : Is it possible that making investments with expected returns higher than your company's cost of capital will destroy value? If so, how?
At what speed are the electrons traveling in this power line : Household wiring composed of aluminum wire with cross-section area 3.1 x10?6 m2 carries a current of 2.5 A. At what speed are the electrons traveling in this power line
What would the nominal rate of interest on acme bonds : Inflation is expected to remain constant in the future at 3.3%. Default-risk premium is expected to remain constant at the rate of 1.8% . The liquidity risk is only 0.03% on the bonds.
Explain what will the concentration be after 18.0 minutes : The rate constant for a certain reaction is = 6.10×10?3 . If the initial reactant concentration was 0.750 , what will the concentration be after 18.0 minutes
List the primary key and functional dependencies : List the primary key and functional dependencies in the following table, subject to the specified conditions. Convert this table to an equivalent collection of tables that are in third normal form (3NF).
What is the classical acceleration of the electron : What is the classical acceleration of the electron in a hydrogen atom, separated from the proton by 5.29 x10?11 m? Electron mass = 9.11 x10?31 kg
State carbon monoxide and chlorine combine in an equilibrium : Carbon monoxide and chlorine combine in an equilibrium reaction to produce the highly toxic product, phosgene (COCl2). CO(g) + Cl2(g) Picture COCl2(g) If the equilibrium constant for this reaction
How much work did he do on the car : A 1625 kg car, having run out of gas, is at rest on a level surface. If the person applies a force of 765 kg m/s^2 for 8 seconds, how much work did he do on the car
Prepare a capital budget for the items to be acquired : The expected lifetime of the various capital items is 10 years for the garbage trucks, 8 years for the bulldozer, 5 years for the lawn mowers, and 40 years for the activity center.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What it is role is in the overall program

Improve the program's functionality by utilizing at least 5 of the concepts from the list below. Document how the game works, including how you utilized each of the chosen concepts and what it's role is in the overall program.

  Health care services

Compare and contrast the cost-effectiveness, benefit-cost, and cost-utility analysis and find which is most useful to assess value of the health care services overall.

  What is home wireless network and security

What is home wireless network and security Methodology- Review topics covered in lecture hours, from textbook, reference books plus online research, to behaviour a comprehensive study about wireless network security implementation at home.

  Stack pointer and program counter

The content of top of a memory stack is 5320. The content of stack pointer SP is 3560. A two-word call subroutine instruction is situated in the memory at address 1120 followed by the address field of 6720 at location 1121.

  What are the implications for management

Reduction in cost of hardware with time.What are the implications for management of each of the trends.

  Find the number rounded to the nearest hundredth

For each value read, the program should display the original value, the number rounded to the nearest integer, the number rounded to the nearest tenth, the number rounded to the nearest hundredth and the number rounded to nearest thousandth.

  Write down a public static method named chunk25

Write down a public static method named chunk25 that takes a double and returns an integer that represents the number of chunks of 25 in that number. A chunk of 25 is 25, or any part thereof

  Define the quicksort algorithm to sort vector v

define the quicksort algorithm to sort vector v. During each pass, list all exchanges of a pair of elements in the lower and upper sublist.

  What transform a network to a secure network

How do I transform a network to the secure network? What tools should I have and what kind of hardware do I need to have a basic secure network.

  What is the round number when the system becomes idle

Explain why worst-case fair WFQ can have the absolute fairness bound and what is the round number when the system becomes idle? When the system is idle? Justify your answer.

  Why the file manager should grant such requests

why the file manager should grant such requests.

  Regarding delivery of the packet wirelessly

Supposing no malfunction in any of stations or nodes of the network, also explain in scholarly detail if it is possible for the packet to be delivered to the wrong destination

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd