Fds in relationships and teaches relationship, Database Management System

FDs in Relationships:

 Enrols Relationship: None as it is many to many

Teaches Relationship: Course code → Instructor

Instructor → Course code

The next question is:  How do we recognize the functional dependence in a database model?

Functional dependencies occur from the nature of the actual world that the database models. Often A and B are facts about an entity where A may be some identifier for the entity and B some characteristic. Functional dependencies cannot be automatically determined by studying one or more cases of a database. They can be determined only by a careful study of the actual world and a clear understanding of what every attribute means.

 There are no thumb rules for determining FDs.

Functional dependence is an vital concept and a large body of formal theory has been developed about it.


Posted Date: 3/7/2013 1:54:10 AM | Location : United States

Related Discussions:- Fds in relationships and teaches relationship, Assignment Help, Ask Question on Fds in relationships and teaches relationship, Get Answer, Expert's Help, Fds in relationships and teaches relationship Discussions

Write discussion on Fds in relationships and teaches relationship
Your posts are moderated
Related Questions
We need help in Booking System for Golf Business Development of a web based booking system which permits clients to book golf lessons with the following features- a) 4 user p

using the invoice table shown below,write the relational schema,draw a dependencies,inclunding all partial and transitive dependencies.assume that the table does not contain repeat

Explain the Exec statement in SQL Ans: Exec statement has the structure    EXEC SQL END-EXEC   Embeded SQl statements are of a form identical to non embedded SQL statem

When a function module is activated syntax checking is performed automatically. YEs, a function module is activated syntax checking.

Use inheritance as an implementation technique when you are going to use inheritance as an implementation technique, you can achieve same goal in a safer way by making one cla

What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.

Define deadlock prevention. Deadlock prevention is a set of methods for ensuring that at least one of the four essential conditions like mutual exclusion, hold and wait, no pre

differences between a classified catalog and a dictionary catalog

Which method is used to key transformation ? A hash method is used to key transformation.