Identify the functional dependencies between the attributes

Assignment Help Basic Computer Science
Reference no: EM131738731

Question: The following attributes form a relation that includes informa- tion about individual computers, their vendors, software pack- ages running on the computers, computer users, and user authorizations. Users are authorized to use a specific software package on a specific computer during a specific timeframe (characterized with attributes UserAuthorization Starts and UserAuthorizationEnds and secured with UserAuthorizationPassword). Software is licensed to be used on specific computers (potentially multiple software packages at the same time) until an expiration time (SoftwareLicenceExpires) at a specific price. Computers are sold by vendors, and each vendor has a support person with an ID, name, and phone extension. Each individual computer has a specific purchase price. The attributes are as follows:

Computer SerialNbr, VendorID, VendorName, VendorPhone, VendorSupportID, VendorSupportName, VendorSupportExtension, SoftwareID, SoftwareName, SoftwareVendor, SoftwareLicenceExpires, SoftwareLicencePrice, UserID, UserName, UserAuthorizationStarts,

1. UserAuthorizationEnds, UserAuthorizationPassword, PurchasePrice Based on this information,

2. Identify the functional dependencies between the attributes.

3. Identify the reasons why this relation is not in 3NF. Present the attributes organized so that the resulting relations are in 3NF.

Reference no: EM131738731

Questions Cloud

Flexible way of meeting changing : What provides a flexible way of meeting changing and diverse training needs with professionally developed and administered programs?
Develop a position on what constitutes project success : Conduct research beyond your course materials and develop a position on what constitutes project success, and how measures of success might change for projects
Discuss what types of damages albert may claim : Discuss what types of damages Albert may claim, which types is he likely to be awarded and what amounts he is likely to be awarded
Consent and authorization in the context of hipaa : Compare the difference between consent and authorization in the context of HIPAA.
Identify the functional dependencies between the attributes : The following attributes form a relation that includes informa- tion about individual computers, their vendors, software pack- ages running on the computers.
What are the key laws governing safety : What are the key laws governing safety, health , and welfare in our country or organisation. State the main objective of each such law , legislative act.
Define minnesota for serving a defendant by publication : Describe, in detail, the process in Minnesota for serving a defendant by publication
Authors distinguish between ethic and morals : How do the authors distinguish between ethic and morals? What is the difference between a presidential and a parliamentary system?
Approach when making decisions : As a leader would you prefer to use the individual or group approach when making decisions? Please explain and evaluate the pros and cons of each approach.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd