Question regarding the functional dependencies

Assignment Help Basic Computer Science
Reference no: EM131116975

A consulting company named Database Experts has also designed a logical schema for CPC. CPC found that their design is different from yours. There is the following table in their logical schema.

Donation (Donator#, Program#, Date, Amount, Title, Theme, Deadline)

The requirements of CPC also indicate that there are the following Functional Dependencies:

Donator#, Program# -> Date, Amount

Program# -> Title, Theme, Deadline

Theme -> Deadline

Although the designers at Database Experts claim that their design is superior in all aspects, CPC gives you a fair chance to justify your position. Now it's your time to do the following.

1). Find the primary key for the table DONATION (You have to show the process)

2). Determine which normal form the DONATION table is in. Explain why. 

3). Decompose their table into 3NF tables. Specify primary keys and foreign keys of your tables. (You need to show the process)

Reference no: EM131116975

Questions Cloud

Performance has been dropping steadily over last five months : You have recently been promoted to take over a poor performing team of ten. The team’s performance has been dropping steadily over the last five months. Among your many new responsibilities, you have been specifically asked to suggest specific ideas ..
Chain of service facilities : A chain of service facilities (like automobile repair shops) has locations in three cities: A, B, C. Each facility sells two products: 1, and 2. These figures give the maximum demand at each location. It is perfectly possible for the firm to sell les..
Preparing the comparative financial statements : Agassi Corporation is preparing the comparative financial statements to be included in the annual report to stockholders. Agassi employs a fiscal year ending May 31.
Lagreca company is involved in four separate industries : (Segmented Reporting) LaGreca Company is involved in four separate industries. The following information is available for each of the four industries. Determine which of the operating segments are reportable based on the:
Question regarding the functional dependencies : Donation (Donator#, Program#, Date, Amount, Title, Theme, Deadline) The requirements of CPC also indicate that there are the following Functional Dependencies:
An unqualified opinion on financial statements : An auditor issued an unqualified opinion on financial statements that failed to disclose that a significant portion of the accounts receivable was uncollectible.
Birm plans to acquire a large firm in portugal that is risk : Birm plans a licensing deal in which it will sell technology to a firm in Germany for $3 million; the payment is invoiced in dollars, and this projectb has the same risk level as its existing businesses. Birm plans to acquire a large firm in Portugal..
Process inventory account of phelan corporation : The Work in Process Inventory account of Phelan Corporation increased $22,000 during November 2013. Costs incurred during November included $24,000 for direct material, $126,000 for direct labor, and $42,000 for overhead.
The endangered species act : The Endangered Species Act (ESA) charges the National Marine Fisheries Service (a federal agency) with the duty to “ensure” that any proposed action by the Council does not “jeopardize” any threatened or endangered species. The Steller sea lion is on..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How convert floating number ieeee half floating point number

How to convert 2.51 and 5.25 to IEEEE Half Floating Point Number

  Tcp flags are utilized

Provide a detailed description of how each of the following TCP flags are utilized: (In Network Security) SYN (Synchronize) ACK (Acknowledgement)

  Calculate the total time required to transfer a 1000-kb file

The bandwidth is infinite, and during the first RTT we can send one packet (21-1 ), during the second RTT we can send two packets (22-1 ), during the third we can send four (23-1 ), and so on. (A justification for such an exponential increase will..

  Why your program should require o(logn) time per order

The double action system operates as follows. When a new buy order of $x arrives it is simply stored for future use if none of the stored sell orders has an asking price lower than or equal to $x.

  Calculate and display height and cost of container

Compute and display the height and cost of the container. Use the following formulas, where V is the volume, r is the radius, h is the height, and C is the cost.

  Design a program to perform the task

Calculate the total price based on several key parts required to build a state-of-the-art gaming computer. The user will have the option of selecting different parts. For example, Windows 7, Windows 8 or Mac OS/X for Operating systems, 4 GB, 8 GB or ..

  The logic structure to capture the payment information

Document the steps for the logic structure to capture the payment information. This can be done as either a flowchart or pseudocode. Be sure to include inputs, variable declarations and assignments, and outputs.

  Brief research on the different types of uml modeling tools

Conduct brief research on the different types of UML modeling tools that are available out there. Choose one that you think is the best to use. What did you like about this one that made it superior to other tools that you researched? Explain.

  Access mode in cisco networking

What is the difference between trunk mode and access mode in Cisco networking?

  Draw a flow chart, hierarchy chart

Draw a flow chart, hierarchy chart, and write pseudocode for the following problem. • A weather sensing system calculates & prints a report on the following: ? Average temperature ? Highest temperature ? Lowest temperature ?

  How many questions should you expect on the 220-802 exam

How many questions should you expect on the 220-802 exam?

  Detailed security requirements for inclusion in an rfp

Document 20 detailed security requirements for inclusion in an RFP. These requirements should focus specifically on security of the logon process (authentication) of users into a networked application.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd