What errors prevent the table displayed

Assignment Help Basic Computer Science
Reference no: EM13948128

Exam 1: Normalization

Part 1

Use the following table to answer questions 1 and 2:

Table: BOOK-DETAIL

BookID**

GenreID

GenreDesc

Price

1

1

Gardening

25.99

2

2

Sports

12.99

3

1

Gardening

10.00

4

3

Travel

14.99

5

2

Sports

17.99

**Primary key

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form

 

  • Describe or illustrate how you would correct the normalization error, if one is present.

Use the following table to answer questions 3 and 4:

Table: BOOKS

Book-Code**

Title

Price

Pub-Code**

Publisher

City

0180

Shyness

7.65

BB

Bantam Books

Boston

0189

Kane and Able

5.55

PB

Pocket Books

New York

0200

The Stranger

8.75

BB

Bantam Books

Boston

0378

The Dunwich Horror

19.75

PB

Pocket Books

New York

079X

Smokescreen

4.55

PB

Pocket Books

New York

**Primary Key

What, if any normalization error is present in the table?

    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.
  • Use the following table to answer questions 5 and 6:

Table: PRODUCT

ProductID**

Color

Price

1

Red, Green

15.99

2

Yellow

13.99

3

Green

22.99

4

Yellow, Blue

17.50

5

Red

19.99

**Primary key

 

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.

Use the following table to answer questions 7 and 8:

Table: PURCHASE-DETAIL

CustomerID**

StoreID**

StoreLocation

1

1

Los Angeles

1

3

San Francisco

2

1

Los Angeles

3

2

New York

4

3

San Francisco

*Primary key

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.

Use the following table to answer questions 9 and 10:

Table: BOOK-LOCATION

BookID**

BranchID**

Quantity-on-Hand

1

5W

4

1

3E

6

2

5W

3

3

5W

5

3

2S

4

**Primary key

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.

Part 2

Use the following table to answer questions 11 through 16.

Order ID

Order Date

Customer ID

Customer Name

Product ID

Product Desc.

Product Price

Quantity Ordered

1006

10/24/10

2

Value Furniture

7

 

5

 

4

Dining Table

Writers Desk

Entertain Center

800.00

 

325.00

 

650.00

2

 

2

 

1

1007

10/25/10

6

Furniture Gallery

11

 

4

4 Drawer Dresser

Entertain Center

500.00

 

650.00

4

 

3

  • What errors prevent the table displayed above from being first normal form compliant?
  • Bring the table(s) into first normal form compliance without loss of any data. Identify primary and foreign keys (when present) for all tables.
  • What error(s), if any, prevent the now first normal form compliant table or tables from being second normal form compliant?
  • Bring the table(s) into second normal form compliance without loss of any data. Identify primary and foreign keys. Be sure to present all tables, not just those changed in this step of the normalization process.
  • What error(s), if any, prevent the now second normal form compliant table or tables from being third normal form compliant?
  • Bring the table(s) into third normal form compliance without loss of any data. Identify primary and foreign keys. Be sure to present all tables, not just those changed in this step of the normalization process.

Reference no: EM13948128

Questions Cloud

Calculate the target cost for expanding the market share : Calculate the target cost for expanding the market share by 20 percent, assuming that the per-unit profitability is maintained as requested by the CEO.
Explain what a sequential access file is. : What are the advantages and disadvantages of using sequential access data files?
Critically evaluate these comments : Critically evaluate these comments. Please do not wander; concentrate on the issues described in the quotation.
Modify the c program so that user inputs the purchase amount : Modify the C program so that the user inputs the purchase amount. Check the user's input for validity. In addition to calculating the sales tax for each location, calculate and display the total sale amount for each location.
What errors prevent the table displayed : What errors prevent the table displayed above from being first normal form compliant?Bring the table(s) into first normal form compliance without loss of any data. Identify primary and foreign keys (when present) for all tables.
Maximum total deflection : A helical spring is to be constructed from a 4340 steel. The design calls for 5 coils, a coil-to-coil diameter of 12 mm, and a wire diameter  of  3  mm. Furthermore, a  maximum total deflection of 5.0 mm is possible without any plastic deformation..
Square cross section of edge length : A bar specimen having a square cross section of edge length c is subjected to a uniaxial tensile force F, as shown in the fol- lowing figure. Derive strength and stiffness performance index expressions analogous to Equations 22.9 and 22.11 for thi..
Children from the area who attend the school : So there are no minority children from the area who attend the school. Can the school qualify for tax exempt status under Section 501 (c) (3)? Why or why not?
Determine best choice of expiration date for the green b : If. for practical reasons. you had to choose only one model to use to set the expiration dates, which would it be? (There is no health risk involved. It's a flavor quality thing.) Why would you choose this model?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Business problems arise in a multitude

Business problems arise in a multitude of ways inside an organization; sometimes, they stem from the need or desire to do something completely new, sometimes they stem from the need or desire to improve an existing operation.

  Formulas and functions in excel

you must submit your training outline which includes topics and sub topics and time estimates. It should be professional and organized. If you take information from another source - include APA citations. each member of your team must train on a ..

  Discuss how determining milestones might add additional

Remember that milestones normally have no duration, so you must have tasks that will lead to completing the milestone.

  Describe how the digital forensics function complements

Describe how the digital forensics function complements the overall security efforts of the organization. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the e..

  Enterprise impact and measurement of business intelligence

Write a summary of the discussion your team had about enterprise impact and measurement of business intelligence.

  Designing a star schema

Designing a Star Schema

  Write a paper on the relative merits of .net and j2ee

Write a paper on the relative merits of .NET and J2EE as a platform for business systems integration.

  Let g=(v,e) be an undirected graph

Let G=(V,E) be an undirected graph in which the degree of each vertex is a multiple of 10 or of 15. Show that |E| is a multiple of 5.  |E| = number of edges

  Security of digital web platform against the unauthenticated

Security of digital web platform against the unauthenticated and automotive access is a prime concern for service provider now days. To form a smart and secure membrane at the door of websites, many of the host use Captchas to filter out their gue..

  Compare and contrast quantitative optimization

Compare and contrast (i) quantitative optimization-based design, and (ii) experience-based design.

  Discuss some secure coding efforts and practices

Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet. Discuss some secure coding efforts and practices under way to mitigate the vulnerabilities exposed by this particular episode.

  Calculate and output the following statistics

A player wins by collecting all the cards. If a player runs out of cards while dealing the face-down cards of a war, he may play the last card in his deck as his face-up card and still have a chance to stay in the game. Once a single player holds ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd