Decompose the table - 3nf or bcnf, Database Management System

Assignment Help:

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF.

A long-standing international treaty among the leaders of the world's developed countries prevents any and all evidence of extraterrestrial life that has been discovered from being reported to the people of Earth.  Although each country dedicates many federal agencies to furthering the country's interests, in the case of contact with extraterrestrial life, all relevant agencies of the world have agreed to cooperate.  They have developed a database in which information pertaining to extraterrestrial life encounters is recorded.  Much of the data is the identification information about those involved in an instance of contact.  Multiple humans and multiple aliens (assume these are all of one species in a single encounter) may be involved in a single encounter, and sometimes the same human will be involved in more than one encounter.  Encounters are classified in a standardized manner.  The final outcome(s) of the human participant(s) in the encounter is (are) also recorded.  Students of social psychology around the world whisper that this final outcome is a government-created and enforced disposition of the most sinister sort.

Data:

governmentID: the international identification for a government official who is responsible for information on an encounter
governmentOfficialName: the name of a participating government official       
securityClearanceRating: a government official's international security clearance  
agency: the federal agency for which the government official works                        
country: a government official's country of citizenship                
alienID: the identification for an extraterrestrial life form                                      
alienSpeciesName: the name of an extraterrestrial life form's species             
homePlanet: the planet or solar system + planet from which an extraterrestrial life form comes
communicationAbility: the level at which an extraterrestrial life form can communicate
victimID: the identification assigned to a human who encounters extraterrestrial activity
victimName: the name of the human who encountered extraterrestrial activity
victimDateOfBirth: the birthdate of the human who encountered extraterrestrial activity
victimDisposition: the final outcome of the human after an encounter             
encounter: the identification assigned to any instance of alien-human contact
encounterDate: the date an instance of contact occured
encounterType: the type of alien-human contact which occurred

Functional dependencies:

governmentID→governmentOfficialName, securityClearanceRating, agency, country
alienID→alienSpeciesName, homePlanet, communicationAbility
victimID→victimName, victimDateOfBirth

victimEncounter→victimID, encounter, victimDisposition
alienEncounter→alienID, encounter
encounter→encounterDate, governmentID, encounterType


Related Discussions:- Decompose the table - 3nf or bcnf

Determine that the checkpoints are a part of, 1. Determine that the Checkpo...

1. Determine that the Checkpoints are a part of  Ans: Checkpoints are a part of Recovery measures

What is class diagram, Class Diagram A class diagram is required to su...

Class Diagram A class diagram is required to support functional necessity of system. In a static design view, class diagram is used to model vocabulary of the system, simple c

Examine about the behavioural diagrams, Examine about the Behavioural Diagr...

Examine about the Behavioural Diagrams  The main objective of behavioural diagrams is to visualize, specify, construct and document dynamic aspects of a system. The interactio

What is an operand, What is an Operand? The data on which the operation...

What is an Operand? The data on which the operation is to be performed is known as an Operand

What is a hashing function, What is a hashing function?  What are the prope...

What is a hashing function?  What are the properties of a good hashing function?  Describe the folding technique for hashing functions.      Ans:  Hashing function is a method

Top down method and bottom up method, Evaluate, compare and contrast the tw...

Evaluate, compare and contrast the two methods of relational database design namely top down method and Bottom up method. What will be your choice if you are asked to select a meth

Primary index, Primary index A primary index is a file that has a sorte...

Primary index A primary index is a file that has a sorted series of records having two columns: a block address for that key field in the data file; and the ordering key field.

What is business intelligence, Question A What is operational intelligence...

Question A What is operational intelligence? Question B What is Business Intelligence? Explain the components of BI architecture Question C Differentiate between databas

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd