Define multivalued dependency and 4nf, Database Management System

Assignment Help:

Define multivalued dependency and 4NF.

 Ans:  Multivalued Dependency - Assume R be a relation schema and let α ⊆ R and β ⊆ R. The multivalued dependency 

α →→β 

 holds on R if, in any type of legal relation r(R), for all pairs of tuples t1 and t2 in r like that 

t1[α] = t2[α], there exist tuples t3 and t4 in r like

t1[α] = t2[α] = t3[α] = t4[α]

t3[β] = t1[β]

t3[R - β] = t2[R - β]

t4[β] = t2[β]

t4[R - β] = t1[R - β]

 Fourth Normal Form (4 NF) - A relation schema R is in 4NF regarding to a set D of functional and multivalued dependencies if, for all multivalued dependencies in D+ of the

form α →→β, in which α ⊆ R and β ⊆ R, at least one of the subsequent holds:

  • α→→β is a trivial multivalued dependency,
  • α is a superkey for schema R.

Related Discussions:- Define multivalued dependency and 4nf

Central database schema, Consider an information system designed for an onl...

Consider an information system designed for an online company which provides IT products and services. These include desktops, laptops, networking products, IT books, parts, and te

Hangman, a method named WonGame that checks each letter in the word is matc...

a method named WonGame that checks each letter in the word is matched by its label

ERD, online eductional management system ke diagram

online eductional management system ke diagram

Wait-die scheme -deadlock prevention, Wait-die" scheme : The idea is based ...

Wait-die" scheme : The idea is based on non-preventive method. It is based on a simple rule:                                 If Ti requests a database resource that is held by T

Optimistic concurrency contents -write-set(t), write-set(T): Each data ite...

write-set(T): Each data items that are written by a transaction T

Weak entity, An example of a weak entity is Staff because the availabilityI...

An example of a weak entity is Staff because the availabilityID cannot be uniquely identified unless it is used in conjunction with the foreign key known as availabilityID in the A

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

What is a database graph, What is a database graph? The partial orderin...

What is a database graph? The partial ordering implies that the set D may now be viewed as a directed acyclic graph, known as a database graph.

Creating views with check option-data control, Creating views with check op...

Creating views with check option : This option limits those updates of data values that cause records to go off the view. The following instance tells this in more detail: Examp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd