1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
3 years ago
10

Consider the relation Courses(C, T, H, R, S, G), whose attributes can be thought of informally as course (C), teacher (T), hour

(H), room (R), student (S), and grade (G). Let the set of FD’s for Courses be C →T, HR →C, HT →R, HS →R, and CS →G.
Intuitively, the first says that a course has a unique teacher, and the second says that only one course can meet in a given room at a given hour. The third says that a teacher can be in only one room at a given hour, and the fourth says the same about students. The last says that students get only one grade in a course.
(a) What are all the keys for Courses?
(b) Verify that the given FD’s are their own minimal basis.
(c) Use the 3NF synthesis algorithm to find a lossless-join, dependency preserving decomposition of R into 3NF relations. Are any of the relations not in BCNF?
Computers and Technology
1 answer:
k0ka [10]3 years ago
3 0

Answer and Explanation:

a) Key for the relation courses is HS.

b) FD's are already minimal basis, as no attributes can be removed from the left side, right side is having only single attributes and none of the FD can be removed as given in the question.

c) By using the 3NF synthesis algorithm, the final set of relations obtained will be CT, HRC, HTR, HSR, CSG (FD'S are already proved to be minimal basis in part (b)). All the relations are in BCNF.

You might be interested in
Blogs differ from most other online text sources because they
allochka39001 [22]
Tell you what a person's life is like
4 0
3 years ago
Read 2 more answers
How many binary digits are in 10^100.
Basile [38]

Answer:

333 binary digits.

Explanation:

8 0
2 years ago
What do we call exceptions to the exclusive rights of copyright law?
Studentka2010 [4]

Answer:

Fair use

Explanation:

I don't know if this is correct but Its the best option.

4 0
3 years ago
Given public class Fishing { byte b1 = 4; int i1 = 123456; long L1 = (long) i1; //Line A short s2 = (short) i1; //Line B byte b2
Aleksandr [31]

Answer:

Line E.

Explanation:

The  given program is as follows:

public class Fishing {

   byte b1 = 4; int i1 = 123456; long L1 = (long) i1;   //Line A

   short s2 = (short) i1;     //Line B

   byte b2 = (byte) i1;     //Line C

   int i2 = (int)123.456;    //Line D

   byte b3 = b1 + 7;     //Line E

   }

In the above code Line E will not compile and give following compilation error:

error: incompatible types: possible lossy conversion from int to byte

This error is coming because in Java b1 + 7 will be interpreted as int variable expression. Therefore in order to make code of Line E work the expression should be type casted as byte.  

The correct code will be as follows:

public class Fishing {

   byte b1 = 4; int i1 = 123456; long L1 = (long) i1;   //Line A

   short s2 = (short) i1;     //Line B

   byte b2 = (byte) i1;     //Line C

   int i2 = (int)123.456;    //Line D

   byte b3 = (byte)(b1 + 7);     //Line E

   }

5 0
3 years ago
How do you take a screenshot on a Samsung tablet<br>​
kirill [66]

Explanation:

to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds

5 0
2 years ago
Other questions:
  • How can you find Web pages that contain news published during the past week?
    8·1 answer
  • While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using
    5·2 answers
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • Which of the following is not one of the steps a company would take in an attempt to prevent a malfunction or failure of their p
    7·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • Which of these are examples of an access control system? Check all that apply.
    7·1 answer
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
  • joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm h
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!