1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
12

Consider the following relation:CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt)Assume that a car may be sold

by multiple salespeople, and hence{Car#, Salesperson#}is the primary key. Additional dependencies areDate_sold ? Discount_amtSalesperson# ? Commission%Based on the given primary key, is this relation in 1NF, 2NF, or 3NF? Why or whynot? How would you successively normalize it completely?
Computers and Technology
1 answer:
GalinKa [24]3 years ago
5 0

Answer:

The answer to this question can be given as:

Normalization:

Normalization usually includes the division of a table into two or more tables as well as defining a relation between the table. It is also used to check the quality of the database design. In the normalization, we use three-level that are 1NF, 2NF, 3NF.

First Normal Form (1NF):

In the 1NF each table contains unique data. for example employee id.  

Second Normal Form (2NF):

In the 2NF form, every field in a table that is not a determiner of another field's contents must itself be a component of the table's other fields.

Third Normal Form (3NF):

In the 3NF form, no duplication of information is allowed.

Explanation:

The explanation of the question can be given as:

  • Since all attribute values are single atomic, the given relation CAR_SALE is in 1NF.  
  • Salesperson# → commission% …Given  Thus, it is not completely dependent on the primary key {Car#, Salesperson#}. Hence, it is not in 2 NF.                                                                                                        

The 2 NF decomposition:

        CAR_SALE_1(Car#, Salesperson#, Date_sold, Discount_amt)

         CAR_SALE_2(Salesperson#, Commission%)

  • The relationship in question is not in 3NF because the nature of a transitive dependence occurs
  • Discount_amt → Date_sold → (Car#, Salesperson#) . Thus, Date_sold is neither the key itself nor the Discount amt sub-set is a prime attribute.  

The 3 NF decomposition :

        CAR_SALES_1A(Car#, Salesperson#, Date_sold)

        CAR_SALES_1B(Date_sold, Discount_amt)

        CAR_SALE_3(Salesperson#, Commission%)

You might be interested in
What is six data type used in MS Access ​
Alika [10]
Alphanumeric data, date/time, Numeric data, Currency, Lookup Wizard, Attachment.

4 0
3 years ago
In Black friday 2019 how much percentage of a cut did asus or msi did on gaming laptops did they do 50% off or?
astraxan [27]

Answer:

yes they do 50% off

Explanation:

7 0
3 years ago
Anti-bullying laws in most states are designed to provide
Vera_Pavlovna [14]

Answer:

to protect children enrolled in kindergarten, elementary, and secondary schools and learning centers ( from being bullied. It requires Schools to adopt policies to address the existence of bullying in their respective institutions.

Explanation:Hope this helps pls mark brainliest!

6 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
How is primary storage different from secondary storage? Select the TWO correct statements.
Zina [86]
Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.
7 0
3 years ago
Other questions:
  • help users calculate their car miles per gallon. write a program to allow a user to enter the number of miles driven and the num
    15·1 answer
  • A critical piece of equipment that provides power to systems even during a black out is called a(n) _______________.
    14·1 answer
  • A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
    13·1 answer
  • What is the purpose of an index page feature in a Word document? Check all that apply.
    6·2 answers
  • You want to boot a linux system into singer user mode/ what options might you add to a linux kernel options list in a boot loade
    9·1 answer
  • Macro photographs are what type of photographs? A. Close-up B. Telephoto C. Abstract D. All of the above
    14·1 answer
  • You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Altho
    10·1 answer
  • Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of
    5·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!