1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
14

Consider a relation BOOKS that holds information about the inventory of books (used or new) in a bookstore with attributes (titl

e, isbn, authorName, publisherName, publisherAddress, copyNumber, total- CopiesOrdered, copiesInStock, publicationDate, category, selling Price, cost, condition), as described below.
• All attributes listed above are atomic.
• The ISBN uniquely identifies a book. (However, it does not identify each copy of the book. If the bookstore has many copies of the same book, each copy is given a different copyNumber as described next)
• copyNumber corresponds to a particular copy of a book with a particular ISBN. For example, there may be copyNumber 34 of the book with ISBN = 123478, and copyNumber 34 of the book with ISBN = 987654. • Each book has one publication date. A revision of a book, for example a new edition, is given a new ISBN.
• A book may have more than one author. 3 of 5
• An author may have more than one book. • Each book has one publisher.
• Each publisher name is unique. Each publisher has one address—the address of the firm's national head- quarters.
• Titles are not unique. • totalCopiesOrdered is the number of copies of a particular book that the bookstore has ever ordered, while copiesInStock is the number still unsold in the bookstore.
• condition describes the condition of a particular copy of a book and is one of "excellent", "very good", "good", "fair"
• Each book has one category. The category may be biography, science fiction, poetry, and so on.
• The selling Price, which is the amount the bookstore charges for a book, is always 20 percent above the cost, which is the amount the bookstore paid to acquire the book.

Required:
What is the highest normal form that the BOOKS relation is in? (justify your answer using functional dependencies)

Computers and Technology
1 answer:
Yuri [45]3 years ago
5 0

Answer:

See explaination

Explanation:

Somehing is considered functional dependent (FD) if a relationship between two attributes, typically between the PK and other non-key attributes within a table. For any relation R, attribute Y is functionally dependent on attribute X (usually the PK), if for every valid instance of X, that value of X uniquely determines the value of Y.

Please kindly check attachment for the other details.

You might be interested in
Which of the following refers to the bottom pane of the Wireshark window where all of the information in the packet is displayed
Lorico [155]

Answer:

D) Hex Pane.

Explanation:

Hex Pane  is the bottom pane where whole information in the packet is shown in hexadecimal format on the left and also in character when possible and decimal also.It is the bottom pane of Wireshark window.

So we can say that Hex pane is referred to the bottom pane of the Wireshark window which displays the information in hexadecimal on the left .

5 0
3 years ago
A DTP setup includes many hardware and software components.
QveST [7]

Answer:

Apple Laser Writer is an example of a DTP <u>Hardware.</u>

Explanation:

DTP means Desktop Publishing. It may include the hardware and software. The DTP hardware includes two major parts a computer and a printer. The DTP software includes the software such as Photoshop, illustrator an other software that needs in desktop publishing.

Apple laser writer is a printer that is used to print the text and diagrams that we make using DTP software tools.

7 0
3 years ago
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
3 years ago
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
2 years ago
_________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-sou
Maurinko [17]

Answer:

The correct answer is PGP i.e  "Pretty Good Privacy" .

Explanation:

Pretty Good Privacy is an encryption algorithm that gives the database interaction with the confidentiality and authorization.Pretty Good Privacy is security algorithm which gives the security into the mail . login ,decryption ,encryption are the example of the "Pretty Good Privacy" .

Pretty Good Privacy  is a type of  hybrid cryptosystem that incorporates cryptographic algorithms and it has de facto open source standard for the mail and the file storage .

3 0
3 years ago
Other questions:
  • If you are upgrading your operating system to Windows 7, you may not use the In-Place Upgrade Installation Option with
    14·1 answer
  • What are you guys doing?
    13·2 answers
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • 12. Which one of the following items would you be most likely to keep in a database?
    10·1 answer
  • Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
    7·1 answer
  • Use the ________ method to write text to a web page.
    12·1 answer
  • Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It re
    14·2 answers
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto
    14·1 answer
  • Which of the following number is divisible by 3? (340 , 432 , 113)​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!