1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
4 years ago
12

Normalize the following relation:

Computers and Technology
1 answer:
lora16 [44]4 years ago
5 0

Answer:

Hi Riahroo! This is a good question on the concept of relational databases.

We can normalize the relations as follows:

Flight

(flightnumber (unique), flighttime, airline_id, departure_city, arrival_city,  passenger_id, pilot_id, airplane_id)

has_one_and_belongs_to :airline

has_many :passengers

has_one :pilot

Itinerary(passenger_id, flight_id)

Belongs_to  

Passenger_details  

(passengername (unique), gender, date_of_birth)

has_many :flights

Pilot

(pilotname (unique), gender, date_of_birth)

has_many :flights

airline(airlinename)

airplane(planeID, type, seats))

Explanation:

To normalize a relation, we have to remove any redundancies from the relationships between database objects/tables and simplify the structure. This also means simplifying many-to-many relationships. In this question, we see there is a many-to-many relationship between flights and passengers. To resolve this we can introduce a join table which simplifies this relationship to a one-to-many between the objects.  

You might be interested in
Difrent between computer and computer system​
vampirchik [111]

Answer:

hope it helps..

Explanation:

a computer exists in a single place and does a primitive set of functions. A computer system combines a computer with many other things to perform a complex set of functions. It can also exist in a single place, but it may exist in many places at the same time.

HAVE A NICE DAY

3 0
3 years ago
State the difference between = and ==
Annette [7]

Answer:

= is an Assignment Operator it is used to assign the value of variable or expression, while == is an Equal to Operator and it is a relation operator used for comparison

8 0
4 years ago
Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
Mrac [35]

Answer:

Directive

Explanation:

A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.

7 0
4 years ago
What is the purpose of a career portfolio?
morpeh [17]

Answer:

To provide relevant information in a job interview

Explanation:

4 0
3 years ago
Marla wants to transfer photos from her digital camera to her computer. She has plugged the camera's cord into the USB port. Wha
QveST [7]
She needs to make sure the camera is on and working, if she doesn't than it wont tranfer
3 0
3 years ago
Read 2 more answers
Other questions:
  • All languages from the second generation on must be translated into machine language for the computer to be able process the inp
    8·1 answer
  • zeroIt is a function that takes one argument and returns no value. The function stores the value 0 back into the parameter. x is
    8·1 answer
  • The accessibility of a website refers to which of
    6·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • Write a method called printRange that accepts two integers as arguments and prints the sequence of numbers between the two argum
    6·1 answer
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • Which of the following actions is an example of "window dressing?" a. Using some of the firm’s cash to reduce long-term debt. b.
    13·1 answer
  • How would you build a robot
    7·2 answers
  • How should tools be stored <br>​
    13·1 answer
  • Which type of boot authentciation is more secure?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!