1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
8

Consider the following relation for published books: BOOK (Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher

) Author_affil refers to the affiliation of the author. Suppose the following dependencies exist: Book_title -> Publisher, Book_type Book_type -> Listprice Author_name -> Author-affil (a) What normal form is the relation in? Explain your answer. (b) Apply normalization until you cannot decompose the relations further. State the reasons behind each decomposition.
Computers and Technology
1 answer:
Ivenika [448]3 years ago
8 0

The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

<u>Explanation:</u>

<u> lGiven the relation </u>

<u>l</u>Book(Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher)

land the FDs

lBook_title . Publisher, Book_type

lBook_type . Listprice

lAuthorname .Author_affil

(a) The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

(b) 2NF decomposition:

lBook0(Book_title, Authorname)

lBook1(Book_title, Publisher, Book_type, Listprice)

lBook2(Authorname, Author_affil)

<u> This decomposition eliminates the partial dependencies. </u>

3NF decomposition:

lBook0(Book_title, Authorname)

lBook1-1(Book_title, Publisher, Book_type)

lBook1-2(Book_type, Listprice)

lBook2(Authorname, Author_affil)

l<u>This decomposition eliminates the transitive dependency of Listprice </u>

You might be interested in
What are the uses of computer in educational setting?
Arada [10]

Answer:

Quick Communication & Correspondence

Explanation:

Another main advantage of using computers in the education field is the improvement in the quality of teaching-learning process and communication between students & teachers. For this, they use Microsoft PowerPoint to prepare electronic presentations about their lectures.

8 0
3 years ago
Read 2 more answers
This is due in like an hour but I'm confused so please do lend assistance
blagie [28]
Yes you do have to program it first.
4 0
3 years ago
Give an example of a file suffix for the files created by each of the following: 1) a word processing program 2) a spread sheet
gayaneshka [121]
1) .docx
2) .xlsx
3) .pptx
4) .zip
7 0
3 years ago
Where can a user find available templates and themes in PowerPoint?
jenyasd209 [6]

Can look under the design tab to find a handful of slide themes to choose from including an option to browse from to get a theme that you personally saved.

3 0
3 years ago
Drag each tile to the correct box.
kari74 [83]

Answer:

RESET...

Explanation:

.The file is not Indexed for searches.

.The file can only be viewed.

.The file is ready for backup.

.The file or folder is hidden.

√ Reset

.Next

6 0
3 years ago
Other questions:
  • Unlike artistic drawings, which communicate self-expression and
    15·1 answer
  • You want to create a hyperlink within your document to the sec web site. which type of link do you create?
    9·1 answer
  • You must have an active ____ to test external links.
    5·1 answer
  • Follow up, my brother is upset at me for stealing his robux, what should i do?
    11·2 answers
  • A programmer writes a for statement to count from 1 to 10 and explicitly mentions the 1 and the 10 in the for “header.” which re
    12·1 answer
  • What are the answers to everfi
    5·1 answer
  • What is the purpose of a system call in an operating system?
    10·1 answer
  • Explain the principles of computer applications ​
    11·1 answer
  • What is a port?
    14·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!