1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
13

Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs, assuming those are the only

dependencies that hold for R, do the following: (a) Identify the candidate key(s) for R. (b) Identify the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF). (c) If R is not in BCNF, decompose it into a set of BCNF relations that preserve the dependencies.
1. C → D, C → A, B → C
2. B → C, D → A
3. ABC → D, D → A
4. A → B, BC → D, A → C
5. AB → C, AB → D, C → A, D → B
Computers and Technology
1 answer:
Mkey [24]3 years ago
8 0

Solution :

1.

a). Candidate keys : $B$

b). R is in $2F$ but not $3NF$

c). C → $D$ and C → $A$, both causes violations of $BCNF$. The way to obtain the join preserving decomposition is to decompose $R$ into $AC, BC$ and CD.

2.

a). Candidate keys : $BD$

b). $R$ is in $1NF$ but not $2NF$.

c). Both B → $C$ and D → $A$ cause $BCNF$ violations. The decomposition : $AD $, $BC, BD$ is $BCNF$ and lossless and the join preserving.

3.

a). Candidate keys : $ABC, BCD$

b). R is in $3NF$ but not $BCNF$

c).$ABCD$ is not in $BCNF$ since D → $A$ and $D$ is not a key. But if we split up the $R$ as $AD,BCD$ therefore we cannot preserve dependency $ABC$ → D. So there is no $BCNF$ decomposition.

4.

a). Candidate keys : $A$

b). R is in $2NF$ but not $3NF$

c). BC → $D$ violates $BCNF$ since $BC$ does not contain the key. And we split up R as in $BCD, ABC$.

5.

a). Candidate keys : $AB, BC, CD, AD$

b). $R$ is in $3NF$ but not $BCNF$.

c). C → $A$ and D → $B$ both causes a violations. The decomposition into $AC,BCD$ but this will not preserve $AB$ → C and $AB$ → D, and $BCD$ is still not $BCNF$ because $D$ → $B$. So we need to decompose further into $AC,BD,CD$ However when we try to revive the lost functional dependencies by adding $ABC$ and $ABD$, we that these relations are not in $BCNF$ form. Therefore, there is no $BCNF$ decomposition.

You might be interested in
_____ is a predefined format used for text the can include multiple font formatting features
seraphim [82]
The correct answer is



style
8 0
3 years ago
How do you delete a slide from your presentation after selecting it
Sergeeva-Olga [200]
Use your right clicker and it should pop up as delete slide

6 0
4 years ago
Describe the operation of IPv6 Neighbor Discovery. ​
max2010maxim [7]
Can you give me the link to an article about this so i may help?
6 0
3 years ago
Which of the following are examples of IT careers? Check all of the boxes that apply.
krek1111 [17]

<u>Answer:</u>

  1. <em>software engineer </em>
  2. <em>hardware engineer </em>
  3. <em>systems analyst </em>
  4. <em>database administrator </em>
  5. <em>computer support specialist</em>

<u>Explanation:</u>

  • <em>Software engineer:</em> This deals with the application development where engineers develop application related to system software and application software which is used for commercial purposes.
  • <em>Hardware engineer:</em> Deals with problem in the hardware viz keyboard, mouse, mother board and other internal parts and also with network.
  • <em>Systems analyst: </em>This is once again a profession which deals with the internal problems of the system and also to install softwares and troubleshoot if issues arise.
  • <em>Database administrator: </em>Maintains the database, fix errors, monitor data, etc
  • <em>Computer support specialist:</em> The responsibility depends on the company and it will be similar to a clerical role.

Lawyer  This option is irrelevant

5 0
4 years ago
Read 2 more answers
Then create a new Java application called "StringSlicer" (without the quotation marks) that uses methods to:
anyanavicka [17]

Answer:

See the explanation section

Explanation:

import java.util.*;

//The above statement is to import the Scanner and ArrayList class

public class StringSlicer {

   public static void main(String args[]) {

   Scanner scan = new Scanner(System.in);

   System.out.println("Enter your string: ");

   String inputString = scan.nextLine();

   

   ArrayList<Character> stringList = new ArrayList<Character>();

   for(int i = 0; i < inputString.length(); i++){

           stringList.add(inputString.charAt(i));

       }

       

   for(Character letter: stringList){

           System.out.println(letter);

       }

   }

}

5 0
4 years ago
Other questions:
  • You work at a computer repair store. You just upgraded the processor (CPU) in a customer's computer. The computer starts, but it
    11·2 answers
  • A Windows systems administrator should use the Administrator account ________.a. As little as possible, and only when needed b.
    15·1 answer
  • Which internet explorer 11 feature enables it to correctly display pages that were developed using older technologies?
    14·1 answer
  • Each of the major DBMS products changes quite rapidly, and keeping DBMS software up-to-date can be a difficult task. As a DBA, w
    14·1 answer
  • Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
    11·1 answer
  • Which is the output of the formula =NOT(12+12=24) ?
    7·1 answer
  • Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti
    10·1 answer
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!