1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
13

Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs, assuming those are the only

dependencies that hold for R, do the following: (a) Identify the candidate key(s) for R. (b) Identify the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF). (c) If R is not in BCNF, decompose it into a set of BCNF relations that preserve the dependencies.
1. C → D, C → A, B → C
2. B → C, D → A
3. ABC → D, D → A
4. A → B, BC → D, A → C
5. AB → C, AB → D, C → A, D → B
Computers and Technology
1 answer:
Mkey [24]3 years ago
8 0

Solution :

1.

a). Candidate keys : $B$

b). R is in $2F$ but not $3NF$

c). C → $D$ and C → $A$, both causes violations of $BCNF$. The way to obtain the join preserving decomposition is to decompose $R$ into $AC, BC$ and CD.

2.

a). Candidate keys : $BD$

b). $R$ is in $1NF$ but not $2NF$.

c). Both B → $C$ and D → $A$ cause $BCNF$ violations. The decomposition : $AD $, $BC, BD$ is $BCNF$ and lossless and the join preserving.

3.

a). Candidate keys : $ABC, BCD$

b). R is in $3NF$ but not $BCNF$

c).$ABCD$ is not in $BCNF$ since D → $A$ and $D$ is not a key. But if we split up the $R$ as $AD,BCD$ therefore we cannot preserve dependency $ABC$ → D. So there is no $BCNF$ decomposition.

4.

a). Candidate keys : $A$

b). R is in $2NF$ but not $3NF$

c). BC → $D$ violates $BCNF$ since $BC$ does not contain the key. And we split up R as in $BCD, ABC$.

5.

a). Candidate keys : $AB, BC, CD, AD$

b). $R$ is in $3NF$ but not $BCNF$.

c). C → $A$ and D → $B$ both causes a violations. The decomposition into $AC,BCD$ but this will not preserve $AB$ → C and $AB$ → D, and $BCD$ is still not $BCNF$ because $D$ → $B$. So we need to decompose further into $AC,BD,CD$ However when we try to revive the lost functional dependencies by adding $ABC$ and $ABD$, we that these relations are not in $BCNF$ form. Therefore, there is no $BCNF$ decomposition.

You might be interested in
Write a short program using Python that will:
Alexxx [7]

Answer:

// program in Python to check perfect number

#function to find number is perfect or not

def is_Perfect_Number(n):

   #total variable

   tot = 1

   i = 2

   #sum of all divisor of number

   while i*i<=n:

       if n%i==0:

           tot = tot + i + n/i

       if tot == n and n != 1:

           return 1

       i = i+1  

   return 0

#read until user enter a perfect number

while True:

   #read integer

   num = int(input("Input an integer: "))

   #call the function

   if(is_Perfect_Number(num)):

       print(num,"is perfect number")

       #if perfect number break

       break

   else:

       print(num,"is not a perfect number")

       #ask again

   print("try again.")

Explanation:

Read number from user and then call the function is_Perfect_Number() with  parameter "num".This will find the sum of all divisor of number.If sum is  equal to number then it will return 1 else return 0.If the number is not  perfect then it will again ask to enter a number until user enter a perfect  number.

Output:

Input an integer: 24

24 is not a perfect number                                                                                                

try again.                                                                                                                

Input an integer: 28                                                                                                      

28 is perfect number

6 0
3 years ago
Can run mobile-style apps in the area known as the start screen, while running traditional software in the more familiar desktop
Travka [436]
The correct answer: Yes, mobile-style apps can run in a personal computer's desktop.

That is possible by means of a desktop application called emulatator. An emulator like Bluestacks allows a personal computer to run mobile-style apps by acting as a virtual drive in the personal computer's harddisk. 

Emulation is successful if the system requirements of the mobile-application is met by the personal computer's system attributes such as Random Access Memory abundance, Random Access Memory speed, Processing speed (in some cases core abundance e.g. core 2) etc. 

Some mobile-applications do not work in the personal computer's desktop, however, if this application requires platform specific functions such as mobile device's network provider etc.
4 0
4 years ago
Convert to binary 140
Ber [7]

00110001 00110100 00110000

5 0
4 years ago
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle i
pochemuha
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
3 0
4 years ago
Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
andreyandreev [35.5K]
Self documenting, we also make comments.
3 0
3 years ago
Other questions:
  • What's the code?
    6·1 answer
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • Corey is an architect. What software does he most likely use to design houses? graphic software scheduling software CAD software
    10·2 answers
  • Explique si en la pc que se usa para hacer las tareas escolares se puede ver un video juego de los llamados “pesados”
    13·1 answer
  • What is a single-user computer?
    8·1 answer
  • Why is it difficult to convince top management to commit funds to develop and implement a Strategic Information System
    13·1 answer
  • PLEASE ANSWER!! If my pixel has an RGB value of (R - 150, G - 0, B - 100), what is the dominant value? Why?
    14·1 answer
  • Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
    9·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
  • Add comma(s) where needed, if needed.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!