1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
9

Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and

book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.
Computers and Technology
1 answer:
sdas [7]3 years ago
8 0

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

You might be interested in
2) A language that changes code to machine-readable code one command at a time is known as what
iogann1982 [59]

Answer:

2) Interpreted programming languages (e.g. Python, Perl)

3) In computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. That means that the each programing language has its own specific rules.

4) Pseudocode

5) Cryptographic coding, examples: The Caesar shift, Kryptos

5 0
3 years ago
Computer program allowing the computer to communicate<br> with a hardware device
Airida [17]

Answer:The software that allows a computer to communicate with hardware devices is referred to by the general term known as 'Drivers.

Explanation:Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of the Internet and the true language computers use to talk to each other. Essentially it's a set of standards for sending information from a computer's network card, through transmission lines to another network card.

8 0
3 years ago
During execution of main(), how many user-defined methods are called? a) public static double calcTax(double cost) { return cost
Dovator [93]

Answer:

b) public static double calcShippingCost(double weight) { double cost; if(weight < 10) { cost = 10.0; }else{ cost = 15.5; } cost = cost + calcTax(cost); return cost; }

The method is called twice with arguments 7.5 and 17.5 respectively.

Explanation:

The Java program defines three user methods including the main. In the main, the calShippingCost method is called twice with 7.5 and 17.5 respectively to return double number values to cost1 and cost2.

8 0
3 years ago
Explain how the use of the internet has allowed people to achieve some
zubka84 [21]

I don't know if this is going to help you or not because I'm only 13 but let me know if it helps people can now talk to one another more effectively because of things like zoom and it's become more efficient to work at home because we can have online meetings

5 0
3 years ago
Anyone free to inbox me plz....​
MArishka [77]

Answer:

To message you? Here is my alt number (240-918-2355) you can text me if you want ¯\_(ツ)_/¯

8 0
3 years ago
Read 2 more answers
Other questions:
  • An administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server
    12·1 answer
  • This list represents the horses leading in a race: leadHorses ← ["Justify", "Bravazo", "Good Magic", "Tenfold", "Lone Sailor", "
    7·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·1 answer
  • 1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force
    8·1 answer
  • Which entity might hire a Computer Systems Analyst to help it catch criminals?
    12·2 answers
  • Write a 2-to-3-page research paper describing in plain language the basic purpose, theory, and implementation of GUI application
    6·1 answer
  • Which navigation icon would you click on to add a new Contact?
    14·2 answers
  • Explain the history of computing device of mechanical era
    7·1 answer
  • Polynomial regression A common misconception is that linear regression can only be used to fit a linear relationship. We can fit
    11·1 answer
  • Can you show me how to code this is GDBonline? explaining each statement with notes//
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!