Does this decomposition have a lossless join

Assignment Help Basic Computer Science
Reference no: EM133268340

Assignment:

The following are attributes in spreedsheet, none of which are null:

Manufacturer, Model_Num, Serial_Num, Description, Store, PurchaseDate, Price

Each row in this spreadsheet corresponds to a computer that they own.

1. Give a minimal set of functional dependencies F that hold for this schema assuming only that:

?The manufacturer, model number and serial number uniquely identify the store, purchase date and price;

?The description of a computer is determined by the manufacturer and model number -- in particular, it does not vary depending on the store in which the computer was bought or the serial number of the computer.

2. What is the key of your relation? Prove this by showing that the closure of the set of attributes in the key includes all attributes.

Now suppose that you decompose into R1 (Manufacturer, Model_Num, Serial_Num, Store, PurchaseDate, Price), R2(Manufacturer, Model_Num, Description).

3. Does this decomposition have a lossless join? Why or why not?

4. What is the projection of F over R1? The projection of F over R2? Does the decomposition preserve dependencies (and say why)?

Reference no: EM133268340

Questions Cloud

What are organized crime organizations reporting structures : What are the terrorist and organized crime organizations' reporting structures and communication strategies?
What is the definition of deviance : What is the definition of deviance? What is the definition of crime? What is the definition of delinquency?
What is a mental health court : What is a Mental Health Court? What types of individuals participate in Mental Health Courts?
Define abstraction : Define abstraction. What are the main models of a database and what do they represent? How is abstraction applied to database models?
Does this decomposition have a lossless join : Now suppose that you decompose into R1 (Manufacturer, Model_Num, Serial_Num, Store, PurchaseDate, Price), R2(Manufacturer, Model_Num, Description).
Is it possible for steve to reveal contents of ryan message : Steve is eavesdropping on the communication between Ryan and Kevin. Is it possible for Steve to reveal the contents of Ryan's message?
How would a stack canary be against a heap overflow attack : How effective would a stack canary be against a heap overflow attack? Explain your answer.
Create a typical screensaver program : These shapes should move across the screen and reverse direction when they hit the edge of the screen.
Differences between the static-dynamic schedules in openmp : Explain the differences between the static and dynamic schedules in OpenMP. Use an example of "omp for" to describe the differences between them.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Components of each directory service

Discussing the key features and components of each directory service and how those components would best be applied for your corporation.

  What is the probability that a randomly selected

Suppose that the incubation times are approximately normally distributed with a standard deviation of 1 day.

  What was the penalty

In what way did the plagiarized work impact others? What was the penalty?

  Voltage for the source as a percentage

A dc source of strength 6 volts is driving a load whose resistance varies from two to twenty ohms. Compute the variation in terminal voltage for the source as a percentage. Take the source resistance as two ohms.

  Variables are violent crime

Data were gathered from a simple random sample of cities. The variables are Violent Crime? (crimes per? 100,000 population), Police Officer Wage?

  Differences between Windows-Linux and the MAC OS X

Create an infographic, table, or chart listing the similarities and differences between Windows, Linux, and the MAC OS X.

  Real business value and staying power

Discuss how you can differentiate between a fly-by-night product or approach and one with real business value and staying power.

  Calculate an effect size as well as post hoc power

Calculate an effect size as well as post hoc power. Then write an APA-style paragraph reporting your results.

  Write a client and a server that permit client to execute

See the implementation of system() in Section 27.7 for an example of how to execute a shell command. By using dup2() to duplicate the socket on standard output and standard error, the execed command will automatically write to the socket.

  Formation of expectations and long-term rates

What are the effects of the recent rise in risk and uncertainty on the formation of expectations and long-term rates?

  Compare the file-per-process and shared-file access patterns

Compare the file-per-process and shared-file access patterns. Pros and cons.

  Analysis of zara operation/business model in particular it

Analysis of Zara operation/business model in particular IT in light of economic theory of efficiency of organisations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd