Duplicate-preserving projection

Assignment Help Computer Engineering
Reference no: EM133218556

Question: Consider the following SQL query over tables R(A), S(A), and T (A). Note that "Select Distinct" in SQL represents a duplicate-eliminating projection.

Select Distinct R.A

From R, S, T

Where R.A = S.A and R.A = T.A

If we have a table with R(A, B) tuples {{1, a}, {1, b}, {2, c}, {3, d}, {4, e}, {4, f }}, then a duplicate-preserving projection on R.A will return {1, 1, 2, 3, 4, 4}, while a duplicate-eliminating projection on R.A will return {1, 2, 3, 4}.

Figures 1(a)-(e) show five logical plans. The logical operator π in Figure 1 represents a duplicate-eliminating projection. For example, πR.A represents a duplicate-eliminating projection of attribute R.A. On the other hand, the logical operator τ represents a duplicate-preserving projection. The logical operator represents a natural join. Assume that, in the general case, R, S, and T can contain duplicate tuples.

1. Is the logical plan in Figure 1(a) equivalent to the logical plan in Figure 1(b)? (Equivalent means that they produce the same query result.) If not, what is the minimal set of properties on the tables such that these plans are equivalent?

2. Is the logical plan in Figure 1(a) equivalent to the logical plan in Figure 1(c)? If not, what is the minimal set of properties on the tables such that these plans are equivalent?

3. Is the logical plan in Figure 1(a) equivalent to the logical plan in Figure 1(d)? If not, what is the minimal set of properties on the tables such that these plans are equivalent?

4. Is the logical plan in Figure 1(a) equivalent to the logical plan in Figure 1(e)? If not, what is the minimal set of properties on the tables such that these plans are equivalent?

Reference no: EM133218556

Questions Cloud

Compare and contrast Swimply from AirBnb : Part 2 - Research Swimply.com (an online marketplace for renting a private swimming pool). Compare and contrast Swimply from AirBnb
Show the least-cost alignment : Show the least-cost alignment (cost plus properly aligned strings) on this page. (There is a third part of the question on the next page.)
Perform a system investigation : Perform a system investigation and analyze the system to determine the requirements (operational, functional, hardware, software, input, process, output, etc.)
Identify and describe four stages of criminal investigation : Identify and describe the four stages of criminal investigation and Identify the three types of crimes documented in this chapter, and give examples of each
Duplicate-preserving projection : Duplicate-preserving projection on R.A will return {1, 1, 2, 3, 4, 4}, while a duplicate-eliminating projection on R.A will return {1, 2, 3, 4}.
Create two sequence diagrams : Create two Sequence Diagrams that describe the following Use Cases for the Hometown Credit Union and create the Sequence Diagrams above, also update your
Explain the Multicontextual Life Cycle Framework : In this assignment, you will explain the Multicontextual Life Cycle Framework. Complete the "Multicontextual Life Cycle Framework" worksheet
How will split up key management functions of planning : How will you split up the key management functions of planning, organizing, leading, and controlling?
Developing a java swing gui that displays time : Developing a Java Swing GUI that displays time, traffic signals and other information for traffic analysts.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How could you integrate specific counseling interventions

How could you integrate specific counseling interventions (CBT, MI, SF) that target triggers into both inpatient and outpatient treatment.

  How would you apply the three concepts you identified

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.

  Describe briefly one federal law related to privacy

You got hired as an IT security manager at the Sunshine Hotel and you have been asked by the general manager to conduct a presentation about data privacy.

  Prepare a modification of the encryption program

Prepare a modification of the encryption program of 15.5 whose transform function uses an integer key to transform the character passed to it.

  Write an encryption and decryption program

Write an encryption and decryption program. Encrypt each digit by adding 7 and taking the remainder after division by 10.

  Define the first two parameters so that they are modifiable

Write a function read_list() which prompts for the list of non-negative numbers terminated by -99.

  How to implement a stack using a vector

We showed how to implement a stack using a vector, which has an array as its underlying data structure.

  Describe the problem at ifg as succinctly

Describe the problem at IFG as succinctly as you can. Use this description to identify the main stakeholders. IFG can't afford the resources to identify.

  What is the size of each individual direct-mapped cache

What is the size of each individual direct-mapped cache? Give your answer in address space x addressability form.

  Calculate the base pay according to the appropriate salary

Compute the weekly pay for each employee at the Wahoo Widget Company. Calculate the base pay according to the appropriate salary category.

  Create a cybercrime mitigation plan using given details

As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Mitigation Plan. The overall cybercrime mitigation plan should be written.

  ITECH 7400 IT Service Management & Professional Culture

ITECH 7400 IT Service Management & Professional Culture Assignment Help and Solution, Federation University - Assessment Writing Service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd