What errors prevent the table displayed

Assignment Help Basic Computer Science
Reference no: EM13948128

Exam 1: Normalization

Part 1

Use the following table to answer questions 1 and 2:

Table: BOOK-DETAIL

BookID**

GenreID

GenreDesc

Price

1

1

Gardening

25.99

2

2

Sports

12.99

3

1

Gardening

10.00

4

3

Travel

14.99

5

2

Sports

17.99

**Primary key

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form

 

  • Describe or illustrate how you would correct the normalization error, if one is present.

Use the following table to answer questions 3 and 4:

Table: BOOKS

Book-Code**

Title

Price

Pub-Code**

Publisher

City

0180

Shyness

7.65

BB

Bantam Books

Boston

0189

Kane and Able

5.55

PB

Pocket Books

New York

0200

The Stranger

8.75

BB

Bantam Books

Boston

0378

The Dunwich Horror

19.75

PB

Pocket Books

New York

079X

Smokescreen

4.55

PB

Pocket Books

New York

**Primary Key

What, if any normalization error is present in the table?

    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.
  • Use the following table to answer questions 5 and 6:

Table: PRODUCT

ProductID**

Color

Price

1

Red, Green

15.99

2

Yellow

13.99

3

Green

22.99

4

Yellow, Blue

17.50

5

Red

19.99

**Primary key

 

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.

Use the following table to answer questions 7 and 8:

Table: PURCHASE-DETAIL

CustomerID**

StoreID**

StoreLocation

1

1

Los Angeles

1

3

San Francisco

2

1

Los Angeles

3

2

New York

4

3

San Francisco

*Primary key

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.

Use the following table to answer questions 9 and 10:

Table: BOOK-LOCATION

BookID**

BranchID**

Quantity-on-Hand

1

5W

4

1

3E

6

2

5W

3

3

5W

5

3

2S

4

**Primary key

  • What, if any normalization error is present in the table?
    • None
    • First Normal Form
    • Second Normal Form
    • Third Normal Form
  • Describe or illustrate how you would correct the normalization error, if one is present.

Part 2

Use the following table to answer questions 11 through 16.

Order ID

Order Date

Customer ID

Customer Name

Product ID

Product Desc.

Product Price

Quantity Ordered

1006

10/24/10

2

Value Furniture

7

 

5

 

4

Dining Table

Writers Desk

Entertain Center

800.00

 

325.00

 

650.00

2

 

2

 

1

1007

10/25/10

6

Furniture Gallery

11

 

4

4 Drawer Dresser

Entertain Center

500.00

 

650.00

4

 

3

  • What errors prevent the table displayed above from being first normal form compliant?
  • Bring the table(s) into first normal form compliance without loss of any data. Identify primary and foreign keys (when present) for all tables.
  • What error(s), if any, prevent the now first normal form compliant table or tables from being second normal form compliant?
  • Bring the table(s) into second normal form compliance without loss of any data. Identify primary and foreign keys. Be sure to present all tables, not just those changed in this step of the normalization process.
  • What error(s), if any, prevent the now second normal form compliant table or tables from being third normal form compliant?
  • Bring the table(s) into third normal form compliance without loss of any data. Identify primary and foreign keys. Be sure to present all tables, not just those changed in this step of the normalization process.

Reference no: EM13948128

Questions Cloud

Calculate the target cost for expanding the market share : Calculate the target cost for expanding the market share by 20 percent, assuming that the per-unit profitability is maintained as requested by the CEO.
Explain what a sequential access file is. : What are the advantages and disadvantages of using sequential access data files?
Critically evaluate these comments : Critically evaluate these comments. Please do not wander; concentrate on the issues described in the quotation.
Modify the c program so that user inputs the purchase amount : Modify the C program so that the user inputs the purchase amount. Check the user's input for validity. In addition to calculating the sales tax for each location, calculate and display the total sale amount for each location.
What errors prevent the table displayed : What errors prevent the table displayed above from being first normal form compliant?Bring the table(s) into first normal form compliance without loss of any data. Identify primary and foreign keys (when present) for all tables.
Maximum total deflection : A helical spring is to be constructed from a 4340 steel. The design calls for 5 coils, a coil-to-coil diameter of 12 mm, and a wire diameter  of  3  mm. Furthermore, a  maximum total deflection of 5.0 mm is possible without any plastic deformation..
Square cross section of edge length : A bar specimen having a square cross section of edge length c is subjected to a uniaxial tensile force F, as shown in the fol- lowing figure. Derive strength and stiffness performance index expressions analogous to Equations 22.9 and 22.11 for thi..
Children from the area who attend the school : So there are no minority children from the area who attend the school. Can the school qualify for tax exempt status under Section 501 (c) (3)? Why or why not?
Determine best choice of expiration date for the green b : If. for practical reasons. you had to choose only one model to use to set the expiration dates, which would it be? (There is no health risk involved. It's a flavor quality thing.) Why would you choose this model?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a class that simulates an alarm clock

create a class that simulates an alarm clock. In this class you should *store time in hours, minutes, and seconds. Note if time is am or pm. (hint: you should have separate private members for the alarm and the clock.

  Determine present worth-future worth of soldering machine

The initial cost is in week 0 and the payments are in years 1-4. Determine the present worth, future worth, and annual worth for.

  What is the resulting ciphertext

Consider WEP for 802.11. Suppose that the data is 10101010 and the keystream is 11110111. What is the resulting ciphertext?

  What type of damage these computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Given a coin such that the probability of observing heads

given a coin such that the probability of observing heads is ph=.4 and the probability of tails is pt=.6 compute the probability of observing 3 heads after 7 tosses.

  Discuss any two major security flaws in us or anywhere

Discuss any two major security flaws in US or anywhere, one of which is a violation of Integrity, while the other is a violation of Confidentiality, with clear explain.

  Describe the legal requirements and ethical issues

Determine the expected results from tests and research based on the specific informational details provided and describe the legal requirements and ethical issues involved

  The provided assignment submission attach file

Screenshot File Submission: You must submit the screenshot file(s) using the provided Assignment Submission Attach File function located in the Blackboard online course shell. To access Assignment Submission Attach File function, you must select the ..

  Cpu training

What kinds of tools would be considered media for computer-based training?

  Analyze the impact of economic on development of it

Analyze the impact of economic factors on the development of IT strategy decisions at the enterprise level of the organization.

  Signed-magnitude representations binary numbers in computers

Why do we require signed-and-magnitude representations of binary numbers in computers? Represent decimal values: -37, -54, and 56 in binary by using signed-and magnitude representation.

  Table shows pairs of transaction latency and processing rate

Assume a quad-core computer system can process database queries at a steady state rate of requests per second. Also assume that each transaction takes, on average, a fixed amount of time to process. The following table shows pairs of transaction late..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd