Why is it significant to define the primary keys of a file

Assignment Help Computer Engineering
Reference no: EM13469392

Your supervisor has approved your normalized versions of the database. Your team members were given copies. One of the members has sent you an e-mail with the following questions:

Q1. Why are there so many more foreign keys in the third normal form than in the first? Is this always going to be true?

Q2. Why is it important to define the primary keys of a file correctly? What happens to the third normal form when they are incorrectly defined?

Q3. Some designers will say that to make an address file into third normal form, you should take out the city and state, place it into a different table, and link it by zip code. What advantages and disadvantages are there to this?

Q4. When normalizing a table that can have a many-to-many relationship with another table, what steps should you take?

Q5. What are the advantages of third normal form for applications with a lot of changes to the database, such as a data entry program?

Q6. What are the disadvantages of third normal form for an application that does a lot of reporting on a stable database like general ledger month-end reporting?

Assignment Guidelines:

a) Answer the 6 questions outlined in the assignment description.

b) Each answer should be about 1-2 paragraphs.

Reference no: EM13469392

Questions Cloud

How many grams of ca3po42are produced when 4500 g nacl are : given the following balanced chemical equation answer the following questions 3cacl2nbspaq 2
Recognize where the program planning and assessment process : identify where the program planning and evaluation process can provide opportunities for program improvement. explain
Compare the merits and demerits of atm to those of frame : atm and frame relay. please respond to the followingcompare the advantages and disadvantages of atm to those of frame
Peristaltic movement what are peristatic movementand thir : what are peristatic movement?and thir role in human digestion ?process of chylomicrons?special route that lipids follow
Why is it significant to define the primary keys of a file : your supervisor has approved your normalized versions of the database. your team members were given copies. one of the
The sample of material in container is analyzed and it is : a sample of sodium dichromate na2cr2o7 is placed into a container by itself. the sample of material in the container is
Acetylene gas c2h2 is produced by adding water to calcium : acetylene gas c2h2 is produced by adding water to calcium carbide cac2.cac2s 2 h2ol rarr c2h2g 2 caoh2aqdetermine how
The top 3 user interface techniques you recommend by using : after delivering the concepts behind the application system and user interface requirement process the government
Reaction therefore reverses as soon as light is removedif : photochromic sunglasses which darken when exposed to light contain a small amount of colorless agcl embedded in the

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd