database, Database Management System

Assignment Help:
3. (10 points) Assume that you have been presented with the following relation for the Baxter Aviation database:

Charters (Pilot#, Pilot name, Aircraft ID#, #seats, Village, Flight#, Flight date, Flight time, Customer#, Customer name)

(a) How many entities are represented by this relation?

(b) What is the primary key of this relation? (Hint: Flight# is unique; flight numbers do not repeat as they do on commercial airlines with regularly scheduled flights. Each flight can go to many villages and over time a village can receive many flights.)


(c) Give a specific example of one insertion anomaly present in this relation.

(d) Give a specific example of one deletion anomaly present in this relation.

(e) Is this relation in first, second, or third normal form? Why?

Related Discussions:- database

What are the drawbacks of shadow-paging technique, What are the drawbacks o...

What are the drawbacks of shadow-paging technique? The drawbacks of shadow paging is:- a) Commit Overhead b) Data fragmentation c)  Garbage collection

What is data defination language, What is DDL? Make a list of commands with...

What is DDL? Make a list of commands with short description used in DDL Ans: Data Definition Language that is abbreviated as DDL is a computer language for defining data struct

Define shadow paging, Define shadow paging. An alternative to log-based...

Define shadow paging. An alternative to log-based crash recovery method is shadow paging. This technique requires fewer disk accesses than do the log-based methods.

Describe log based recovery, Describe log based recovery The most usabl...

Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i

Give short note on the following terms- dirty pages and etl, Give short not...

Give short note on the following terms:Dirty pages and ETL a.) Dirty pages. These are buffer pages which comprise modifications which haven't been written to disk. b.

Relationship between security and integrity, Relationship between Security ...

Relationship between Security and Integrity: Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually

Explain the exists and unique functions of sql, Explain the EXISTS and UNIQ...

Explain the EXISTS and UNIQUE functions of SQL. Give an example for each? EXISTS: The EXISTS function takes one parameter that is a SQL statement. If any records exist which

B-tree, construct a b-tree for the following set of key values 2,3,5,7,11,1...

construct a b-tree for the following set of key values 2,3,5,7,11,17,19,23,29,31.assume that the tree is initial empty and the values are added in ascending order

Create student db and retrieve all student name in cs, Create a Student dat...

Create a Student database and Retrieve the names of all students majoring in ‘CS' Consider the following relational database: STUDENT (name, student#, class, major) COURSE (co

What is called block-level striping, What is called block-level striping? ...

What is called block-level striping? Block level striping stripes blocks across many disks. It treats the array of disks as a large disk, and provides blocks logical numbers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd