Decompose the table - 3nf or bcnf, Database Management System

Assignment Help:

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF.

A long-standing international treaty among the leaders of the world's developed countries prevents any and all evidence of extraterrestrial life that has been discovered from being reported to the people of Earth.  Although each country dedicates many federal agencies to furthering the country's interests, in the case of contact with extraterrestrial life, all relevant agencies of the world have agreed to cooperate.  They have developed a database in which information pertaining to extraterrestrial life encounters is recorded.  Much of the data is the identification information about those involved in an instance of contact.  Multiple humans and multiple aliens (assume these are all of one species in a single encounter) may be involved in a single encounter, and sometimes the same human will be involved in more than one encounter.  Encounters are classified in a standardized manner.  The final outcome(s) of the human participant(s) in the encounter is (are) also recorded.  Students of social psychology around the world whisper that this final outcome is a government-created and enforced disposition of the most sinister sort.

Data:

governmentID: the international identification for a government official who is responsible for information on an encounter
governmentOfficialName: the name of a participating government official       
securityClearanceRating: a government official's international security clearance  
agency: the federal agency for which the government official works                        
country: a government official's country of citizenship                
alienID: the identification for an extraterrestrial life form                                      
alienSpeciesName: the name of an extraterrestrial life form's species             
homePlanet: the planet or solar system + planet from which an extraterrestrial life form comes
communicationAbility: the level at which an extraterrestrial life form can communicate
victimID: the identification assigned to a human who encounters extraterrestrial activity
victimName: the name of the human who encountered extraterrestrial activity
victimDateOfBirth: the birthdate of the human who encountered extraterrestrial activity
victimDisposition: the final outcome of the human after an encounter             
encounter: the identification assigned to any instance of alien-human contact
encounterDate: the date an instance of contact occured
encounterType: the type of alien-human contact which occurred

Functional dependencies:

governmentID→governmentOfficialName, securityClearanceRating, agency, country
alienID→alienSpeciesName, homePlanet, communicationAbility
victimID→victimName, victimDateOfBirth

victimEncounter→victimID, encounter, victimDisposition
alienEncounter→alienID, encounter
encounter→encounterDate, governmentID, encounterType


Related Discussions:- Decompose the table - 3nf or bcnf

Greater potential for bugs and increased processing overhead, Greater poten...

Greater potential for bugs: Since the sites of a distributed system operate simultaneously, it is more complex to ensure the correctness of algorithms. The art of constructing dis

Heap files (unordered file), Heap files (unordered file) Mostly these f...

Heap files (unordered file) Mostly these files are unordered files. It is the easiest and most basic type. These files having of randomly ordered records. The records will have

What is a candidate key, What is a candidate key? Minimal super keys ar...

What is a candidate key? Minimal super keys are known as candidate keys.

Convert encrypted hsql database into csv format, Project Description: We...

Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n

Explain the static or conservative two phase locking, Explain the Static or...

Explain the Static or conservative Two Phase Locking: Static (or conservative) Two Phase Locking: In this type of scheme, all the data items are locked earlier than any opera

What is called block-level striping, What is called block-level striping? ...

What is called block-level striping? Block level striping stripes blocks across many disks. It treats the array of disks as a large disk, and provides blocks logical numbers

Short note on mid square method of hashing, Short Note on mid Square Method...

Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s

What is cardinality ratio, What is Cardinality Ratio? Cardinality Rati...

What is Cardinality Ratio? Cardinality Ratios - The cardinality ratios for relationship kinds specifies the maximum number of relationship instances in which an entity can pa

How to define a structure with tag name car_table, QUESTION (a) Conside...

QUESTION (a) Consider a car database consisting of car model, car make, car origin, Engine capacity, color, cost.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd