Decompose the table with the functional dependencies, Database Management System

Assignment Help:

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF.

This database stores records from a (very organized) Crazy Cat Person.  It contains vital statistics and visual identifying information about the cats.  It also contains information about the cats' vet(s) and any supplements or medications shehas prescribed.  It only tracks current medications and supplements.

Data:

catName: the name of a cat
catBirth: the cat's date of birth, or an estimate thereof   
catAdoption: the cat's date of adoption by the Crazy Cat Person
color: the main color of the cat's fur
furPattern: the pattern of the cat's fur (i.e. "striped")           
furType: the type of the cat's fur (long or short)
vetName: the name of the vet who cares for the cat and prescribes supplements or medications
office: the name of the vet's office
address: the address of the vet's office
phone: the vet's phone number
supplement: the name of a prescribed supplement or medication
dose: the prescribed unit dosage of a supplement/medication
sig:the dosing recommendations, i.e. how many of the unit doses, how often, and by what route is the supplement/medication to be given

Functional dependencies:

catName → catBirth, catAdoption, color, furPattern, furType
vetName → office, address, phone  
supplement, catName → dose, sig, vetName


Related Discussions:- Decompose the table with the functional dependencies

Find names of employees, Consider the relations EMP(ENO,ENAME,AGE,BASIC_S...

Consider the relations EMP(ENO,ENAME,AGE,BASIC_SALARY) WORK_IN(ENO,DNO) DEPT(DNO,DNAME,CITY) Express the following queries in SQL (i) Find names of employees who work in a dep

Describe the four main ways of optimising disk block access, Describe the f...

Describe the four main ways of optimising disk block access. Ans: a. Disk  b. Non-volatile writes buffers c. File organization (Clustering) d. Log-based file system

The locking protocol, The Locking Protocol: To manage concurrency related ...

The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located

How do you find the final model after iterative analysis, How do you find t...

How do you find the final model after iterative analysis? Why is iterative analysis of any of the problem needed? The final model serves as the base for system architectur

Hashing techniques, folding method and mid square method using visual basic...

folding method and mid square method using visual basic

What is called a query evaluation plan, What is called a query evaluation p...

What is called a query evaluation plan? A sequence of primitive operations that can be used to assess a query is a query evaluation plan or a query implementation plan.

Unrepeatable reads-problems of concurrent transactions, Unrepeatable reads ...

Unrepeatable reads : Assume T7 reads X twice during its implementation. If it did not update X itself it could be very disturbing to see a dissimilar value of X in its next read. B

What is called query processing, What is called query processing? Query...

What is called query processing? Query processing refers to the range of activities included in extracting data from a database.

Define physical and logical data independence, Define physical and logical ...

Define physical and logical data independence. How does this architecture help in achieving these? Data independence entails that change in one view must not need a change in t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd