Decompose the table with the functional dependencies, Database Management System

Assignment Help:

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF.

This database stores records from a (very organized) Crazy Cat Person.  It contains vital statistics and visual identifying information about the cats.  It also contains information about the cats' vet(s) and any supplements or medications shehas prescribed.  It only tracks current medications and supplements.

Data:

catName: the name of a cat
catBirth: the cat's date of birth, or an estimate thereof   
catAdoption: the cat's date of adoption by the Crazy Cat Person
color: the main color of the cat's fur
furPattern: the pattern of the cat's fur (i.e. "striped")           
furType: the type of the cat's fur (long or short)
vetName: the name of the vet who cares for the cat and prescribes supplements or medications
office: the name of the vet's office
address: the address of the vet's office
phone: the vet's phone number
supplement: the name of a prescribed supplement or medication
dose: the prescribed unit dosage of a supplement/medication
sig:the dosing recommendations, i.e. how many of the unit doses, how often, and by what route is the supplement/medication to be given

Functional dependencies:

catName → catBirth, catAdoption, color, furPattern, furType
vetName → office, address, phone  
supplement, catName → dose, sig, vetName


Related Discussions:- Decompose the table with the functional dependencies

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Mention the several levels in security measures, Mention the several levels...

Mention the several levels in security measures. A) Database system B) Operating system C) Network D) Physical Human

Naïve bayesian approach-id3 algorithm, You are working for the ABC Telecom ...

You are working for the ABC Telecom and are given some customer records for data mining. You are asked to discover, from the data, patterns that characterize low-, medium- and high

Drop table command, DROP TABLE Command: When an existing object is not ...

DROP TABLE Command: When an existing object is not needed for further use, it is always better to eliminate it from the database. To remove the existing object from the databas

Strong entity set and weak entity set, Strong entity set and weak entity se...

Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.

Explain data models namely relational network - hierarchical, Explain the t...

Explain the three data models namely relational, network and hierarchical and evaluate their relative advantages and disadvantages. Hierarchical Model: In hierarchical model, da

Logical design part 1, create an e-r diagram usuing graphical dipicted soft...

create an e-r diagram usuing graphical dipicted software that could theoritically be used in resturant application

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd