Define multivalued dependency and 4nf, Database Management System

Assignment Help:

Define multivalued dependency and 4NF.

 Ans:  Multivalued Dependency - Assume R be a relation schema and let α ⊆ R and β ⊆ R. The multivalued dependency 

α →→β 

 holds on R if, in any type of legal relation r(R), for all pairs of tuples t1 and t2 in r like that 

t1[α] = t2[α], there exist tuples t3 and t4 in r like

t1[α] = t2[α] = t3[α] = t4[α]

t3[β] = t1[β]

t3[R - β] = t2[R - β]

t4[β] = t2[β]

t4[R - β] = t1[R - β]

 Fourth Normal Form (4 NF) - A relation schema R is in 4NF regarding to a set D of functional and multivalued dependencies if, for all multivalued dependencies in D+ of the

form α →→β, in which α ⊆ R and β ⊆ R, at least one of the subsequent holds:

  • α→→β is a trivial multivalued dependency,
  • α is a superkey for schema R.

Related Discussions:- Define multivalued dependency and 4nf

Modifyand removing a sequence-sequences, Modify a sequence: ALTER SEQU...

Modify a sequence: ALTER SEQUENCE SEQSS INCREMENT 2 MAXVALUE 3000;   Removing a sequence: DROP SEQUENCE SEQSS;

Database, . Ashutosh Dubey who is the director of Gyan Gurukul want a three...

. Ashutosh Dubey who is the director of Gyan Gurukul want a three-level schema architecture for the Gyan Gurukul Company that provide better security also design a data abstraction

Explain data sublangauges, Explain Data Sublangauges ? Data sublanguage...

Explain Data Sublangauges ? Data sublanguage: In relational database theory, the term sublanguage, first used for this purpose through E. F. Codd in the year of 1970, refers t

E - r schema with weak entity, Consider the E/R schema with weak entity set...

Consider the E/R schema with weak entity sets shown below. Come up with the SQL CREATE TABLE statements (with appropriate primary key, unique and foreign key constraints). Include

Write the syntax of creating an index, Write the syntax of creating an INDE...

Write the syntax of creating an INDEX ? Syntax of Creating an Index: CREATE [BITMAP] [UNIQUE] INDEX ON ( [, ] . . .);

Oracle, how oracle can be used

how oracle can be used

The third normal form (3nf), The Third Normal Form (3NF) Even though, t...

The Third Normal Form (3NF) Even though, transforming a relation that is not in 2NF into a number of relations that are in 2NF take out many of the anomalies, it does not neces

What disadvantage of odbc does ole db overcome, What disadvantage of ODBC d...

What disadvantage of ODBC does OLE DB overcome? By breaking the features and the methods of a DBMS into COM objects, OLE DB characteristic overcomes a main disadvantage of ODBC

How nulls are treated in comparison operator, How nulls are treated in comp...

How nulls are treated in comparison operator? Along with comparison (relational) operators, the null values are ignored as we cannot derive the relation along with the given op

How to deal with the authentication problem, Most computer systems authenti...

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd