Define the boyce-codd normal form, Database Management System

Assignment Help:

Define the Boyce-Codd Normal Form with instance and also Compare BCNF and 3NF.

 Ans: BCNF: For each functional dependency X->Y in a set F of functional dependencies over relation R, either: 

  • Y is a subset of X or,
  • X is a superkey of R

 While

3NF: For each functional dependency X->Y in a set F of functional dependencies over relation R, either:  

  • Y is a subset of X or,
  • X is a superkey of R, or
  • Y is a subset of K for few key K of R

a.       there is no subset of a key is a key


Related Discussions:- Define the boyce-codd normal form

multiple-mode locks, Multiple-mode locks : It offers two locks: exclusive ...

Multiple-mode locks : It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that neve

Explain trigger, What is Trigger? A trigger is a SQL procedure that ini...

What is Trigger? A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs. Triggers are kept in and managed by the DBMS. Triggers a

Create table statements for original database, MySQL statements for extendi...

MySQL statements for extending the database to incorporate new facilities Deliverables for submission You must submit the following deliverables in the Assignment Dropbox in

Which element in the database can modified by changing, Which element in th...

Which element in the database can modified by changing the data dictionary? Data elements in the database can be changed or modified through changing the data dictionary.

What is a value, What is a value? A data value is used for identity. Th...

What is a value? A data value is used for identity. This form of identity is used in relational systems.eg: The primary key value of a tuple recognize the tuple.

Improved availability, Improved availability: The data in a distributed sys...

Improved availability: The data in a distributed system may be replicated so that it is at more than one site. Thus, the failure of a node or a communication link does not necessar

MULTI-LIST FILE ORGANIZATION, sir, could anybody help me in getting complet...

sir, could anybody help me in getting complete information about the mentioned topic

Architectural standard, Architectural standard: Designation : Archit...

Architectural standard: Designation : Architect , Consultant Job Profile : As a part of Oracle Fusion Middleware at Satyam, I am involved with Presales, Delivery, A

List the set operations of sql, List the set operations of SQL? 1) Unio...

List the set operations of SQL? 1) Union 2) Intersect operation 3) The except operation

Weak entity, Entity types that do not have any key attribute, and therefore...

Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd