Determine bcnf-dcnf and key relation, Database Management System

Assignment Help:

(A) For the relation;

CarSales (RegNo, BuyerName, Address, SalesPerson, Make, Model, Commission)

The following functional dependences hold,

RegNo _ID à Make, Model

RegNoà Commission

RegNo, BuyerName à SalesPerson

BuyerName à Address

Make, Model à Commission

RegNo à SalesPerson

a. Use Inference rules to find the minimal basis and determine the Key of the relation

b. Based on this key, determine if the relation is in BCNF.

c. If it is not in BCNF then decompose the relation into BCNF.

3(B) The following relation holds details about cars ;

CAR_DETAILS(Registration_No , Make , Model , Tow_Load , Engine_Size, Colour )

And has the following functional dependencies;

Make , Model -> Engine_Size

Registration_No -> Make, Colour, Model

Engine_Size -> Tow_Load

The relation is decomposed into ;

CAR_DETAILS1(Registration_No , Colour, Make , Engine_Size* ,Model)

CAR_DETAILS2(Engine_Size, Tow_Load)

Prove that the decomposition is incomplete and complete the decomposition.


Related Discussions:- Determine bcnf-dcnf and key relation

Define the query optimisation, Define the Query optimisation The query ...

Define the Query optimisation The query parser commonly generates a standard initial tree to correspond to an SQL query, with no doing any optimization. Such type of a canonica

Distinguish among a datareader class and a dataset class, Question (a) ...

Question (a) Concurrent access to data from a database is a normal part of application program usage. Describe three approaches to concurrency control (b) Distinguish among

Define an operator that a relational algebra does not have, Define an opera...

Define an operator that a Relational Algebra does not have Ans: Relational Algebra does not have Aggregation operators.

What is a security, What is a security? Securities are claims on financ...

What is a security? Securities are claims on financial assets.  They can be illustrated as "claim checks" which give their owners the right to receive funds in the future.  Sec

Normalization, in case of functional dependencies how we get the higher nor...

in case of functional dependencies how we get the higher normal form.

What is trigger, What is Trigger? Trigger: A database trigger is proced...

What is Trigger? Trigger: A database trigger is procedural code which is automatically executed in response to specific events on a particular table in a database. Triggers can

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Which language has recently become the defacto standard, Which language has...

Which language has presently become the defacto standard for interfacing application programs along with relational database system? The language which has recently become the

Explain how the law ensures data protection and security, Question 1: (...

Question 1: (a) Explain the legal meaning of :- (i) Computer Service Person (ii) Data holding (b) Explain how the law ensures Data protection and Security. Qu

Describe embedded query language, Describe Embedded Query Language? Emb...

Describe Embedded Query Language? Embedded Query Language - A query language (e.g., SQL) can be implemented in two ways. It can be used interactively or embedded within a host

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd