Eliminate columns not dependent on key, Database Management System

Assignment Help:

Eliminate Columns Not Dependent On Key

The Employee Relation satisfies -

First normal form - As it has no repeating groups.

Second normal form - As it do not have multi-attribute key.

The employee relation is in 2NF but not 3NF. So we take this table only later than adding the required attributes.

 

Employee Relation

Emp-ID

Emp-Name

Department

Department-Loc

1

Gurpreet Malhotra

A

N-Delhi

2

Faisal Khan

A

N-Delhi

3

Manisha Kukreja

B

Agra

4

Sameer Singh

C

Mumbai

The key is Emp-ID, and the Dept-Name and location defines only about Department, not an Employee. To get the third normal form, they must be moved into a individual relation. Since they define a department, therefore the attribute Department becomes the key of the new "Department" relation.

The motivation for this is the similar for the second normal form: we want not to use or avoid update, insertion and deletion anomalies.;

Department-Relation

Dept-ID

Department

Department Loc

1

A

N-Delhi

2

B

Agra

3

C

Mumbai

 

Employee-List

Emp-ID

Emp-Name

1

Gurpreet Malhotra

2

Faisal Khan

3

Manisha Kukreja

4

Sameer Singh

The rest of the Relation remains similar.

The last two steps: Isolate Semantically Related Multiple Relationships and Isolate Independent Multiple Relationships, changes the relations to higher normal form and are thus not discussed here. They are not even needed for the current example.


Related Discussions:- Eliminate columns not dependent on key

Database, How many physical thing?

How many physical thing?

Relational schema, crete a data base relationship model Entity: ...

crete a data base relationship model Entity: Students; Professors; Dormitories buildings; Attributes of students: Name; Address; Dorm;

Design and build a data mart, You are required to design and build a data m...

You are required to design and build a data mart/data warehouse using Oracle. A national bank allocates funding every year for its local branches to provide temporary staff cove

Failure controlling methods, Failure Controlling Methods: Failures can be h...

Failure Controlling Methods: Failures can be handled using different recovery methods that are talk about later in the unit. But the first question is doing we really require recov

Attribute, a set of possible data value of an attribute is called??

a set of possible data value of an attribute is called??

Maping constraits, #question.what is mapping constraints and types?.

#question.what is mapping constraints and types?.

What are the ways in which signal can be generated, What are the ways in wh...

What are the ways in which signal can be generated A signal might be generated in many ways such as a Signal is result of particular physical condition. Whenever a process writ

Need website hacking security test, We want have a website; we need to test...

We want have a website; we need to test the security of our website. You need to: -Try to bypass our security by simulate a website hacking -Try some hack Techniques like

Define 3nf normal form, 3NF Normal Form A relation schema R is in 3NF ...

3NF Normal Form A relation schema R is in 3NF if it is in 2NF and for each FD X A either of the following is true X is a Super-key of R. A is a prime attribute of R

Inconsistent analysis-problems of concurrent transactions, Inconsistent Ana...

Inconsistent Analysis : The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd