James River Jewelry is a small jewelry shop. While James River Jewelry does sell typical jewelry purchased form jewelry vendors, including such items as rings, necklaces, earrings, and watches, it specializes in hard-to-find Asian jewelry. Although some Asian jewelry is manufactured jewelry purchased from vendors in the same manner as the standard jewelry is obtained, many of the Asian jewelry pieces are often unique single items purchased directly from the artisan who created the piece (the term “manufactured” would be an inappropriate description of these pieces). It has a small but loyal clientele, and it wants to further increase customer loyalty by creating a frequent buyer program. In this program, after every 10 purchases, a customer will receive a credit equal to 50 percent of the sum of his or her 10 most recent purchases. This credit must be applied to the next (or “11th”) purchase. Figure D-1 shows data that James River Jewelry collects for its frequent buyer program. A.Using these data, state assumptions about functional dependencies among the columns of data. Justify your assumptions on the basis of these sample data and also on the basis of what you know about retail sales. B. Given your assumptions in part A, comment on the appropriateness of the following designs: CUSTOMER (Name, Email) and PURCHASE (InvoiceNumber, Phone, InvoiceDate, PreTaxAmount, Email)

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

James River Jewelry is a small jewelry shop. While James River Jewelry does sell typical jewelry purchased form jewelry vendors, including such items as rings, necklaces, earrings, and watches, it specializes in hard-to-find Asian jewelry. Although some Asian jewelry is manufactured jewelry purchased from vendors in the same manner as the standard jewelry is obtained, many of the Asian jewelry pieces are often unique single items purchased directly from the artisan who created the piece (the term “manufactured” would be an inappropriate description of these pieces). It has a small but loyal clientele, and it wants to further increase customer loyalty by creating a frequent buyer program. In this program, after every 10 purchases, a customer will receive a credit equal to 50 percent of the sum of his or her 10 most recent purchases. This credit must be applied to the next (or “11th”) purchase.

Figure D-1 shows data that James River Jewelry collects for its frequent buyer program.

A.Using these data, state assumptions about functional dependencies among the columns of data. Justify your assumptions on the basis of these sample data and also on the basis of what you know about retail sales.

B. Given your assumptions in part A, comment on the appropriateness of the following designs:

  1. CUSTOMER (Name, Email)

and

PURCHASE (InvoiceNumber, Phone, InvoiceDate, PreTaxAmount, Email)

Phone
555-236-7789
555-236-0091
555-236-0392
555-236-4493
555-236-3334
555-236-7789
555-236-0392
555-236-7789
555-236-1095
InvoiceNumber
1000
Pre TaxAmount
155.00
Name
Date
5/5/2012
Email
Elizabeth Stanley
Elizabeth Stanley@somewhere.com
Fred.Price@somewhere.com
Linda.Becky@somewhere.com
Pamela.Birch@somewhere.com
Richard.Romez@somewhere.com
Elizabeth Stanley@somewhere.com
Linda. Becky@somewhere.com
Elizabeth. Stanley@somewhere.com
Samantha. Jackson@somewhere.com
Fred Price
1010
1020
5/7/2012
5/11/2012
203.00
75.00
Linda Becky
Pamela Birch
67.00
330.00
1030
5/15/2012
Richardo Romez
Elizabeth Stanley
Linda Becky
Elizabeth Stanley
Samantha Jackson
1040
5/15/2012
5/16/2012
5/16/2012
1050
25.00
45.00
1060
1070
1080
5/18/2012
5/19/2012
445.00
72.00
Figure D-1: Sample Data for James River Jewelry
Transcribed Image Text:Phone 555-236-7789 555-236-0091 555-236-0392 555-236-4493 555-236-3334 555-236-7789 555-236-0392 555-236-7789 555-236-1095 InvoiceNumber 1000 Pre TaxAmount 155.00 Name Date 5/5/2012 Email Elizabeth Stanley Elizabeth Stanley@somewhere.com Fred.Price@somewhere.com Linda.Becky@somewhere.com Pamela.Birch@somewhere.com Richard.Romez@somewhere.com Elizabeth Stanley@somewhere.com Linda. Becky@somewhere.com Elizabeth. Stanley@somewhere.com Samantha. Jackson@somewhere.com Fred Price 1010 1020 5/7/2012 5/11/2012 203.00 75.00 Linda Becky Pamela Birch 67.00 330.00 1030 5/15/2012 Richardo Romez Elizabeth Stanley Linda Becky Elizabeth Stanley Samantha Jackson 1040 5/15/2012 5/16/2012 5/16/2012 1050 25.00 45.00 1060 1070 1080 5/18/2012 5/19/2012 445.00 72.00 Figure D-1: Sample Data for James River Jewelry
Expert Solution
Step 1

CUSTOMER (LastName, FirstName, Phone, EmailAddress, InvoiceDate, InvoiceItem,Price, Tax, Total)

Since LastName here is the primary key, it is violating the very own definition of the primary key. Because there are two people with the last name Robert and this column is not uniquely defining the tuples in the table.

 

CUSTOMER (LastName, FirstName, Phone, EmailAddress, InoviceDate, InvoiceItem, Price, Tax, Total)

Same applies here as well since there are two tuples in the table where first name and the last name are the same Shire Robert.

(LastName, FirstName) is not uniquely identifying the table, hence it cannot be our primary key.

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY