The next best alternate after BCNF is 3NF.  We can say that this schema is 3NF but not BCNF.  Match the following  statements that make this 3NF and not BCNF dept_advisor(s_ID, i_ID, dept_name)   § With function dependencies:              i_ID → dept_name              s_ID, dept_name → i_ID § Two candidate keys =  { s_ID ,  dept_name }, { s_ID ,   i_ID   }            -           A.           B.           C.           D.       i_ID  is not a superkey          -           A.           B.           C.           D.        { dept_name} – {i_ID }           -           A.           B.           C.           D.       dept_name   is contained in a  candidate key              -           A.           B.           C.           D.       s_ID, dept_name A.   {dept_name }  B. Since each attribute A in β – α is contained in a candidate key for R, dept_advisors is 3NF C. superkey D. dept_advisor is not BCNF

Question

The next best alternate after BCNF is 3NF.  We can say that this schema is 3NF but not BCNF.  Match the following  statements that make this 3NF and not BCNF

dept_advisor(s_ID, i_ID, dept_name)

 

§ With function dependencies:

             i_ID → dept_name

             s_ID, dept_name → i_ID

§ Two candidate keys =  { s_ID ,  dept_name }, { s_ID ,   i_ID   }

 

         -           A.           B.           C.           D.      

i_ID  is not a superkey

         -           A.           B.           C.           D.      

 { dept_name} – {i_ID } 

         -           A.           B.           C.           D.      
dept_name   is contained in a  candidate key  

 

         -           A.           B.           C.           D.      

s_ID, dept_name

A.
 

{dept_name } 

B.

Since each attribute A in β – α is contained in a candidate key for R, dept_advisors is 3NF

C.

superkey

D.

dept_advisor is not BCNF

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Database Management

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: How many square and mod operations does it take to evaluate 29n mod 103 where n = 21007 using the fa...

A: Given: Mathematical expression = 29n mod 103 n = 21007 We need to find the number of square and mod ...

Q: Briefly describe four (4) services the transport layer provides.

A: Transport Layer: In the open system interconnection (OSI) model, the transport layer is the fourth l...

Q: specify using examples four types of links that may be used in network analytics

A: The, answer has given below:

Q: 2.write a program which  calculates bill of newspaper. create 1D arrays like name of days array, num...

A: The program is written in  python  

Q: Write a program that declares a variable named inches as an input, which holds alength in inches. Di...

A: Answer: 1) taking the input for constant value onefeet 2) declaring inches 3) just printing the alre...

Q: A type of data transfer between two independent units requires that controlsignals be transmitted be...

A: The first method is strobe control and the second method is handshaking. Strobe control This method ...

Q: To fully define a variable one needs to mention not only its ‘type’ but also its ‘other properties’....

A: Variables: - It is nothing but a name given to a storage area which can be controlled by our program...

Q: Which windows command can be used to check the content of the rooting table.

A: A routing table is a table that is used by router to determine the path where data packets traveling...

Q: Follow instructions

A: # User will input stringtxt = input ("Enter your favourite bands separated by commas :") # splitting...

Q: // This program illustrates the use of a sentinel in a while loop. // The user is asked for monthly ...

A: The program is written in c++

Q: Explain the behavior of the following shell script: $ cat quote_demo twoliner="This is line 1. This...

A: In below statement 'echo receives 2 arguments. $  echo "$twoliner"  To understand how the variable i...

Q: Computer Engineering Question

A: There is a simple tag that you can use to move the image to the middle. Using CSS:   IMG.displayed {...

Q: 1. Consider a memory system with a cache access time of 100ns and a memory access time of 1200ns. If...

A:   As our guidelines we can author only first question. If you want answer of other questions then re...

Q: What's the answer to this question?

A: -Conduct a genealogic study of your extended family. - it will not help-Describe yourself. - it will...

Q: Develop a C++ program to display 5 names stored in a text file. Assume 5 names cof yours. file name ...

A: Below is the required C++ program: - Approach: - Import the header file and use the namespace. Defi...

Q: Here is the question: The files provided in the code editor to the right contain syntax and/or logic...

A: public class Main{   public static void main(String[] args)   {       String quote = "Honesty is the...

Q: After the San Onofre Nuclear Generating Station (SONGS) closed in 2012, the Diablo Canyon Power Plan...

A: 1. Diablo canyon have two nuclear reactor which are capable of producing 1100 MW each. The average c...

Q: Write the output for the given input for the LEX program to count the number of positive& negati...

A: Here our Lex program takes a collection of integers and counts number of positive and negative terms...

Q: lanugage in python Question: Design a program that asks the user to enter a store's sales for each d...

A: #In python as you know indentations play a major role and it signifies the end of loop tsales=0.0;  ...

Q: Here is the question: Write a program that inserts parentheses, a space, and a dash into a string of...

A: Unless the user specify a breaking condition inside the while loop, it will iterate - Ask the user f...

Q: Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interestra...

A: public class SavingsAccount{   //declaring static variable storing interest rate static double annua...

Q: Name and discuss two methods which can facilitate the combination of IPv4 and IPv6 addressing in a s...

A: IPv6 is the most recent version of internet protocol which uses 128 bit addressing to find out a nod...

Q: Explain how the elements are stored in one dimensional array.

A: Array is a data structure in which we can store a group of similar data elements. For examples, we c...

Q: What's the answer to this question?

A: A computer literate should be able to: avoid spam, adware, and spyware. use the web effectively. dia...

Q: 4. Given an IP address of 192.128.70.30/26. Find the network and broadcast addresses. Is the given I...

A: The given IP(internet protocol) address as 192.128.70.30 and the net mask as 26. A network address w...

Q: Instructions: Read and analyze the problems and make a C++ program out of it. Assignment #1 Compute ...

A: ///Program#include <iostream>using namespace std;int main() {    int monthsalary=0;    int sal...

Q: (Geometry: great circle distance) The great circle distance is the distance between two points on th...

A: The Java program is written where it takes the latitude and longitude degrees from the user  for the...

Q: Using c++ language

A: Introduction of the Program: The C++ program calculates power, square root, and log of the given num...

Q: Here is the question: Write an application that counts the total number of spaces contained in a quo...

A: import java.util.*; public class CountSpaces2{ public static void main(String[] args)  {      Scanne...

Q: Please do complete parts of question.

A: A parity-check grid of a straight square code C is a network which depicts the direct relations that...

Q: Write a function that receives marks received by a student in 3 subjects and returns the average and...

A: Note: Here you didn't mention any programming language so We are using the C++ programming language ...

Q: Suppose a computer using fully associative cache has 224 bytes of byte-addressable main memory and a...

A: The computer has the fully associative cache with cache files of 128 blocks A fully associative cach...

Q: Can you explain ? It's in python.

A: number=input("Enter an odd integer between 0 and 19: ");    #input a number #By default the inputs a...

Q: Which command blanks the terminal screen, erasing previously displayed output?a. eraseb. cleanc. bla...

A: Clear command: Linux operating system comes with a huge number of commands for various functionali...

Q: Create a sample program in c ++ that will count the number of digits that the user will enter: Note:...

A: #include <iostream>using namespace std;int main() {    int num, temp;    int count = 0;    // ...

Q: PLEASE USE PYTHON CODE 1. given the data points  x = -1.2, 0.3, 1.1 y = -5.76, -5.61, 3.69 determine...

A: Click to see the answer

Q: Help

A: As per our guidelines, we are authorized to answer only first three parts. If you want answer of any...

Q: Which file stores the TCP/IP addresses of the DNS servers used to resolve host names ifno DNS server...

A: The transmission Control Protocol/ Internet Protocol is the protocol for communication between two h...

Q: Identify risks and safety measures when gaming

A: Gaming risk and safety measures: The following are risks for gaming. Risk while downloading any ty...

Q: Focus on: Basic list operations, methods, use of functions, and good programming style. Program shou...

A: import random                   #imprting random module list1=[];                       #declare a l...

Q: (a) What port does the POP protocol run on? (b) What is the purpose of the POP protocol? (c) What po...

A: (a) What port does the POP protocol run on?   The POP3 protocol works on two ports: Port 110 – this...

Q: 3. Write a program to obtain inverse matrix by entering a 3*3 matrix from t user.(using visual studi...

A: NOTE:- since programming language is not defined we are providing solution in python programming lan...