Modern Database Management
13th Edition
ISBN: 9780134773650
Author: Hoffer
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 4, Problem 4.57PAE
Program Plan Intro
a. Functional dependency between given attributes
Program Plan Intro
b. Reason for which the given relations are not in 3NF.
Program Plan Intro
c. Convert relation into 3NF
Program Plan Intro
d. ER Diagram of normalized relations
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Luxury-Oriented Scenic Tours (LOST) provides guided tours to groups of visitors to the Washington, D.C. area. In recent years, LOST has grown quickly and is having difficulty keeping up with all of the various information needs of the company. The company's operations are as follows:
LOST offers many different tours. For each tour, the tour name, approximate length (in hours), and fee charged is needed. Guides are identified by an employee ID, but the system should also record a guide's name, home address, and date of hire. Guides take a test to be qualified to lead specific tours. It is important to know which guides are qualified to lead which tours and the date
that they completed the qualification test for each tour. A guide may be qualified to lead many different tours. A tour can have many different qualified guides. New guides may or may not be qualified to lead any tours, just as a new tour may or may not have any qualified guides.
Every tour must be designed to visit at least…
Read carefully the following case:Imagine that you work as an internal auditor for a company that owns several pharmacies throughout the city. Based on your audit plan, the first cycle to audit will be revenue. The first thing you do is document the processes related to receiving and processing the various sources of income. On your initial visit, you were able to observe the following:Once customers have the items to purchase, they head to the register, where a clerk processes the sale. The pharmacy has three cash registers, but does not have an employee who specifically works as a cashier at each one. This provides flexibility in the operation because, of the three employees that the business has, one can collect at any of the cashiers when available. By not having to leave a single person as a cashier, the cashier can focus on providing more direct customer service, refilling merchandise on the shelves, and even assisting in receiving or dispatching merchandise from the store.At the…
Q3:Your company has just acquired a smaller company that sells office automation software. The smaller company's spreadsheet software has a large market share, with many satisfied users (the major reason for the acquisition was that these existing users are potential customers for your company's other products). Unfortunately, no documentation for the spreadsheet software can be found, and the source code is not commented. How would you go about maintaining this software to keep the customers happy?
Chapter 4 Solutions
Modern Database Management
Ch. 4 - Define each of the following terms: determinant...Ch. 4 - Prob. 4.2RQCh. 4 - Prob. 4.3RQCh. 4 - Describe the primary differences between the...Ch. 4 - Summarize six important properties of relations.Ch. 4 - Describe two properties that each candidate key...Ch. 4 - Describe the three types of anomalies that can...Ch. 4 - Demonstrate each of the anomaly types with an...Ch. 4 - Fill in the blanks in each of the following...Ch. 4 - What is a well-structured relation? Why are...
Ch. 4 - Prob. 4.11RQCh. 4 - Describe how the following components of an E-R...Ch. 4 - Prob. 4.13RQCh. 4 - Prob. 4.14RQCh. 4 - Briefly describe four typical problems that often...Ch. 4 - Prob. 4.16RQCh. 4 - Explain how each of the following types of...Ch. 4 - Prob. 4.18RQCh. 4 - Prob. 4.19RQCh. 4 - Prob. 4.20RQCh. 4 - Prob. 4.21RQCh. 4 - What is the relationship between the primary key...Ch. 4 - Prob. 4.23RQCh. 4 - Explain what can be done with primary keys to...Ch. 4 - Prob. 4.25RQCh. 4 - Explain three conditions that suggest a surrogate...Ch. 4 - Prob. 4.27RQCh. 4 - For each of the following E-R diagrams from...Ch. 4 - Prob. 4.29PAECh. 4 - Prob. 4.30PAECh. 4 - For your answers to the following Problems and...Ch. 4 - Figure 4-3212 shows a class list for Millennium...Ch. 4 - Prob. 4.33PAECh. 4 - Prob. 4.34PAECh. 4 - Prob. 4.35PAECh. 4 - Prob. 4.36PAECh. 4 - Prob. 4.37PAECh. 4 - Prob. 4.38PAECh. 4 - Prob. 4.39PAECh. 4 - Transform Figure 2-15a, attribute version, to 3NF...Ch. 4 - The Public Safety office at Millennium College...Ch. 4 - Prob. 4.42PAECh. 4 - Prob. 4.43PAECh. 4 - Prob. 4.44PAECh. 4 - For your answers to Problem and Exercise 3-33 from...Ch. 4 - Prob. 4.46PAECh. 4 - Prob. 4.47PAECh. 4 - Figure 4-38 includes an EER diagram for a...Ch. 4 - Prob. 4.49PAECh. 4 - Prob. 4.50PAECh. 4 - Prob. 4.51PAECh. 4 - Prob. 4.52PAECh. 4 - Figure 4-40 shows an EER diagram for a university...Ch. 4 - Explore the data included in Table 4-9. Assume...Ch. 4 - Prob. 4.55PAECh. 4 - Prob. 4.56PAECh. 4 - Prob. 4.57PAECh. 4 - Prob. 4.58PAE
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Draw the Level 0 and Level 1 Data Flow Diagram for the Omantel Billing System Scenario: The teacher uploads the eLearning question, which is then saved in the QUESTIONS database, and informs the students that the quiz is now available for them to take. When taking the quiz, the student will be randomly assigned questions from the QUESTIONS database. All of the student's answers will be saved in the ANSWER database. The system will automatically mark the quiz by accessing the student answers from the ANSWER database and the correct answer from the Question database, after which the system will notify both the teacher and the student of the results.arrow_forwardThe purchasing department handles purchase requests from other departments in the company. People in the company who initiate the original purchase request are the "customers" of the purchasing department. A case worker within the purchasing department receives that request and monitor it until it is ordered and received. Case workers process the requests for purchasing products under 1500tk, write a purchase order, and then send it to the approved vendor. Purchase requests over 1500tk must first be sent out for a bid from the vendor that supplies the product. When the bids return, the case worker selects one bid. Then, the case worker writes a purchase order and sends it to the approved vendor Create an activity diagram with swimlanes.arrow_forwardIn the ER diagram for a Point of Sale system, there are entities such as Cashier, Product,Checkout, Transaction, CheckoutStand, Return, Inventory, etc. Here inventory records each storagelocation and its capacity. Sometimes, a customer may need to come back to pickup their items afterchecking out while most of the time they leave the store with their purchases. Which of the following is thebetter design for manage transactions?A) Add an attriute to transaction to indicate whether goods have been pickuped or notB) Create two subtyeps of TransactionC) Create a weak entity Pickup to link with TransactionD) Add a relationship between Transaction and Productarrow_forward
- Draw a use-case diagram for an online university registration system. The system should enable the staff of each academic department to examine the courses offered by their department, add and remove courses, and change the information about them (e.g., the maximum number of students permitted). It should permit students to examine currently available courses, add and drop courses to and from their schedules, and examine the courses for which they are enrolled. Department staff should be able to print a variety of reports about the courses and the students enrolled in them. The system should ensure that no student takes too many courses and that students who have any unpaid fees are not permitted to register (assume that fees data are maintained by the university's financial office, which the registration system accesses but does not change).arrow_forwardStudy the scenario and complete the question(s) that follow: Pearson Institute of Higher Education Library BooksThe Pearson Institute Library is comprised of many books covering various subjects. Students borrow these books to aid them in their studies. The Pearson Library team would like to know the ten most borrowed books by students. They have approached you as a Java Developer to help them to develop an app that will provide them with these statistics. They keep records of the borrowed books and the number of times they have been borrowed. Below is sample data from the Books.txt file that you have been provided with: Sample data – Books.txtIntroduction to Java programming; Daniel Liang; 25The C# Programming Yellow Book; Robert Miles; 12Learning Python; David Ascher; 10The C++ Programming Language; Bjarne Stroustrup; 21Programming PHP; Rasmus Lerdorf; 15 Create a Java application for the Pearson Library. The application must consist of a Book class that is composed of the book…arrow_forwardQuiz 2/III Draw the use case model and write main scenario and extensions for the following: student online registration in a computer college : a student enters his information in the college website and receives a registration code to his email . then login the email to complete the process and get a message that he is being added to the student database if his degrees are under the average the system will redirect the record to another college.arrow_forward
- The Vegan Garden is a little restaurant that may be found in the tranquil village of Dawnsville. It has been five years since the eatery first opened its doors. At the moment, sales are recorded manually via the use of cash registers, and monthly sales reports and other corporate paperwork, such as information on employees and suppliers, are kept in dated filing cabinets. The owner of Vegan Garden has made the decision to develop an information system. He then went and sought the aid of a company that specializes in information technology in order to design an information system that would be suitable for the current commercial operations of the Vegan Garden.You have been given the responsibility of serving as the project manager for the creation of the Vegan Garden information system.As the project manager of the development project, it is your responsibility to advise the owner of Vegan Garden about the information system security issues that exist. Provide an explanation for ANY…arrow_forwardIn Chapter 3 of Sharma et al. (2010), you will be introduced with a case study: "This case study describes a simple Library Management System. Assume the requirements for the system were written by your client exactly in these terms: The system will manage the author's and loaner's information, and keep track of books loaned. The borrower's information includes name, address, e-mail, and phone. The author's information includes name, address, and e-mail. New books, authors and clients are entered into the system. When a client checks out a book, the system will register the date the book was loaned and calculate the days the book can be loaned. It will also calculate the date the book is due to be returned. If the borrower returns the book late, he must pay a fine based on the number of days overdue." (Sharma, et al., 77). Assume that the traditional file system is currently used in this library and a DBMS is to be developed. Discuss the advantages and challenges for the use of…arrow_forwardA company makes items. Each item has a name, ID and component quantity. Every item contains many components. Each component can be supplied by one or more suppliers. Suppliers have names and IDS. Each component has ID, name, description, suppliers who supply them, and items in which they are used. Not all suppliers provide components, and a component is not always associated with a supplier. Also, a component always have to be associated with one or more items. Finally, the company contact customers using their IDs, Names and Phones to sell them items. A customer can buy one or more items.arrow_forward
- Problem: Security breaches and confidentiality of personal data are important considerations in modern system design. We have all heard the saying that “knowledge is power.” With the collection, categorization, and analysis of big data, companies can know more about their clients as a whole than the sum of their individual activities. The simple example of selling subscriber mailing lists has been dealt with, but what about mining transactions to create a custom profile of client trends, and then selling this aggregate information? A company cannot pass on your personal information to another company, but can it pass on the metadata of all of its clients? For example, can a company that supplies web hosting for ecommerce sites mine the transactions of those websites and sell the aggregate traffic information to competing companies? Search the literature on this subject and produce a report on the legal, moral, and ethical considerations of such an activity. Question: explain…arrow_forwardProblem: Security breaches and confidentiality of personal data are important considerations in modern system design. We have all heard the saying that “knowledge is power.” With the collection, categorization, and analysis of big data, companies can know more about their clients as a whole than the sum of their individual activities. The simple example of selling subscriber mailing lists has been dealt with, but what about mining transactions to create a custom profile of client trends, and then selling this aggregate information? A company cannot pass on your personal information to another company, but can it pass on the metadata of all of its clients? For example, can a company that supplies web hosting for ecommerce sites mine the transactions of those websites and sell the aggregate traffic information to competing companies? Search the literature on this subject and produce a report on the legal, moral, and ethical considerations of such an activity. Question: Discuss…arrow_forwardProblem: Security breaches and confidentiality of personal data are important considerations in modern system design. We have all heard the saying that “knowledge is power.” With the collection, categorization, and analysis of big data, companies can know more about their clients as a whole than the sum of their individual activities. The simple example of selling subscriber mailing lists has been dealt with, but what about mining transactions to create a custom profile of client trends, and then selling this aggregate information? A company cannot pass on your personal information to another company, but can it pass on the metadata of all of its clients? For example, can a company that supplies web hosting for ecommerce sites mine the transactions of those websites and sell the aggregate traffic information to competing companies? Search the literature on this subject and produce a report on the legal, moral, and ethical considerations of such an activity. Question: discuss…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage