Given the following relational schema and its functional dependencies:

![15264|489x158](upload://l4J84xHiuiokvMzboDrJNeRroKw.png)

(a) Specify candidate keys and state the primary key.
(b) Assuming that the relation is in first normal form (1NF), describe and illustrate the process of normalising the relational schema to second (2NF) and third (3NF) normal forms. Identify the primary and foreign keys in your third normal forms.


(a) Candidate keys: (custNo, propertyNo), (custNo, rentStart)
Primary key: any of the above set of attributes; e.g. (custNo, propertyNo)

(b) 2NF: fd3 and fd54 violates the definition of 2NF. Decompose relation.
![15265|536x182](upload://5P4PPgglLn85dVHAFRSJapnIVaI.png)
3NF: fd5 violates 3NF definition. Decompose relation.
![15266|482x240](upload://tCNGr6m2B24fPBZyPv2n9IxVXCU.png)

Computer Science & Information Technology

You might also like to view...

The value of the expression 20.0 * (9/5) + 32.0 is

a) 68.0 b) 52.0 c) incorrect expression so there is no value d) 32.0 e) incorrect expression , the / should be %

Computer Science & Information Technology

Runnables are executed using a class that implements the ____________ interface.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All facilities that use computers know that operating systems and applications require frequent patches and upgrades. Which of the following is essential to a good forensics facility?

a. A dedicated software testing engineer with a background in programming b. A documented change control program that records every patch or upgrade performed, along with the time and date c. A single person delegated to the task of performing patches and upgrades d. A software monitoring application that automatically applies patches and upgrades as they become available

Computer Science & Information Technology

ZIP files use what type of compression?

A) Lossless B) Lossy C) Ultra D) Passive

Computer Science & Information Technology