You are analyzing a table within a database that manages inventories of office supplies. The table you are analyzing, tblReceivedSupplies, is used to track the arrival of new supplies. You notice the fields SupplyID, SupplyName, Date, and Quantity all existing within the table. In order to meet the criteria for the 3NF, which of these nonkey fields would need to be deleted and why? What other
table should exist to meet the criteria for normalization?
What will be an ideal response?
The field SupplyName would have a transitive dependency on the SupplyID field. If the SupplyID field changed, so would the SupplyName field. The field SupplyName should be removed from the tblReceivedSupplies table. If it does not exist already, a table storing all SupplyID's and SupplyName's should be created to maintain this data. This would meet the criteria for 3NF.
You might also like to view...
Write a function minimum3 that returns the smallest of three floating-point numbers. Use the Math.min function to im- plement minimum3. Incorporate the function into a script that reads three values from the user and determines the smallest value. Display the result in the status bar.
What will be an ideal response?
The ____ tag is used to enter the desired base URL for the page's document relative links.
A. base B. link C. keywords D. description
A ________ provides a way to add visual interest and differentiate sections of a Web page
A) bulleted list B) drop cap C) background color D) horizontal line
Which of the following attacks requires the hacker to have the plaintext and the ciphertext of one or more messages?
a. Known plaintext attack b. Ciphertext-only attack c. Chosen plaintext attack d. Chosen ciphertext attack