RESID EMPID ROOM FNAME LNAME UA100 145A Brightly UA100 1 Grand Ave UA349 START END BLDG ADDRESS Brittany 2020-01-09 2020-01-09 Baldor 1 Grand Ave 101 Brittany Brightly 2020-01-13 2020-01-14 Baldor 2020-01-05 2020-01-05 MS 2020-02-01 2020-02-07 MS 2020-02-14 2020-02-16 Baldor 2020-01-20 2020-01-21 Baldor 1 Grand Ave 85 John Low 5 Grand Ave UA852 345 Ben Cuervas 5 Grand Ave UA978 101 Mac 1 Grand Ave UA349 145A John 100 200 300 350 400 475 Apple Low 1. First, start by identifying each of the functional dependencies between the attributes. 2. Determine which attributes represent the primary keys and any alternate keys if any are present. 3. Determine whether or not the table is presently in third normal form. 4. Demonstrate how you could encounter insertion, deletion, and modification anomalies on the table provided above. 5. Demonstrate the process of normalization for this table. Clearly represent the entities in first (1NF), second (2NF), and third (3NF) normal form. Briefly describe what was accomplished at each level of normalization. 6. Submit an entity relationship (ER) diagram of the schema in third normal form (3NF) and create these tables within DB2. Submit your SQL with the appropriate constraints.

EBK JAVA PROGRAMMING
9th Edition
ISBN:9781337671385
Author:FARRELL
Publisher:FARRELL
Chapter14: Introduction To Swing Components
Section: Chapter Questions
Problem 10PE
icon
Related questions
Question

I am needing help in understanding Question 4. Please provide step by step explanation of each of the anomalies. Thank you

100
UA100 145A Brittany
101 Brittany
200
UA100
1 Grand Ave
RESID EMPID ROOM FNAME LNAME START END BLDG ADDRESS
Brightly 2020-01-09 2020-01-09 Baldor 1 Grand Ave
Brightly 2020-01-13 2020-01-14 Baldor
Low 2020-01-05 2020-01-05 MS
2020-02-01 2020-02-07 MS
2020-02-14 2020-02-16 Baldor
300
UA349
John
5 Grand Ave
5 Grand Ave
350
UA852
Ben
Cuervas
400
UA978
Apple
1 Grand Ave
475
UA349
Low 2020-01-20 2020-01-21 Baldor 1 Grand Ave
85
345
101
145A
Mac
John
1. First, start by identifying each of the functional dependencies between the attributes.
2. Determine which attributes represent the primary keys and any alternate keys if any
are present.
3. Determine whether or not the table is presently in third normal form.
4. Demonstrate how you could encounter insertion, deletion, and modification anomalies
on the table provided above.
5. Demonstrate the process of normalization for this table. Clearly represent the entities
in first (1NF), second (2NF), and third (3NF) normal form. Briefly describe what
was accomplished at each level of normalization.
6. Submit an entity relationship (ER) diagram of the schema in third normal form
(3NF) and create these tables within DB2. Submit your SQL with the appropriate
constraints.
Transcribed Image Text:100 UA100 145A Brittany 101 Brittany 200 UA100 1 Grand Ave RESID EMPID ROOM FNAME LNAME START END BLDG ADDRESS Brightly 2020-01-09 2020-01-09 Baldor 1 Grand Ave Brightly 2020-01-13 2020-01-14 Baldor Low 2020-01-05 2020-01-05 MS 2020-02-01 2020-02-07 MS 2020-02-14 2020-02-16 Baldor 300 UA349 John 5 Grand Ave 5 Grand Ave 350 UA852 Ben Cuervas 400 UA978 Apple 1 Grand Ave 475 UA349 Low 2020-01-20 2020-01-21 Baldor 1 Grand Ave 85 345 101 145A Mac John 1. First, start by identifying each of the functional dependencies between the attributes. 2. Determine which attributes represent the primary keys and any alternate keys if any are present. 3. Determine whether or not the table is presently in third normal form. 4. Demonstrate how you could encounter insertion, deletion, and modification anomalies on the table provided above. 5. Demonstrate the process of normalization for this table. Clearly represent the entities in first (1NF), second (2NF), and third (3NF) normal form. Briefly describe what was accomplished at each level of normalization. 6. Submit an entity relationship (ER) diagram of the schema in third normal form (3NF) and create these tables within DB2. Submit your SQL with the appropriate constraints.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Table
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
EBK JAVA PROGRAMMING
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
Np Ms Office 365/Excel 2016 I Ntermed
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:
9781337508841
Author:
Carey
Publisher:
Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm…
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning