Get premium membership and access questions with answers, video lessons as well as revision papers.
The formal definition of second normal form (2NF) is a table that is in first normal form and every non-primary-key column is fully functionally dependent on the primary key. Full functional dependency indicates that if A and B are columns of a table, B is fully functionally dependent on A, if B is not dependent on any subset of A. If B is dependent on a subset of A, this is referred to as a partial dependency. If a partial dependency exists on the primary key, the table is not in 2NF. The partial dependency must be removed for a table to achieve 2NF
kevowmuchiri answered the question on July 9, 2018 at 19:04
- Describe the characteristics of a table in second normal form (2NF).(Solved)
Describe the characteristics of a table in second normal form (2NF).
Date posted: July 9, 2018. Answers (1)
- Describe an approach to converting a first normal form (1NF) table to second normal form (2NF) table(s).(Solved)
Describe an approach to converting a first normal form (1NF) table to second normal form (2NF) table(s).
Date posted: July 9, 2018. Answers (1)
- What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form.(Solved)
What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form.
Date posted: July 9, 2018. Answers (1)
- Describe the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF.(Solved)
Describe the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF.
Date posted: July 9, 2018. Answers (1)
- Describe the types of update anomalies that may occur on a table that has redundant data.(Solved)
Describe the types of update anomalies that may occur on a table that has redundant data.
Date posted: July 9, 2018. Answers (1)
- Discuss how normalization may be used in database design.(Solved)
Discuss how normalization may be used in database design.
Date posted: July 9, 2018. Answers (1)
- Describe how strong and weak entities differ and provide an example of each.(Solved)
Describe how strong and weak entities differ and provide an example of each.
Date posted: July 7, 2018. Answers (1)
- Provide an example of a relationship with attributes(Solved)
Provide an example of a relationship with attributes
Date posted: July 7, 2018. Answers (1)
- Describe what multiplicity represents for a relationship.(Solved)
Describe what multiplicity represents for a relationship.
Date posted: July 7, 2018. Answers (1)
- What are business rules and how does multiplicity model these constraints?(Solved)
What are business rules and how does multiplicity model these constraints?
Date posted: July 7, 2018. Answers (1)
- How does multiplicity represent both the cardinality and the participation constraints on a relationship?(Solved)
How does multiplicity represent both the cardinality and the participation constraints on a relationship?
Date posted: July 7, 2018. Answers (1)
- Perform addition and subtraction operation on the following two floating point operands. ...(Solved)
Perform addition and subtraction operation on the following two floating point operands.
A = 0 10001 011011
B = 1 01111 101010
A and B are represented in a 12-bit format. The scale factor has an implied base of 2 and a 5-bit excess-15 exponent. The 6-bit mantissa is normalized as in the IEEE format, with an implied 1 to the left of the binary point.
Date posted: July 7, 2018. Answers (1)
- Divide 14 by 3 using restoring and non restoring division. Show all the steps. No partial credit will be awarded unless all steps are shown.
(Solved)
Divide 14 by 3 using restoring and non restoring division. Show all the steps. No partial credit will be awarded unless all steps are shown.
Date posted: July 7, 2018. Answers (1)
- Multiply the following pair of signed 2’s complement numbers using the Booth algorithm. Assume A is the multiplicand and B is the multiplier. Show all...(Solved)
Multiply the following pair of signed 2’s complement numbers using the Booth algorithm. Assume A is the multiplicand and B is the multiplier. Show all the steps. No partial credit will be awarded unless all steps are shown.
A = 010111, B = 110110
Date posted: July 7, 2018. Answers (1)
- Convert the following numbers: (a) –347 into 2’s complement binary (b)243.124 into floating point form.(Solved)
1. Convert the following numbers:
(a) –347 into 2’s complement binary
(b) 243.124 into floating point form.
Date posted: July 7, 2018. Answers (1)
- Discuss the purpose of analyzing the transactions that have to be supported and describe the type of information you would collect and analyze.(Solved)
Discuss the purpose of analyzing the transactions that have to be supported and describe the type of information you would collect and analyze.
Date posted: July 4, 2018. Answers (1)
- Discuss some of the main reasons for selecting a column as a potential candidate for indexing. Give examples to illustrate your answer.(Solved)
Discuss some of the main reasons for selecting a column as a potential candidate for indexing. Give examples to illustrate your answer.
Date posted: July 4, 2018. Answers (1)
- When would you not add any indexes to a table?(Solved)
When would you not add any indexes to a table?
Date posted: July 4, 2018. Answers (1)
- Having identified a column as a potential candidate, under what circumstances would you decide against indexing it? (Solved)
Having identified a column as a potential candidate, under what circumstances would you decide against indexing it?
Date posted: July 4, 2018. Answers (1)
- Describe the access control facilities of SQL.(Solved)
Describe the access control facilities of SQL.
Date posted: July 4, 2018. Answers (1)