subject

In this task, you will perform normalization on a crude table so that it could be stored as a relational database.

The staff at 'Franklin Consulting' have to routinely visit their clients in other cities. Franklin have a fleet of cars available for staff travels. During their trips, the staff sometimes need to fill up the car fuel. Upon returning from the trip, the staff claim that expenses back by providing the fueling receipt and some other essential information. The accountant records all of that information in a spreadsheet. Below are the spreadsheet column headers and a sample of data from each column.

Column Name

Example Data

Trip ID

4129

Staff name

Sarah James

Car details

Toyota Land Cruiser 2015

License Plate

1CR3KT

Odometer reading

25,067

Service station

Coles Express

Station address

27 Queen St, Campbelltown, NSW 2560

Fill up time

30 Jan 2020, 2:45 pm

Fuel type

Unleaded 95

Quantity litres

55

Cost per litre

$1.753

Total paid

$96.42
Given the information in above table,

1. Draw a dependency diagram to show the functional dependencies existing between columns. State any assumptions you make about the data and the attributes shown in the table. (3 marks)

2. Show the step by step process of decomposing the above table into a set of 3NF relations. (5 marks)

3. Review the design of your 3NF relations and make necessary amendments to define proper PKs, FKs and atomic attributes. Any additional relations may also be defined at this stage. Make sure all of your attributes conform to the naming conventions. (3 marks)

4. Draw the Crow’s Foot ERD to illustrate your final design. (4 marks)

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 23.06.2019 05:30
Sally is editing her science report about living things. she needs to copy a paragraph from her original report. order the steps sally needs to do to copy the text to her new document.
Answers: 1
question
Computers and Technology, 23.06.2019 07:30
What part of the interface displays the external references contained in a selected cell? the status bar the review tab the scroll bar the formula bar
Answers: 1
question
Computers and Technology, 24.06.2019 09:10
  to change the number of rows and columns displayed by the excel object a. select the object and drag a size handle on the active object. b. deselect the object and drag a size handle of the object. c. deselect the object and drag a row or column divider of the object. d. select the object and drag a row or column divider on the active object.
Answers: 2
You know the right answer?
In this task, you will perform normalization on a crude table so that it could be stored as a relati...
Questions
question
Chemistry, 28.08.2019 14:00
question
Mathematics, 28.08.2019 14:00
question
Mathematics, 28.08.2019 14:00
Questions on the website: 13722362