Computers and Technology, 05.05.2020 10:32 daniellaZemira
In this task, you will perform normalization on a crude table so that it could be stored as a relational database.
The staff at 'Franklin Consulting' have to routinely visit their clients in other cities. Franklin have a fleet of cars available for staff travels. During their trips, the staff sometimes need to fill up the car fuel. Upon returning from the trip, the staff claim that expenses back by providing the fueling receipt and some other essential information. The accountant records all of that information in a spreadsheet. Below are the spreadsheet column headers and a sample of data from each column.
Column Name
Example Data
Trip ID
4129
Staff name
Sarah James
Car details
Toyota Land Cruiser 2015
License Plate
1CR3KT
Odometer reading
25,067
Service station
Coles Express
Station address
27 Queen St, Campbelltown, NSW 2560
Fill up time
30 Jan 2020, 2:45 pm
Fuel type
Unleaded 95
Quantity litres
55
Cost per litre
$1.753
Total paid
$96.42
Given the information in above table,
1. Draw a dependency diagram to show the functional dependencies existing between columns. State any assumptions you make about the data and the attributes shown in the table. (3 marks)
2. Show the step by step process of decomposing the above table into a set of 3NF relations. (5 marks)
3. Review the design of your 3NF relations and make necessary amendments to define proper PKs, FKs and atomic attributes. Any additional relations may also be defined at this stage. Make sure all of your attributes conform to the naming conventions. (3 marks)
4. Draw the Crow’s Foot ERD to illustrate your final design. (4 marks)
Answers: 2
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
Computers and Technology, 23.06.2019 05:30
Sally is editing her science report about living things. she needs to copy a paragraph from her original report. order the steps sally needs to do to copy the text to her new document.
Answers: 1
Computers and Technology, 23.06.2019 07:30
What part of the interface displays the external references contained in a selected cell? the status bar the review tab the scroll bar the formula bar
Answers: 1
Computers and Technology, 24.06.2019 09:10
to change the number of rows and columns displayed by the excel object a. select the object and drag a size handle on the active object. b. deselect the object and drag a size handle of the object. c. deselect the object and drag a row or column divider of the object. d. select the object and drag a row or column divider on the active object.
Answers: 2
In this task, you will perform normalization on a crude table so that it could be stored as a relati...
Chemistry, 28.08.2019 14:00
Mathematics, 28.08.2019 14:00
Social Studies, 28.08.2019 14:00
Physics, 28.08.2019 14:00
Mathematics, 28.08.2019 14:00
English, 28.08.2019 14:00
English, 28.08.2019 14:00
Social Studies, 28.08.2019 14:00
History, 28.08.2019 14:00
Biology, 28.08.2019 14:00
Biology, 28.08.2019 14:00
Mathematics, 28.08.2019 14:00