The table shown below lists sample dentist/patient appointment data. A patient is given an appointment at a specific time and date with a dentist located at a particular surgery. On each day of patient appointments, a dentist is allocated to a specific surgery for that day. a. The table is susceptible to update anomalies. Provide examples of insertion, deletion and update anomalies. b. State why the above table is in 1NF. c. Identify all candidate key(s) and your choice of primary key. d. Identify the functional dependencies in the 1NF table above based on the chosen primary key, including any partial and transitive dependencies. (If necessary, clearly state your assumptions). In answering this, you may use the format: fd#: attribute(s) on the left-hand side)  (attribute(s) on the right-hand side (state whether full, partial or transitive dependency) example: fd1: (A1, A2)  A3, A4, A5, A6 (full dependency) e. After removing partial dependencies, show all tables, with data, that are in 2NF. For each table, give the name and the primary key attribute, foreign key(s) if any, and which primary key of which table the foreign key(s) reference. f. After removing transitive dependencies, show all tables, with data, that are in 3NF. For each table, give the name, the primary key attribute, foreign key(s) if any, and which primary key of which table the foreign key(s) reference.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
100%

The table shown below lists sample dentist/patient appointment data. A patient is given an appointment at a specific time
and date with a dentist located at a particular surgery. On each day of patient appointments, a dentist is allocated to a
specific surgery for that day.
a. The table is susceptible to update anomalies. Provide examples of insertion, deletion and update anomalies.
b. State why the above table is in 1NF.
c. Identify all candidate key(s) and your choice of primary key.
d. Identify the functional dependencies in the 1NF table above based on the chosen primary key, including any
partial and transitive dependencies. (If necessary, clearly state your assumptions). In answering this, you may use
the format:
fd#: attribute(s) on the left-hand side)  (attribute(s) on the right-hand side (state whether full, partial or
transitive dependency)
example: fd1: (A1, A2)  A3, A4, A5, A6 (full dependency)
e. After removing partial dependencies, show all tables, with data, that are in 2NF.
For each table, give the name and the primary key attribute, foreign key(s) if any, and which primary key of
which table the foreign key(s) reference.
f. After removing transitive dependencies, show all tables, with data, that are in 3NF.
For each table, give the name, the primary key attribute, foreign key(s) if any, and which primary key of which
table the foreign key(s) reference.

 

 

 

 

 

 

staffNo dentistName patNo patName
appointment
date
surgeryNo
time
Tony Smith
Tony Smith
Helen Pearson P108
S1011
P100
Gillian White 12-Sep-08 10.00 S15
12-Sep-08 12.00 S15
lan MacKay 12-Sep-08 10.00 s10
lan MacKay 14-Sep-08 14.00 S10
14-Sep-08 16.30 S15
John Walker 15-Sep-08 18.00 S13
d si011
S1011
P105
Jill Bell
S1024
$1024
Helen Pearson P108
S1032
Robin Plevin
P105
Jill Bell
S1032
Robin Plevin
P110
Transcribed Image Text:staffNo dentistName patNo patName appointment date surgeryNo time Tony Smith Tony Smith Helen Pearson P108 S1011 P100 Gillian White 12-Sep-08 10.00 S15 12-Sep-08 12.00 S15 lan MacKay 12-Sep-08 10.00 s10 lan MacKay 14-Sep-08 14.00 S10 14-Sep-08 16.30 S15 John Walker 15-Sep-08 18.00 S13 d si011 S1011 P105 Jill Bell S1024 $1024 Helen Pearson P108 S1032 Robin Plevin P105 Jill Bell S1032 Robin Plevin P110
Expert Solution
Step 1

To solve this problem, we will be using the rules of all normal forms and remove all those dependencies which violates the rules of normal form.

Below is the solution:

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 6 steps with 5 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY