A second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can be worked out from the values in all the columns that makes up the primary key.
A table in 1NF can be converted into 2NF by removing the columns that can be worked out from only part of the primary key. These columns are placed in a new table along with a copy of the part of the primary key that they can be worked out from.
kevowmuchiri answered the question on July 9, 2018 at 19:02
-
What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form.
(Solved)
What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form.
Date posted:
July 9, 2018
.
Answers (1)
-
Describe the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF.
(Solved)
Describe the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF.
Date posted:
July 9, 2018
.
Answers (1)
-
How does multiplicity represent both the cardinality and the participation constraints on a relationship?
(Solved)
How does multiplicity represent both the cardinality and the participation constraints on a relationship?
Date posted:
July 7, 2018
.
Answers (1)
-
Divide 14 by 3 using restoring and non restoring division. Show all the steps. No partial credit will be awarded unless all steps are shown.
(Solved)
Divide 14 by 3 using restoring and non restoring division. Show all the steps. No partial credit will be awarded unless all steps are shown.
Date posted:
July 7, 2018
.
Answers (1)
-
Multiply the following pair of signed 2’s complement numbers using the Booth algorithm. Assume A is the multiplicand and B is the multiplier. Show all...
(Solved)
Multiply the following pair of signed 2’s complement numbers using the Booth algorithm. Assume A is the multiplicand and B is the multiplier. Show all the steps. No partial credit will be awarded unless all steps are shown.
A = 010111, B = 110110
Date posted:
July 7, 2018
.
Answers (1)
-
Describe the characteristics of the data held in a data warehouse.
(Solved)
Describe the characteristics of the data held in a data warehouse.
Date posted:
July 4, 2018
.
Answers (1)
-
Explain why it is necessary to select the target DBMS before beginning the physical database design phase.
(Solved)
Explain why it is necessary to select the target DBMS before beginning the physical database design phase.
Date posted:
July 4, 2018
.
Answers (1)
-
Discuss the relationship between the information systems lifecycle and the database system development lifecycle.
(Solved)
Discuss the relationship between the information systems lifecycle and the database system development lifecycle.
Date posted:
July 4, 2018
.
Answers (1)
-
Define the two principal integrity rules for the relational model. Discuss why it is desirable to enforce these rules.
(Solved)
Define the two principal integrity rules for the relational model. Discuss why it is desirable to enforce these rules.
Date posted:
July 4, 2018
.
Answers (1)
-
Describe the functions that should be provided by a modern full-scale multi-user DBMS.
(Solved)
Describe the functions that should be provided by a modern full-scale multi-user DBMS.
Date posted:
July 4, 2018
.
Answers (1)
-
Describe the problems with the traditional two-tier client-server architecture and discuss how these problems were overcome with the three-tier client-server architecture.
(Solved)
Describe the problems with the traditional two-tier client-server architecture and discuss how these problems were overcome with the three-tier client-server architecture.
Date posted:
July 4, 2018
.
Answers (1)
-
Describe the five components of the DBMS environment and discuss how they relate to each other
(Solved)
Describe the five components of the DBMS environment and discuss how they relate to each other
Date posted:
July 4, 2018
.
Answers (1)
-
Explain how an interactive DVD can be used to train users of an information system
(Solved)
Explain how an interactive DVD can be used to train users of an information system
Date posted:
July 3, 2018
.
Answers (1)
-
Create a function called reverse() that takes two parameters. The first parameter called str, is a pointer to a string that will be reversed upon...
(Solved)
Create a function called reverse() that takes two parameters. The first parameter called str, is a pointer to a string that will be reversed upon return from the function. The second parameter is called count, and it specifies how many characters of str to reverse(). Give count a default value that, when present, tells reverse() to reverse the entire string.(use C++ language)
Date posted:
June 8, 2018
.
Answers (1)
-
Explain the factors determining the methods of data processing
(Solved)
Explain the factors determining the methods of data processing
Date posted:
June 7, 2018
.
Answers (1)
-
What are the disadvantages of computers
(Solved)
What are the disadvantages of computers
Date posted:
June 7, 2018
.
Answers (1)
-
The two primary objectives of Operating System
(Solved)
The two primary objectives of Operating System use
Date posted:
June 6, 2018
.
Answers (1)
-
Explain two roles of a computer driver
(Solved)
Explain two roles of a computer driver.
Date posted:
June 4, 2018
.
Answers (1)
-
List three categories of operating systems
(Solved)
List three categories of operating systems.
Date posted:
May 26, 2018
.
Answers (1)
-
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
(Solved)
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
Date posted:
May 26, 2018
.
Answers (1)