edited by
385 views
0 votes
0 votes

Consider a relation $\text{R}$ with attributes $\{ \text{A, B, C} \}$ and functional dependency set $\text {S= \{ A} \rightarrow \text{B, } \text{A} \rightarrow \text{C} \; \}.$ Then relation $\text{R}$ can be decomposed into two relations :

  1. $ \text{R1} \{ \text{A, B} \} \; \text{AND} \; \text{R2} \{ \text{A, C} \} $
  2. $ \text{R1} \{ \text{A, B} \} \; \text{AND} \; \text{R2} \{ \text{B, C} \} $
  3. $ \text{R1} \{ \text{A, B, C} \} \; \text{AND} \; \text{R2} \{ \text{A, C} \} $
  4. None of the above
edited by

1 Answer

1 votes
1 votes
The given relation is R{A,B,C}

Functional dependency {A->C,A->B}

Candidate key is A.

option B:- the decomposed relation is R1{A,B} ,R2{B,C}

the common attribute is B.

now B is not key in any of the table.

so this decomposition is lossy.

The given decomposition is binary so we can apply these method otherwise go with chase algorithm.

so option B is false.

Option C: – R1{A,B,C} ,R2{A,C}

they told to decompose and gave the same table along with another table R2{A,C}.

It only create redundancy makes no sense .

so this option is also false.

option A .

It is true.

the decomposed relation is R1{A,B} ,R2{A,C}

Common attribute is A which is key in Key in both the table.

so correct answer is A.

Related questions

1 votes
1 votes
1 answer
1
soujanyareddy13 asked Jan 9, 2022
948 views
Let the predicates $D(x,y)$ mean “team $x$ defeated team $y$” and $P(x,y)$ mean “team $x$ has played team $y$”. The quantified formula for the statement that ther...
0 votes
0 votes
1 answer
2
soujanyareddy13 asked Jan 9, 2022
604 views
The File Transfer Protocol is built on ______________.data centric architectureservice-oriented architectureclient server architectureconnection-oriented architecture
0 votes
0 votes
1 answer
3
soujanyareddy13 asked Jan 9, 2022
529 views
More than one word is put in one cache block to:exploit the temporal locality of reference in a programexploit the spatial locality of reference in a programreduce the mi...
0 votes
0 votes
1 answer
4
soujanyareddy13 asked Jan 9, 2022
446 views
In $\text{DPSK}$ technique, the technique used to encode bits is :$\text{AMI}$Differential codeUnipolar $\text{RZ}$ formatManchester formate