Nobody downloaded yet

Database - Assignment Example

Comments (0) Cite this document
Task 1 a) and b) The ER-Diagram consists of five main entities, namely CLASS/VISIT, BOOKING, OWNER, DOG, and INVOICE. The relationships can be explained in detail considering their cardinalities, participations and constraints according to the given scenario…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Read TextPreview

Extract of sample "Database"

Download file to see previous pages A class can either have no bookings as minimum or 10 bookings as maximum (cardinality marked as (0, 10) near CLASS/VISIT entity). A booking must always have a class related to it and one class is the maximum (cardinality marked as (1, 1) near BOOKING entity). BOOKING and OWNER An OWNER can have several BOOKINGs and a one BOOKING have a single corresponding OWNER. Hence, one to many relationship exits between these entities (Marked with 1 and M near the respective entity). An OWNER may always have a booking and a booking should always have owner. It is considered a BOOKING and OWNER are mandatory for each other. An OWNER at least has one booking in minimum or many bookings (cardinality marked as (1, M) near OWNER entity). A booking must always have a owner related to it and one owner is the maximum (cardinality marked as (1, 1) near BOOKING entity). OWNER and DOG An OWNER can have several DOGs and a DOG have a single OWNER. Hence a one to many relationship exits between these entities (Marked with 1 and M near the respective entity). An owner may always have at least a dog and a dog should always have owner. Hence it is considered a BOOKING and OWNER are mandatory for each other. An owner at least has one dog or many dogs (cardinality marked as (1, M) near OWNER entity). ...
A composite entity ‘attend’ was introduced as the linking entity (marked as 1:M on either side of the composite entity). A class may always have a many dogs attending or no dogs attending a class (marked with a circle on the composite entity). A dog should always attend a class. Hence it is considered a DOG is optional for a CLASS/VIST. A class can either have no dogs attending or 10 dogs as maximum (cardinality marked as (0, 10) near CLASS/VISIT entity). A dog must always have at least a class related to it and one class is the maximum (cardinality marked as (1, 1) near BOKING entity). BOOKING and INVOICE An INVOICE can be related only for a one BOOKING and a one BOOKING have a single corresponding INVOICE. Hence a one to one relationship exits between these entities (marked with 1 and 1 near the respective entity). An invoice always has a booking and a booking should always have an invoice. It is considered a BOOKING and INVOICE are mandatory for each other. An INVOICE always has one booking or many bookings as minimum and maximum (cardinality marked as (1, 1) near INVOICE entity). A booking must always have an invoice related to it and one invoice is the maximum (cardinality marked as (1, 1) near BOOKING entity). The primary and foreign key relevant to each entity is presented in their entity definition table as PK and FK respectively. Entity DEFINITION Entity Name: CLASS/VISIT   Entity Description: The details of the Classes and Visits are recorded here Attribute Name Data Type Field Length Required Y/N Validation Rule Primary Key / Foreign Key class_id text 50 Y Not Null PK class_name text 100 Y     class_day text 15 Y     class_max capacity integer 2 Y     class_start_date date 20 Y     Entity DEFINITION Entity Name: BOOKING   Entity Description: ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Database Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from
(Database Assignment Example | Topics and Well Written Essays - 1000 Words)
“Database Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document



..., organizations need to formulate information security strategies (ISS). In addition, customers have to be capable to recognize an organization’s place in scenario of defending their data and information. Consequently, privacy policy is considered as a tool to express organizational policies to the customers (Pacocha, 2002) and (Curphey & Araujo, 2006). The data warehouse is large size data storage accessed from numerous sources (legacy and operational) databases. Additionally, the data-warehouse is built but combining diverse data sources or changing them into a new structure. However, this process involves a lot of activities such as cleaning, reading, storing and aggregating the data in the warehouse representation. In...
8 Pages(2000 words)Essay

Database Management

...effective information. And this is possible only for a well modeled data. The tutorial presents real life scenarios that a company might face from the time of its initialization to the time when it has let go of certain high salary employees in situations of crises e.g. limited company finances. The tutorial teaches how big organizational level decisions can be reached upon by executing a simple query on the database and extracting the exact subset of information relevant to a particular decision e.g. generating a list of employees with a particular range of salaries. This example merely gives an introduction of how statistical analysis can be conducted on large scale databases. Having relevant...
2 Pages(500 words)Research Paper


...? Happy Homes Database System Database security The security of a database system should be up to The data held by a database is ofgreat importance and loss or damage to that data could result into great consequences to the organization. Happy Homes Ltd has a database for the storage, access, and management of information required for its normal operations. To enhance the security of the database, several key concepts have to be looked at and properly set. This enhances maximum operation and security of the database. First, the issue of access control should take center stage while discussing the security concepts. This...
5 Pages(1250 words)Coursework


...? Creating an Extended Entity Relationship Model (EERM) Creating an Extended Entity Relationship Model (EERM) We use a classical four-layered approach to inductive specification of database structures. The first layer is the data environment, called the basic data type scheme, which is defined by the system or is the assumed set of available basic data. The second layer is the schema of a given database. The third layer is the database itself representing a state of the application's data often called micro-data. The fourth layer consists of the macro-data that are generated from the micro-data by application of view queries to the micro-data (DIETRICH, 2011). The second layer is diversely treated by database modeling languages... for...
6 Pages(1500 words)Assignment


...are held on record. Products are identified by their name and records of the product type and a description of the product are kept. i.) Design an E-R diagram for the above database ii.) Derive a corresponding relational scheme from your E-R diagram. Table Assets: assetID (primary) productID (primary) location LeaseRenewalDate Table Assets Inspection: inspectionID (primary) inspectorID (primary) assetID (primary) maintenanceDate maintenanceAction Table Inspectors: inspectorID (primary) name position Table Products: productID (primary) name type description Question 2: A garden plant supplier keeps data about their customers, orders and the plants they sell in a relational database with the...
4 Pages(1000 words)Assignment

Database Management. MSSQL Server Database

...Running head: Database Management Database Management Introduction Navathe (2003) defines database as a collection of programs that enables users to create and maintain a database. It can also be defined as general purpose software for defining, creating, fetching and sharing databases among various users. The flavors of the databases used for e-commerce websites follow a different pattern set for storing data and offer various storage patterns and features to enable it to be distinguished from the competitor. In this case the university requirements deal with a variety of services which requires their data to be stored in a...
3 Pages(750 words)Essay


...Databases An electronic database is an organized collection of data in a digital form, to achieve a properly working database. A specific user requirement needs to be well elicited before the design and development takes place. These requirements are in two categories; functional and non functional. The functional ones are. First, it should allow users to create new trainers and topics; secondly, it should allow creation deletion of users. It should also allow only authorized users to make changes in the data stored example the trainers should not have the privilege of making changes on schedules and topics, it should allow easy production of standardized reports. The developer should...
1 Pages(250 words)Essay

Description of Bioterrorism Response System

...Bioterrorism Response System Introduction To respond to bioterrorism attacks, health officials must play their part in helping detect, communicate and manage such events. Technological advance enables health officials, including nurses to respond to an attack. To create a database for use in bioterrorism response, certain factors have to be considered; purpose of the system, being detection, diagnosis, management, and communication, clinical evaluation of the system and system security (Gill, 2008). Information from the system should help officials make accurate decisions. For the system to function accordingly, it has to have a measure of accuracy. Sensitivity is required in order to detect the smallest hints of attack....
1 Pages(250 words)Research Paper

Database design and SQL Light database creation

...Database Schema Sarita Gogan Grand Canyon HIM-650 Health Care Data Management February 20, Database Schema for a health care clinic The entities and relationships of health care clinic are indicated below together with their relationship; Table 1 : Entities, Attributes and their Relationships Entity Attributes Relationship Deleted_Date Health Care Center Name, address, location Attends to patients Patients Patient number, first name, last name, phone, next of kin, address Patients report in the clinic Appointments Patient number, date, time , appointment number Patients are allocated appointments Prescriptions Patient number ,medicine ,description ,treatment ID Pharmacists give medicine to the patients after being attended... to the...
3 Pages(750 words)Essay

Database Management

...fittings that meet the growing population needs. The wild wood company offers fair rates to employees who live and maintain the apartments. It is the tradition of the wild wood apartments to ensure that they meet to discuss on how to improve the standards of their apartments and plan to expand their business in real estate. Tenants fill questionnaires every end month to air out complaints or suggest on new ways to maintain the apartments. SCOPE The introduction of a database will be to meet the daily needs of the employees and the tenants who live within the Wild Wood apartments. It will also help in keeping of records of the apartments such as expenditure and the rents paid by the tenants. The database...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Database for FREE!

Contact Us