Convert the above e-r diagram into a set of relations

Assignment Help Basic Computer Science
Reference no: EM131058120

Temporal changes: An E-R diagram usually models the state of an enterprise at a point in time. Suppose we wish to track temporal changes, that is, changes to data over time. For example, Zhang may have been a student between 1 September 2005 31 May 2009, while Shankar may have had instructor Einstein as advisor from 31 May 2008 to 5 December 2008, and again from 1 June 2009 to 5 January 2010. Similarly, attribute values of an entity or relationship, such as title and credits of course, salary, or even name of instructor, and tot_cred of student, can change over time.
One way to model temporal changes is as follows. We define a new data type called valid time, which is a time-interval, or a set of time-intervals. We then associate a valid time attribute with each entity and relationship, recording the time periods during which the entity or relationship is valid. The end-time of an interval can be infinity; for example, if Shankar became a student on 2 September 2008, and is still a student, we can represent the end-time of the valid_time interval as infinity for the Shankar entity. Similarly, we model attributes that can change over time as a set of values, each with its own valid time.

a. Draw an E-R diagram with the student and instructor entities, and the advisor relationship, with the above extensions to track temporal changes.

b. Convert the above E-R diagram into a set of relations.

It should be clear that the set of relations generated above is rather complex, leading to difficulties in tasks such as writing queries in SQL. An alternative approach, which is used more widely is to ignore temporal changes when designing the E-R model (in particular, temporal changes to attribute values), and to modify the relations generated from the E-R model to track temporal changes, as discussed later in Section 8.9.

Reference no: EM131058120

Questions Cloud

Why then do we have weak entity sets : Why, then, do we have weak entity sets?
Question regarding the discrete distribution : The Binomial Distribution is a discrete distribution because there are only two possibilities: Yes/No, Heads/Tails etc. What is the probability of tossing three Heads in a row?
Break-even point and sensitivity analysis : Sensitivity Analysis and Break-Even Point: We are evaluating a project that costs $644,000, has an eight-year life, and has no salvage. Assume that depreciation is straight-line to zero over the life of the project. Sales are projected at 70,000 unit..
What are the monthly payments on the mortgage : What are the monthly payments on the mortgage? Construct the amortization schedule for the first 10 payments. If the rate offered was 7.50 percent, what would the monthly payments be?
Convert the above e-r diagram into a set of relations : Draw an E-R diagram with the student and instructor entities, and the advisor relationship, with the above extensions to track temporal changes.
Planning process for a firm : You are involved in the planning process for a firm that is expected to have a large increase in sales for the next year. Which type of firm would benefit the most from that sales increase: a firm with low fixed costs and high variable costs or a ..
Concerned with the accounting break-even point : Break-Even Point: As a shareholder of a firm that is contemplating a new project, would you be more concerned with the accounting break-even point, the cash break-even point (the point at which operating cash flow is zero), or the financial break-eve..
Incremental cash flows : Incremental Cash Flows: Which of the following should be treated as an incremental cash flow when computing the NPV of an investment?
Assuming the pure expectations theory-actual interest rate : On March 2, 2015, assuming the pure expectations theory is correct, what was the expected interest rate on a 1-year bond one year later? How does this compare with the actual interest rate on a 1-year bond one year later? Using the data for March 2, ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find out how http version 1.1 avoids this

Find out how HTTP version 1.1 avoids this. How might a general-purpose request/reply protocol address this?

  Design a complete program - area of a retangle

Design a flowchart and write the pseudocode for this program including a function that accepts a rectangle''s width and length as arguments and returns the rectangle's area.

  Scope and lifetime are distinct

Scope and lifetime are distinct yet related issues in programming languages. Languages can sometimes make design decisions that cause a conflict between the scope and the lifetime of variables. Java's decision to allow classes to be defined inside..

  Explain use of compensatory substituent in identification

Explain the use of "compensatory substituent" in identification and annotation of non-coding genes? Write down the difference between matrix and a Blosum60 Blosum20 matrix?

  Use xml and retrieve the stored data using dom parser

project that requires me to use XML and retrieve the stored data using DOM parser. I have it written to the point that it writes regular equations no problem. But I want to include graph using images in the form of JPEG.

  Identify a possible improvement to the application

Identify a possible improvement/enhancement to the application in question and document an enhancement request with user requirement specifications.

  Assignment on business intelligence and data warehouses

Business Intelligence and Data Warehouses

  While budget and schedule are critical components of project

While budget and schedule are critical components of projects

  Why did you define and assign a sales area to your company

Why have Scheduling Agreements become so important for component suppliers serving manufacturers?

  Illustrate how compiler would unroll loop four times

Illustrate how compiler would unroll loop 4 times. Make sure to include code which compute all the pointers required for operation within each iteration. suppose that processor has as many registers as required.

  What technologies should be used to secure these areas

On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

  A mechanism for deciding when to report an rtp packet

Propose a mechanism for deciding when to report an RTP packet as lost. How does your mechanism compare with the TCP adaptive retransmission mechanisms of Section 5.2.6?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd