Creating er diagram

Assignment Help Operating System
Reference no: EM1379133

Question: Construct a table for consumer. The manager tells me that this table needs to track the following data: all customers' social security number, first and last name, address, city, state and zip code, email, phone number, birth date, and date of applying for a library card. Your task is to first "sketch" a customer table (basically what data items or columns should be included in the table) using the Customer_information table at background section as an example. The table should contain the following:

- Column heading include all the attributes that need to be in this table.
- Populate the table with five records of data

Design one more table: Customer checkout table to track the books and CDs that the customer has checked out from the library. Customers and Customer Checkout table are related to one another.

The Customer table contains the basic data on each customer and the primary key is customer number. There is one row for each customer.

The Customer Checkout table contains the data for each book. The primary key consists of two pieces of data: Checkout number and customer number. One customer can check out 1 or more books/CDs at a time, but only one customer on a check out order.

If I were to draw an ER diagram of my complete design for the community library, I could use Visio, or Microsoft word feature to draw the chart, or write down the table schemata and describe the relationships among them.

 

Reference no: EM1379133

Questions Cloud

Asymmetric encryption algorithm : Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:
Program of law of total probability : Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.
Design several security awareness posters : With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.
Maximum utilisation of the corporate intranet link : Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.
Creating er diagram : Construct a table for consumer. The manager tells me that this table needs to track the following data: all consumers' social security number, first and last name, address, city,
Java program editing : Prompt the user for the student's score and put that value into an object
Finding java code error : Indicate in the given code segment if an error occurs. If so, point to whether it is syntax, runtime or logic and how you would fix it.
Write the bubble sort : The village of Marengo conducted a census and collected records that have household data, including the number of occupants in each household.
Describe an example of an equity investment : Describe an example of an equity investment that can also produce income and describe a real or made up but realistic situation that could cause you or someone you know to have to use money from a financial reserve.

Reviews

Write a Review

Operating System Questions & Answers

  Deadlock avoidance

i. Deadlock avoidance ii. Deadlock prevention and  iii. Deadlock detection

  Use of the ipc facilities provided by unix

The purpose of this program is to change such that it makes use of the IPC facilities provided by UNIX.

  What is life cycle costing

What is Life Cycle Costing. Describe briefly the methodology for Life Cycle Costing. What are the criteria to consider when a procurement officer is faced with the decision of procuring a used equipment instead of a new one.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Illustrate results applying deadlock detection algorithm

Illustrate the results applying deadlock detection algorithm to following data. Give proper description for supporting your answer.

  Multilevel feedback queues and fcfs

What (if any) relation holds between the following pairs of sets of algorithms (a) Priority and SJF (b) Multilevel feedback queues and FCFS

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Challenges os faces-passing parameter among user-kernel mode

Write two challenges an OS faces when passing parameters between user and kernel mode. Describe how an OS can overcome them

  Central role of information systems in organisations

Information systems have become so integrated into the UK society and economy that the cashless society is a realistic possibility within the next 25 years.

  Fragmented mean in reference to hard drives

What does fragmented mean in reference to hard drives, and what, if anything, should be done to prevent it. Describe the general path data takes in an application from user input to the computer hardware.

  Explain how to implement barriers using semaphores

Show how to implement barriers using semaphores. Your solution should avoid busy-waiting. Be explicit about any initializations that you need to assume.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd