How to produce a data model segment

Assignment Help Computer Engineering
Reference no: EM1326736

The FlyRight Aircraft Maintenance (FRAM) division of the FlyRight Company (FRC) performs all maintenance for FRC's aircraft. Produce a data model segment that reflects the following business rules:

All mechanics are FRC employees. Not all employees are mechanics.

Some mechanics are specialized in engine (EN) maintenance. Some mechanics are specialized in airframe (AF) maintenance. Some mechanics are specialized in avionics (AV) maintenance. (Avionics are the electronic components of an aircraft that are used in communication and navigation.) All mechanics take periodic refresher courses to stay current in their areas of expertise. FRC tracks all course taken by each mechanic?date, course type, certification (Y/N), and performance.

FRC keeps a history of the employment of all mechanics. The history includes the date hired, date promoted, date terminated, and so on. (Note: The "and so on" component is, of course, not a real-world requirement. Instead, it has been used here to limit the number of attributes you will show in your design.)

Reference no: EM1326736

Questions Cloud

Discuss pros of using automated testing tools : Why do so many in-house applications never get finished.
Exemplifying the negligence : Dona gets permission from her mother (single mom) to spend the weekend with her friend and her friends parents.
What are the advantages of using the scsi devices : What will be different about performing a hard-drive-to-tape backup with IDE devices and with SCSI devices? What are the advantages of using SCSI devices over IDE devices for the backups.
Method promote to attract competitive workforce : Evaluate and identify three (3) methods or guidelines a personnel manager should promote in order to find and attract a competitive workforce.
How to produce a data model segment : Some mechanics are specialized in engine (EN) maintenance. Some mechanics are specialized in the airframe (AF) maintenance. Some mechanics are specialized in avionics (AV) maintenance.
Elucidate how might raise the chance that the employee : Elucidate how might  raise the chance that the employee would retire earlier as compared with the situation where the employee had to pay for his own health insurance.
Explaining about the tort liability : Mary is cutting weeds at her home. She is unable to trim some weeds she finds, because they grew between the rocks.
Marlene will live for for more time duration : Marlene will live for for more  time duration. In the current period, she has the option of attending college.
Describe the differences among b2b : Describe the differences among B2B and What do the abbreviations mean

Reviews

Write a Review

Computer Engineering Questions & Answers

  Creating a new domain tree root checkbox

In case, I select the “Create a new domain tree root checkbox” in place of the “Create a new child domain checkbox”, how would configuration of the forest be different?

  Create a simplify credit card transaction management program

Create a simplify credit card transaction management program.

  Benefits of ansi/tia/eia cabling standards

Discuss about the benefits of the ANSI/TIA/EIA cabling standards in detail and also explain why telecommunications managers must be familiar with them.

  Troubleshooting the infected system

AV software has eliminated the malware from a highly infected system. After first reboot, an error message is displayed which consists of a reference to the strange DLL file which is missing.

  Determining stationary points of function

Determine the stationary points of function F(x)=2x_1^3-3x_1^2-6x_1 x_2 (x_1-x_2-1). Which points among these are local minima, which are local maxima, and which are neither?

  Four methods to provide data backup

What are the four methods used by the servers in order to provide the data backup, decrease the response time, and decrease the network and the server access time?

  Illustrate decryption equation

Illustrate decryption equation.

  Constructing threat model to explain risk

Construct a simple threat model which explains the risk this represents: attacker(s), vulnerability, attack vector, assets, and likelihood of the occurrence, likely impact, and plausible mitigations.

  Drawing the uml state diagram

In the chess game white and black make alternate moves. White takes first move. Both Black and White may finish the game: by winning, by giving up, by draw.

  What is the memory operations dominate execution time

What is  the memory operations dominate execution time

  What is advantage of payroll scheme approach for the project

What is advantage of payroll scheme approach for the project? What do you think is the most suitable Life Cycle Approach?

  Creating a source documents on access 2010

Explain how to generate a source documents on the access 2010 with the information to involve the password, user ID, name, telephone, address, item number, e-mail address, bid offered, and method of payment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd