Identify the main relationships between the entities

Assignment Help Basic Computer Science
Reference no: EM131214092

Read the following case study for a brief description of a taxi company called Fast Cabs. Each office has a manager, several taxi owners, drivers and administrative staff. The manager is responsible for the day-to-day running of the office. An owner provides one or more taxis to Fast Cabs and each taxi is allocated for use to a number of drivers. The majority of owners are also drivers. Fast Cabs taxis are not available for hire by the public hailing a taxi in the street but must be requested by first phoning the company to attend a given address. There are two kinds of clients, namely private and business. The business provided by private clients is on an ad hoc basis. The details of private clients are collected on the first booking of a taxi. However, the business provided by business clients is more formal and involves agreeing a contract of work with the business. A contract stipulates the number of jobs that Fast Cabs will undertake for a fixed fee. When a job comes into Fast Cabs the name, phone number and contract number (when appropriate) of the client is taken and then the pick-up date/time and pick-up/drop-off addresses are noted. Each job is allocated a unique job ID. The nearest driver to the pick-up address is called by radio and is informed of the details of the job. When a job is completed, the driver should note the mileage used and the charge made (for private clients only). If a job is not complete, the reason for the failed job should be noted.

(a) Identify the main entities of Fast Cabs.

(b) Identify the main relationships between the entities.

(c) Determine the multiplicity constraints for each relationship.

(d) Identify attributes and associate them with an entity or relationship.

(e) Determine candidate and primary key attributes for each entity.

(f) Using your answers (a) to (e) represent the data requirements of the Fast Cabs as an enhanced ER (EER) model. (Hint: Use optional Step 1.6 of the methodology to identify private clients (subclass) and business clients (subclass) as being special types of clients (super class).) State any assumptions necessary to support your design.

Reference no: EM131214092

Questions Cloud

Identify processes involved in identifying business problems : Identify the processes involved in identifying, formulating, and solving business problems? How do different inputs, such as environment and people, affect decision making?
Who at roanoke oversees the account review process : Examination will give you practical experience in writing a business letter and doing prewriting for an informal report - Phoenix Advertising, with its main headquarters in Charlotte, North Carolina, serves clients that include banks, insurance comp..
Evaluate the stock of woolworths limited : Assume that you are interested to evaluate the stock of Woolworths Limited. Go to Morningstar DatAnalysis Premium (http://datanalysis.morningstar.com.au.dbgw.lis.curtin.edu.au/af/dathome?).
Identify the pathophysiology of cardiovascular disorders : Select one of the following alterations of cardiovascular disorders: peripheral arterial disease, myocardial infarction, coronary artery disease, congestive heart failure, or dysrhythmia. Think about how hypertension or dyslipidemia can lead to th..
Identify the main relationships between the entities : Using your answers (a) to (e) represent the data requirements of the Fast Cabs as an enhanced ER (EER) model. (Hint: Use optional Step 1.6 of the methodology to identify private clients (subclass) and business clients (subclass) as being special t..
Determine the appraised value : Determine the appraised value. A fire station, built four years ago, has an estimated life of 50 years. The building has 20,000 square feet and the cost to replace is $100 per square foot. The lot is worth $120,000 vacant.
Obligation on the part of the holder : What is the difference between holding a short call and a long put position? Does one of these positions results in an obligation on the part of the holder?
Find fred net capital gain for the current year : Calculate Fred's net capital gain for the current year. Assume he also has a net capital loss from last year of $10,000 arising from the sale of shares
What skills be most important in future of nursing education : Based on the projected visions of tomorrow's healthcare and nursing, what skills will be MOST important in the future of nursing education ( which skills need to be a priority in nursing schools of the future)? What are they and how should they be..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Who is princeton.edu and who is princeton for starters

The Unix utility who is can be used to find the domain name corresponding to an organization, or vice versa. Read the man page documentation for who is and experiment with it. Try who is princeton.edu and who is princeton, for starters.

  Stakeholders of customer support systems

Charlie and Suzanne have been given a new assignment: PPI has decided to build a new website. All information about the company and its products will be available via the website.

  Determine the types of organizations

Analyze the major ways that cryptography can help alleviate risks that exist when using cloud computing. Determine the types of organizations that would benefit the most from enabling cryptography while using cloud computing. Provide a rationale f..

  Find levels resulting tree have if key compression is used

How many levels would resulting tree have if key compression is used and it decreases the average size of each key in the entry to 10 bytes?

  Which of the following is wrong

Which of the following is wrong? A. LDX #$5000 B. LDX #2550 C. LDX #$10000 D. LDX #$00 Explain Why!

  How to hack the most common web browser

Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.

  What are the risks to the organization

The Chief Security Officer has asked you to stop allowing error reply messages to leave the internal internets. Why is she asking you to perform this action? What are the risks to the organization if this is not done?

  Revise the extract res table () function

When NULL, the parsed results are returned from extract Res Table () as a character vector. If not NULL, the results are written to the file named in file. The write Lines () function should be helpful here.

  Disposal of technology devices and gadgets

This assignment requires you to use more presentation tools and allows you to be creative. It switches gears and addresses the disposal of our technology devices and gadgets.

  Accessing private networks connected to the internet

Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially?

  Easyphp and mysql setup

Install EasyPHP and MySQL and take a screen shot that shows the MySQL prompt on your screen. (Note: You must include the screen shot which shows that MySQL is installed on your computer as part of your assignment. An installation guide to aid the ..

  Information system to support the business

As a part of the final project for this course you will be doing research for a medium size (approximately 200 employees) widget manufacturing company to do a complete evaluation of their computer needs and make recommendations to them about an in..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd