Reference no: EM131218191
Create a UML diagram which would be suitable for a pillow fight database.
The design can utilise inheritance and weak entities. Multiplicities must be listed for associations.
Details:
The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings. Planned sleep over fights are most common and only involve other club members. Spontaneous pillow beatings are loads of fun and involve going out and feather bashing the public. The database needs to help us keep track of members so that we can quickly mount a last minute flash mob pillow assault on the public. We would need to record contact information so as to spread the word as quickly as possible.
The planned pillow fights are a little different from public gatherings and often involve a sleepover at either a member's home address or some other location. Due to several complaints about member freeloading, we also want to keep a record of who brought food (and what they brought - yoyos and other cheap as biscuits are frowned upon in this club!). It may be handy to have some basic food rating system- perhaps a food field and a simple 1-5 food rating. If a member brings something ordinary to one of these events too often, then they may as well have brought nothing and their record gets marked as a freeloader.
For sleepovers we record multiple pillow fight rounds and who participated. This also involves recording the winner of each round. Because these rounds are so important to a members status (and we want to be fair and everything), we also need to record info about the types of pillows used by each member during the round (feather, foam, synthetic, memory foam/rubber, bricks, sand etc). On completion of a members only fight, we need to record the 1stprize winner and runner up for that sleep over/pillow fight weekend. These fight rounds can be categorised as normal or "slow-mo" (as in slow motion).
What organs in your body control metabolism
: What organs in your body control metabolism? Can you change your metabolism? If so how? Do you believe you have a slow or fast metabolism? Research metabolism and reply to at least 2 of your classmates posts.
|
What makes a dna fingerprint unique
: What makes a DNA Fingerprint Unique? Persuade others to accept or reject hypotheses by presenting data and interpretations. Detail data, procedures, and outcomes for future researchers.
|
Determine the balances of the accounts
: Journalize thy adjusting entries using the following additional accounts: Salaries and Wages Payable; Rent Revenue; Insurance Expense; Depreciation Expense-Building Depreciation Expense--Equipment; and Supplies Expense. Determine the balances of t..
|
What noise could stand in way of effectively communicating
: How can the Shannon-Weaver communications model be applied to these? What noise (interruptions or barriers) could stand in the way of effectively communicating health information within the community?
|
Planned sleep overs and spontaneous pillow beatings
: The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings. Planned sleep over fights are most common and only involve other club members.
|
What are positive and negative controls
: Positive and Negative Controls in Scientific Experimental design. What are positive and negative controls? When is it useful to use positive or negative controls?
|
Consultant for fantasy software
: Imagine you are a consultant for Fantasy Software, a small company of ten employees. The company needs to integrate Android mobile devices into its work. The company has asked you to develop the deployment plan.
|
Explain the difference between a biological replicate
: Explain the difference between a biological replicate, a technical replicate, and an experimental replicate. Provide an example of each type of replicate for the hypothetical caffeine/blood pressure experiment explained earlier.
|
Major security breach occurred on a wireless network
: 1) Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting i..
|