Planned sleep overs and spontaneous pillow beatings

Assignment Help Basic Computer Science
Reference no: EM131218191

Create a UML diagram which would be suitable for a pillow fight database.

The design can utilise inheritance and weak entities. Multiplicities must be listed for associations.  

Details:

The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings.  Planned sleep over fights are most common and only involve other club members.  Spontaneous pillow beatings are loads of fun and involve going out and feather bashing the public.  The database needs to help us keep track of members so that we can quickly mount a last minute flash mob pillow assault on the public. We would need to record contact information so as to spread the word as quickly as possible.

The planned pillow fights are a little different from public gatherings and often involve a sleepover at either a member's home address or some other location.  Due to several complaints about member freeloading, we also want to keep a record of who brought food (and what they brought - yoyos and other cheap as biscuits are frowned upon in this club!).  It may be handy to have some basic food rating system- perhaps a food field and a simple 1-5 food rating. If a member brings something ordinary to one of these events too often, then they may as well have brought nothing and their record gets marked as a freeloader.

For sleepovers we record multiple pillow fight rounds and who participated.  This also involves recording the winner of each round.  Because these rounds are so important to a members status (and we want to be fair and everything), we also need to record info about the types of pillows used by each member during the round (feather, foam, synthetic, memory foam/rubber, bricks, sand etc).   On completion of a members only fight, we need to record the 1stprize winner and runner up for that sleep over/pillow fight weekend. These fight rounds can be categorised as normal or "slow-mo" (as in slow motion).

Reference no: EM131218191

Questions Cloud

What organs in your body control metabolism : What organs in your body control metabolism? Can you change your metabolism? If so how? Do you believe you have a slow or fast metabolism? Research metabolism and reply to at least 2 of your classmates posts.
What makes a dna fingerprint unique : What makes a DNA Fingerprint Unique? Persuade others to accept or reject hypotheses by presenting data and interpretations. Detail data, procedures, and outcomes for future researchers.
Determine the balances of the accounts : Journalize thy adjusting entries using the following additional accounts: Salaries and Wages Payable; Rent Revenue; Insurance Expense; Depreciation Expense-Building Depreciation Expense--Equipment; and Supplies Expense. Determine the balances of t..
What noise could stand in way of effectively communicating : How can the Shannon-Weaver communications model be applied to these? What noise (interruptions or barriers) could stand in the way of effectively communicating health information within the community?
Planned sleep overs and spontaneous pillow beatings : The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings.  Planned sleep over fights are most common and only involve other club members.
What are positive and negative controls : Positive and Negative Controls in Scientific Experimental design. What are positive and negative controls? When is it useful to use positive or negative controls?
Consultant for fantasy software : Imagine you are a consultant for Fantasy Software, a small company of ten employees. The company needs to integrate Android mobile devices into its work. The company has asked you to develop the deployment plan.
Explain the difference between a biological replicate : Explain the difference between a biological replicate, a technical replicate, and an experimental replicate. Provide an example of each type of replicate for the hypothetical caffeine/blood pressure experiment explained earlier.
Major security breach occurred on a wireless network : 1) Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide n and display the result of n

Write a C++ program which calls a factorial function to calculate N!. N! is the product of all whole numbers from 1 to N. For example, the factorial of 5! is 1 * 2 * 3 * 4 * 5 = 120. Your main program will ask the user to provide N and display the..

  Database functionality and security

Sonny company is currently evaluating its database functionality and security. Explain to the company manager whether he/she has to develop the existing system or create a new one.

  Write a header block that explains the code

Write a C program that computes the Fibonacci sequence iteratively using function pointers. Output the first 20 numbers of the sequence.

  Describe ui best practices and principles

Describe UI best practices and principles. Provide examples of a few principles that you come across. Provide examples of good and poor UI design.

  Program to take input of an integer and check if palindrom

Write one program using switch/case/default that will offer user choice for all the above ^ programs (1 - 4.b) and will run in an infinite loop. One option (case) will also be to exit.

  Problem regarding the server in the remote machine

Create a chat client and server that can be used for communication between 2 users in different hosts. A sentence, typed by the user, will be transmitted to the server in the remote machine (only after ENTER is pressed) and the server will display..

  Calculate the equation of this best fit straight line

Linear regression is a method for calculating the equation of the "best" straight line that passes through a set of points. By "best," we mean the "best fit" straight line—the one that passes as closely as possible to as many points as possible. To c..

  Boolean variable called wantstoppings

After reading the input character, the program shall assign a value to a Boolean variable called  wantsToppings ( true  for a customer who wants toppings,  false  for a customer who does not).

  Rbocs in mfj to retain control of yellow pages

One way to provide additional revenues for the RBOCs in the MFJ was to retain control of the Yellow Pages.

  Find the center of mass of the solid

Find the center of mass of the solid bounded above by z=4 , on the sides by z=seq root of 25-x^2-y^2 , and outside the cylinder x^2+y^2=16 . (density = seq root x^2 +y^2)

  Change margins vertical alignment and font and font size

Change margins, vertical alignment, line spacing, and font and font size, and delete blank lines. Set tab stops using the ruler to line up information. Set tab stops and add leaders to create lines for users to fill in information.

  Demonstrate ability to collaborate with peers to analyse and

Demonstrate ability to collaborate with peers to analyse and solve business problems with information technologies, and present the solution in a team report.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd