The company has several branch offices

Assignment Help Basic Computer Science
Reference no: EM13701815

A company that sells and installs tiles needs a database with the requirements specified below. Your task is to design and implement a relational database that meets all their requirements.

* Please let me know if you need further clarifications on any of the requirements.

* If you need to make any other assumptions, please state your assumptions explicitly.

Requirements:

The company has several branch offices. Each branch is identified by a branch_number. The name, address (street, city, ZIP), and revenue_target of each branch office are maintained. Each branch has a designated branch manager and the branch manager's employee_ID is maintained.

Each employee has a unique employee_ID. The company maintains the first name, last name, designation, starting_date, branch_number, salary, and supervisor's employee_ID for each employee.

Each product sold by the company is identified by a unique product_code. The description, unit price, and stock_level of each product are maintained.

Each type of installation performed by the company is identified by a unique installation_type. The description and the billing_rate per hour for the installation_type are maintained.

Customers are identified by unique customer_ID. Information is maintained on each customer's address (street, city, ZIP) and phone_number.

Each order is identified by unique order_number. Each order is placed by a unique customer on a specific date. An employee is designated as the salesperson for each order.

A customer order may include orders for multiple products and installation services. For each product in an order, the quantity_ordered is recorded. For each installation_type ordered, the estimated number_of_hours for installation is recorded. Note that there may be orders that include products but no installation services. Similarly, there may be orders that include installation services but no products.

Specific Tasks:

1. Present an Entity-Relationship model that meets the above requirements. Try to ensure that your model has no many-to-many relationships.

2. Present a logical data model to meet the requirements where all the tables are in the third normal form. Specify all the attributes, primary keys and foreign keys of the tables. For each attribute specify the data type and domain.

3. Implement the database designed in step 2 using any DBMS of your choice. Populate the tables with sample data.

4. Formulate SQL queries for the following:

(i) For each salesperson, list the salesperson's Employee_ID, Name, supervisor's Employee_ID, and supervisor's name.

(ii) For each product list the Product_code, stock_level, and the total quantity ordered.

(iii) For each Order list the Order_number, order date, Employee_ID of salesperson, total amount for products, and total amount for installation. The total amount for products is the sum of the unit price times quantity of the products ordered. The total amount for installation is the sum of number_of_hours times the billing_rate of the installation types.

(iv) The revenue_generated by a branch is the sum of the total amount of all orders for salespersons working at that branch. The total amount of an order is given by the sum of the total amount for products and the total amount for installation. List the branch number, branch name, revenue_target, and the revenue_generated for each branch that fails to meet its revenue_target.

(v) List the list the Employee_ID and name of salespersons who have sold only to customers located in the same city as the city in which the salesperson's branch is located.

(vi) List the list the Employee_ID and name of salespersons who have sold to every customer located in the same city as the city in which the salesperson's branch is located.

Reference no: EM13701815

Questions Cloud

Describe how e-commerce begin and what made it successful : 1). Describe how e-commerce begin and what made it successful. 2). Explain the advantages and disadvantages of outsourcing when it comes to technology.
Find how close to the fixed charge does the particle get : A positive charge of 5.00 µC is fixed in place. How close to the fixed charge does the particle get before it comes to rest and starts traveling away
Explain the three general sources of security threats : Explain the three general sources of security threats
What basic steps are required for analyzing data using micro : Write a 200 word response that answers the following questions: What basic steps are required for analyzing data using Microsoft®Access®? How could these steps help you diagnose and troubleshoot Microsoft®Access®errors? Which of the five steps presen..
The company has several branch offices : The company has several branch offices. Each branch is identified by a branch_number. The name, address (street, city, ZIP), and revenue_target of each branch office are maintained. Each branch has a designated branch manager and the branch man..
Topic cloud computing security : Topic Cloud Computing Security. Research Paper Instructions 1. Summary of Research Paper Instructions
The class is analysis and design of information systems : Guidelines: Grading will include content supported with examples, research and references with in-text citations, grammar and spelling. A minimum of 250 words is required.
Software engineering code of ethics : 1. "Software Engineering Code of Ethics and Professional Practice" Please respond to the following:•Describe one of the eight principles of the ACM Software Engineering Code of Ethics and Professional Practice and explain why the principle is impo..
Locate vendors of biometric products : Using the Web, locate vendors of biometric products. Find one vendor with a product designed to examine each characteristic mentioned in your textbook. What is the CER associated with each product? Which would be more acceptable to users? Which..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The most frequent cause of it implementation failures

An evaluation of what you think is the most frequent cause of IT implementation failures. Justify your answer. Explain how change in management can help solve software implementation failures.

  Explaining records are stored and accessed on storage medium

Which of the given correctly explains a way in which data records are stored and accessed on storage medium?

  Describe the syntax of programming languages

Please provide an example of where and how BNF might be used to solve real-world problems (by this I mean problems outside the languages and compiling domain). Please be specific and provide an example.

  Describes how you have used abstraction as a strategy

Give an example that describes how you have used abstraction as a strategy and how it was beneficial to you.

  Write a program that computes terms of the fibonacci series

Write a program that computes terms of the Fibonacci series, defined as: 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, ... Each term in the series is the sum of the preceeding two terms.

  What protocol unit is being used in layer 2

Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

  What is the difference between where and having clauses

What is the difference between WHERE and HAVING clauses

  Sketch hierarchy chart and draw logic for program

Sketch the hierarchy chart and draw the logic for program which comprises housekeeping, detail loop and end-of-job modules and which computes service charge customers.

  Write a program that reads in two floating-point numbers and

Write a program that reads in two floating-point numbers and tests whether they are the same up to two decimal places. here are two sample runs.

  Internal e-mail getting hacked from the outside

Great Widgets is having a problem with the e-mail server it uses for internal e-mail getting hacked from the outside. One of its network folks has suggested an intranet, but the CEO, T. J. Alexander, is not up to speed about how an intranet wor..

  Early proof of concept

Currently our organisation has a sample running application to sell books which has been designed as an early proof of concept. The application can be found in your installation at C:glassfish3glassfishdocsjavaee-tutorialexamplescase-studiesdukes-boo..

  Determine the source rate r

Suppose that 30 pictures are sent per second. (This digital source is roughly equivalent to broadcast TV standards that have been adopted.) Determine the source rate R (bps).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd