Database management, computer science, Basic Computer Science

Assignment Help:
Suppose you are designing a database for an art museum that owns a large volume of works of art. Each work of art is described by a unique item code, a title, a type, and a size. The size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist for some works is unknown. An artist is described by a unique artist ID, a name, a date of birth, and possibly a date of death. Data are maintained about an artist only if that artist has works currently owned by the museum. At any point in time, a work of art is either on display at the museum, held in storage, away from the museum as part of a traveling show, or on loan to another gallery. If on display at the museum, a work of art is also described by its location within the museum. A traveling show is described by a unique show ID, the city in which the show is currently appearing, and the start and end dates of the show. Many of the museum works may be part of a given show, and only active shows with at least one museum work of art are to be represented in the database. Finally, another gallery is described by a unique gallery ID, its name, and its city. The museum wants to retain a complete history of lending for each work of art to other galleries, and, for each time a work is lent, the museum wants to know the date the work was lent and the date on which it was returned. Drawing manually (but neatly, in pencil), try to construct an E-R diagram for this database.

Related Discussions:- Database management, computer science

BARCODES, WHY ISN''T THE PRICE STORED ON THE BARCODE

WHY ISN''T THE PRICE STORED ON THE BARCODE

Embedded system, what question can be asked for embedded system

what question can be asked for embedded system

Write short notes on joint fiction reserve, QUESTION (i) Write short no...

QUESTION (i) Write short notes on each of the following: a) Shelf reading b) Joint Fiction Reserve c) London and South-Eastern Library Region d) Document access

Normalization, how we come to know about primary key,if more than ids gathe...

how we come to know about primary key,if more than ids gather?

Transmission control protocol, The TCP/IP networking protocol suite is so b...

The TCP/IP networking protocol suite is so basically named for two of its very most and important protocols: Transmission Control Protocol online tutoring Indication Manage

ICT IN BUSINESS, Explain how ICT can be used for achievement of each of the...

Explain how ICT can be used for achievement of each of the following business objectives, illustrating your answer with examples: 1. Customer intimacy 2. Low-cost leadership

Define jumps and loops , The unconditional jumps in a written program in a...

The unconditional jumps in a written program in assembler language are specified by the jmp instruction; a jump is to moves the flow of the execution of a program by sending the co

Computer, hitory and genration of computer

hitory and genration of computer

What is .net framework, Qestion 1 What is .Net Framework? Qestion 2 W...

Qestion 1 What is .Net Framework? Qestion 2 Write short notes on constructors and destructors Qestion 3 Explain boxing and unboxing with examples Qestion 4 What is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd