Database management, computer science, Basic Computer Science

Assignment Help:
Suppose you are designing a database for an art museum that owns a large volume of works of art. Each work of art is described by a unique item code, a title, a type, and a size. The size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist for some works is unknown. An artist is described by a unique artist ID, a name, a date of birth, and possibly a date of death. Data are maintained about an artist only if that artist has works currently owned by the museum. At any point in time, a work of art is either on display at the museum, held in storage, away from the museum as part of a traveling show, or on loan to another gallery. If on display at the museum, a work of art is also described by its location within the museum. A traveling show is described by a unique show ID, the city in which the show is currently appearing, and the start and end dates of the show. Many of the museum works may be part of a given show, and only active shows with at least one museum work of art are to be represented in the database. Finally, another gallery is described by a unique gallery ID, its name, and its city. The museum wants to retain a complete history of lending for each work of art to other galleries, and, for each time a work is lent, the museum wants to know the date the work was lent and the date on which it was returned. Drawing manually (but neatly, in pencil), try to construct an E-R diagram for this database.

Related Discussions:- Database management, computer science

Define and explain flow chart with an example, Question 1 Define and expla...

Question 1 Define and explain flow chart with an example Question 2 Write an algorithm to print all even numbers in descending order and draw the flowchart Question 3 Explain

Some CPUs provide multiple modes of operation, even though most systems onl...

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

Generic techniques in artificial intelligence, G e ne ric Techniques Dev...

G e ne ric Techniques Developed: In  the  pursuit  of  solutions  to  many   problems  in  the  above  categories,  serval specific  techniques have sprung up which have bee

Programmable rom (prom) , PROGRAMMABLE ROM (PROM): The user can program...

PROGRAMMABLE ROM (PROM): The user can program a PROM after purchase.  Each memory bit element in the PROM contains a nichrome or silicon link that acts as a fuse.  The user can

What is a signaling protocol, QUESTION (a) How VoIP Works and how VoIP ...

QUESTION (a) How VoIP Works and how VoIP helps today's business? (b) What is a signaling protocol? Explain about SIP components and their key benefits (c) What is IPTV? L

Cpu, what is cpu

what is cpu

Learn, The technique to mix C and assembly language is to apply the "asm" d...

The technique to mix C and assembly language is to apply the "asm" directive. To access C-language variables from assembly language, you just use the C identifier that name is a me

How to crack a password, how can i crack the password of vmware virtual mac...

how can i crack the password of vmware virtual machine

Explain digital multiplexers, Problem 1 Perform the following conversio...

Problem 1 Perform the following conversion a. (ABE) 16 =() 2 b. (101011) 2 =() 10 2 Explain how full adder adds three bits 3 Explain digital multiplexers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd