Difference between a composite key and attribute, Database Management System

Assignment Help:

Question:

(a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate example.

(b) Use the following business rules to produce the E-R diagram. Identify at least two attributes for each of the identified entity. You should clearly show all the minimum and cardinality constraint on each side of the relationship.

(i) A department employs many employees, but each employee is employed by one department.

(ii) Some employees, known as "rovers," are not assigned to any department.

(iii) A division operates many departments, but each department is operated by one division.

(iv) An employee may be assigned to many projects and a project may have many employees assigned to it.

(v) A project must have at least one employee assigned to it.

(vi) One of the employees manages each department.

(vii) One of the employees runs each division.

(c) Map the ERD produced into its equivalent Relational Schema.


Related Discussions:- Difference between a composite key and attribute

What is vertical fragmentation, What is vertical fragmentation? Vertica...

What is vertical fragmentation? Vertical fragmentation divides the relation by decomposing the scheme R of relation r.

What is null, What is NULL? Simply NULL means not in value.

What is NULL? Simply NULL means not in value.

Project operation, The PROJECT operation The project operation is used t...

The PROJECT operation The project operation is used to choose the records with specified attributes as discarding the others based on some related criteria. This is denotes as ∏

Define deferred update technique of recovery, Discuss deferred update techn...

Discuss deferred update technique of recovery.  What are the advantages?  Ans:  The deferred update methods do not physically update the database on disk till after a transact

Design and building a distributed information system, The scenario You ...

The scenario You have been approached to design and implement a prototype of a distributed information system for a national car part retail outlet chain. The company comprises

Describe the grant function and explain security, Describe the GRANT functi...

Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked? Ans: Since more than one user can aacce

Differentiate between key and superkey, Differentiate between Key and super...

Differentiate between Key and superkey? Key and superkey - A key a single attribute or a combination of two or more attributes of an entity set in which is used to identify o

Which is a valid sql type, Which is a valid SQL type? A valid SQL Shoul...

Which is a valid SQL type? A valid SQL Should be in CHARACTER it is should be NUMERIC and FLOAT.

What are axioms, What are axioms? Axioms or rules of inference give a s...

What are axioms? Axioms or rules of inference give a simpler technique for reasoning about

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd