Convert the above e-r diagram into a set of relations

Assignment Help Basic Computer Science
Reference no: EM131058120

Temporal changes: An E-R diagram usually models the state of an enterprise at a point in time. Suppose we wish to track temporal changes, that is, changes to data over time. For example, Zhang may have been a student between 1 September 2005 31 May 2009, while Shankar may have had instructor Einstein as advisor from 31 May 2008 to 5 December 2008, and again from 1 June 2009 to 5 January 2010. Similarly, attribute values of an entity or relationship, such as title and credits of course, salary, or even name of instructor, and tot_cred of student, can change over time.
One way to model temporal changes is as follows. We define a new data type called valid time, which is a time-interval, or a set of time-intervals. We then associate a valid time attribute with each entity and relationship, recording the time periods during which the entity or relationship is valid. The end-time of an interval can be infinity; for example, if Shankar became a student on 2 September 2008, and is still a student, we can represent the end-time of the valid_time interval as infinity for the Shankar entity. Similarly, we model attributes that can change over time as a set of values, each with its own valid time.

a. Draw an E-R diagram with the student and instructor entities, and the advisor relationship, with the above extensions to track temporal changes.

b. Convert the above E-R diagram into a set of relations.

It should be clear that the set of relations generated above is rather complex, leading to difficulties in tasks such as writing queries in SQL. An alternative approach, which is used more widely is to ignore temporal changes when designing the E-R model (in particular, temporal changes to attribute values), and to modify the relations generated from the E-R model to track temporal changes, as discussed later in Section 8.9.

Reference no: EM131058120

Questions Cloud

Why then do we have weak entity sets : Why, then, do we have weak entity sets?
Question regarding the discrete distribution : The Binomial Distribution is a discrete distribution because there are only two possibilities: Yes/No, Heads/Tails etc. What is the probability of tossing three Heads in a row?
Break-even point and sensitivity analysis : Sensitivity Analysis and Break-Even Point: We are evaluating a project that costs $644,000, has an eight-year life, and has no salvage. Assume that depreciation is straight-line to zero over the life of the project. Sales are projected at 70,000 unit..
What are the monthly payments on the mortgage : What are the monthly payments on the mortgage? Construct the amortization schedule for the first 10 payments. If the rate offered was 7.50 percent, what would the monthly payments be?
Convert the above e-r diagram into a set of relations : Draw an E-R diagram with the student and instructor entities, and the advisor relationship, with the above extensions to track temporal changes.
Planning process for a firm : You are involved in the planning process for a firm that is expected to have a large increase in sales for the next year. Which type of firm would benefit the most from that sales increase: a firm with low fixed costs and high variable costs or a ..
Concerned with the accounting break-even point : Break-Even Point: As a shareholder of a firm that is contemplating a new project, would you be more concerned with the accounting break-even point, the cash break-even point (the point at which operating cash flow is zero), or the financial break-eve..
Incremental cash flows : Incremental Cash Flows: Which of the following should be treated as an incremental cash flow when computing the NPV of an investment?
Assuming the pure expectations theory-actual interest rate : On March 2, 2015, assuming the pure expectations theory is correct, what was the expected interest rate on a 1-year bond one year later? How does this compare with the actual interest rate on a 1-year bond one year later? Using the data for March 2, ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find and display the largest of a list of positive numbers

solve the problem by using raptor. Find and display the largest of a list of positive numbers entered by the users. The user should indicate that he/she has finished entering numbers by entering a 0.

  What are the typical security classification

What are the typical security classification? Discuss the simple security property and the *-property, and explain the justification behind these rules for enforcing multilevel security.

  Each of the conditional jump statements causes a jump to des

Assume for each part of this problem that the EAX register contains 00 00 00 4F and the doubleword referenced by value contains FF FF FF 38.

  Justify characterizing data types according to task taxonomy

"Characterizing Data Types" Please respond to the following: Justify characterizing data types according to task taxonomy. Support your response

  Explain how to satisfy storeitrite-s requirements

StoreItRite is interviewing candidates for position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy StoreItRite's requirements as stated above. How would a successful candidate respond?

  Organizational risk appetite and risk assessment

Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned wit..

  How can the principles of (a) classical conditioning theory

How can the principles of (a) classical conditioning theory and (b) instrumental conditioning theory be applied to the development of marketing strategies? Please write a page.

  Calculate the average and strike rate of all players

Read the team members' family names from the first data file and store them (wherever your program design says it is best to do so). There will be 15 names. You may then close the first file.

  Task manager to recognize and troubleshoot problems

Which system resources are probable to be at root of problem? How can you use system tools, like the Task Manager, to help recognize and troubleshoot these problems?

  Exploring information systems

Exploring information systems

  Develop a first-cut sequence diagram

Develop a first-cut sequence diagram, which only includes the actor and problem domain classes. Add the view layer classes and the data access classes to your diagram from part a.

  Make a list of information security metrics

Make a list of information security metrics that could be collected for a small internet commerce company with ten employees.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd