Create a single-entity data model for this list

Assignment Help Basic Computer Science
Reference no: EM131219955

Examine the list of stock quotes in Figure 5-56. Using the structure and example data items in this list, do the following:

A. Create a single-entity data model for this list. Specify the identifier and attributes.

B. Modify your answer to A to include the entities COMPANY and INDEX. Specify the identifier and attributes of the entities and the type and cardinalities of the relationships. Explain which cardinalities can be inferred from Figure 5-56 and which need to be checked out with users.

C. The list in Figure 5-56 is for a quote on a particular day at a particular time of day. Suppose that the list were changed to show closing daily prices for each of these stocks and that it includes a new column: Quote Date. Modify your model in B to reflect this change.

D. Change your model in C to include the tracking of a portfolio. Assume the portfolio has an owner name, a phone number, an e-mail address, and a list of stocks held. The list includes the identity of the stock and the number of shares held. Specify all additional entities, their identifiers and attributes, and the type and cardinality of all relationships.

E. Change your answer to part D to keep track of portfolio stock purchases and sales in a portfolio. Specify entities, their identifiers and attributes, and the type and cardinality of all relationships.

1029_23784fd9-797c-4993-8028-bdfd34ccde34.png

Reference no: EM131219955

Questions Cloud

How management can prevent unethical behavior from happening : Your talk should include a description of three (3) types of ethical dilemmas that could happen in the workplace and the potential impact of each dilemma on the following: 1) the organization, 2) employees and, 3) stakeholders. Discuss how managem..
Key factors for future competitive success : Discuss with your class the key factors for future competitive success. List the common types of key success factors and answer the following questions:
Outlier payment calculation to determine : The Safe-Cross® guidewire is present on the following claim. Complete an outlier payment calculation to determine whether this claim would qualify for a high cost outlier payment.
Identify relevant thesis statement or question from article : HC1052 Individual Assignment. Write an article critique of 1,500 words. The Article Critique that you write must: Identify a relevant Thesis Statement or Question from the article and Identify the strengths and weaknesses of the article based on the ..
Create a single-entity data model for this list : The list in Figure 5-56 is for a quote on a particular day at a particular time of day. Suppose that the list were changed to show closing daily prices for each of these stocks and that it includes a new column: Quote Date. Modify your model in B ..
Production with respect to direct materials-conversion : Victory Company uses weighted-average process costing to account for its production costs. Conversion cost is added evenly throughout the process. Direct materials are added at the beginning of the process. Determine the equivalent units of productio..
Command the obedience of followers : One classification of leaders is those who command the obedience of their followers. Others utilize their position to improve themselves, gaining enriching experiences, sometimes at the frustration of those they lead.
Explain how metrics are used to evaluate the success : Create an MS PowerPoint Presentation - define the term metrics, explain how metrics are used to evaluate the success of the total rewards program, identify, describe, and provide examples of at least three metrics and share how you will collect th..
Guidelines for performing project management functions : Why is it important to have standards or guidelines for performing project management functions?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why supply-demand-equilibrium price different in short term

Price of product in short-term and long-term also describe why you believe supply, demand, or equilibrium price will be different, if at all, in short-term and long-term.

  How linear program the problem of finding the maximum profit

Formulate as a linear program the problem of finding the maximum profit weekly production mix. Solve the linear program from Part A using the Simplex method.

  What can you conclude about this project

In fact, progress for the first 20 days has been: 2, 3, 4, 6, 7, 9, 12, 14, 15, 17, 20, 21, 21, 22, 24, 26, 27, 29, 31, 33. What can you conclude about this project?

  Name of the wsh object that vbscript

What is the name of the WSH object that VBScript uses to open an text file for reading or writing data?

  Individual traffic light has at least three states (g.y,r)

Consider a traffic light system at a four-way crossroads (two roads intersecting at right angles) with a countdown timer, a crosswalk button, and a speaker that announces it's ok or not ok to walk

  Create a comprehensive security policy for the company

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations and evaluate the issues and challenges associated with information technology integration.

  Design a program that prompts the user to enter a string

Using Python version 2.7, design a program that prompts the user to enter a string.The program should then display the number of vowels and the number of consonants in the string. I am absolutely lost and don't even know how to start, any assistan..

  What technology enable to run more than one operating system

What technology enables you to run more than one operating system at the same time on a single computer

  The cost of having the tree removedwould

Suppose that your neighbor owns an old tree, with branches that extend over yourlawn. He enjoys having the tree, getting utility of $100, and incurring $65 ofcleanup costs on his own lawn. However, the tree drops leaves and crabapples onyour lawn, wh..

  How an attacker who knows a tool like snort is running

If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to evade detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker, and suggest a remed..

  Distance between the lighthouse

Let h be the distance between the lighthouse and the ship. Let d be the distance from the ship has travelled since 1pm. Express h as a function of d.

  Speculate on the role of the cio in a specific industry

q1. with a focus on enterprise hardware software services and human capital list and describe three advantages of green

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd