### Designing an e-r diagram

Assignment Help Computer Engineering
##### Reference no: EM1321797

Assume that at PVF, every product (explained by Product No., Description, and Cost) is composed of at least three elements (explained by Component No., Description, and Unit of Measure), and elements are used in order to make one or many products (i.e., should be used in at least one product). Additionally, suppose that elements are utilized to make other components and that raw materials are also regarded to be components. In both the cases of components being utilized to make the products and components being utilized to make other components, we required to keep track of how many elements go into making something else. Design an E-R diagram for this situation and keep the minimum and maximum cardinalities on diagram.

### Previous Q& A

#### Presentation on collective bargaining

Imagine a simulated scenario in which you will make a presentation to your HR Department in preparation for a move by the employees to introduce collective bargaining into your company.

#### Goodness of fit test for chi-square distribution

At the .01 significance level, is there a difference in the use of the four entrances?

#### Estimate the missing values in given anova table

Complete the table and answer the following questions. Use the .05 significance level.

#### Generation marginal lists apart from their second generation

Illustrate what sets the 1st generation marginal lists apart from their second generation marginal list

#### Program to determine persons body mass index

Develop a program which determines a person's body mass index. Develop the modular program which determine and display a person's body mass index (BMI).

#### Financial strategies, capital budgeting analysis

MBA 612, Financial Strategies, Capital Budgeting Analysis, Word Report and PowerPoint Presentation

#### Determining probability that student is woman in class

A class has 13 women and 18 men. If student if selected randomly, determine the probability student is a woman?

#### Exploring substantial component of information security

Explain the weaknesses in the controls? Specify whether there exist any new or upgraded access controls being considered? Let us explore this substantial component of the information security.

#### Marginal revenue received by a firm in a perfectly

The marginal revenue received by a firm in a perfectly competitive marketplace is illustrating what

#### Probability problems based on poisson & normal distribution

Probability problems based on Poisson & Normal distribution

### Similar Q& A

#### How to exchange the floating point number

How to exchange the floating point number

#### Developing system for the classification problem

client asks your company in order to develop a system for classification problem (for example: medical insurance fraud detection). Because of user requirements, he requires the final developed system to be able to offer the explanations about syst..

#### Factors for building a server room

Explain the factors you must consider for each of the following given topics: Walls and doors, Access control

#### Gaussian distribution of known covariance s

Suppose we have training data from the Gaussian distribution of known covariance S but unknown mean Mu.

#### Can a relation be stored as a sequential file

Can a relation be stored as a sequential file

#### Baseline for the linux system

Describe briefly the purpose of the baseline. Explain the areas of system would you involve in the baseline for your Linux system?

#### Recognizing the error in code

Suppose that the variable A is an arrays of ints. Take the following code segment:Boolean flag = false;

#### Selecting a life-cycle model for project

She wishes your organization to build a product which will monitor the company’s stock, starting with purchasing of leather and keeping track of boots as they are manufactured, distributed to individual stores, and sold to customers.

Bob has forgotten his password. Allocate him a password of LINK and require that the Bob change his password next time he logs on.

#### Designing the flow chart

Draw a flowchart describing the following given situations: The data found on employee time cards are keyed onto the hard disk before they are processed by the computer.

#### Benefit of ethical hacking

Describe what you consider is the main benefit of the ethical hacking be sure to involve what is the role of an ethical hacker.

#### Cellular network

Calculate how many users a cell may support for a 5% call blocking rate. Suppose that each user generates 35mE of load in the busy hour.