Drawing an erd diagram

Assignment Help Basic Computer Science
Reference no: EM131559489

Drawing an ERD Diagram. HELP!

  • as a company realizes they should be collecting new information about the activities that customers take on the website, including which products a customer browses or puts into a shopping cart, and they need to start collecting email addresses to correspond with customers with their current orders as well as for them to opt in for offering new deals based on actions customers take on the website.
  • Products are now interacted with through Product Action.Product Action includes a web session id, a web action timestamp.A Web Customer takes a product action, which contains a web customer id. A web customer who purchased is required to have an Email Address, but if a web customer has only browsed a product, Zagimore may or may not have collected one for the client.
  • A web customer uses a unique web customer id, and has a new session id for every new session that they are on the website or app browsing products.If customers purchase products,
  • The action type web customer takes is a Web Action Type, which records the action type id, and the action type name such as (browse, cart, purchase, return)
  • This means that sales transactions no longer just occur at a physical store, but also through the website and app.Now sales transactions occur through an Instance, which has an instance id, an optional store id (where an instance may physically sit), and an instance name (which might include the store name if bought in a store, or the website name, or the app name.)
  • Sales Transactions are composed of multiple sales transaction line items, and now not only records the transaction id, but instead of the transaction date, it records the transaction timestamp.A customer still buys via a sales transaction, and now a customer might also have a web customer id, a billing zip code, and a ship to zip code.
  • Sales transactions line items include the sales price, units purchased, total line item cost and sales transaction line id.Products are now sold via sale transaction lines.
  • Zagimore needs to keep track of Product Inventory and wants to build logic into the webpage/ app letting customer knows when there is low inventory for a specific product.
  • So a customers uses emails, and in store sales clerks now ask customers to provide their email addresses (even though not every customer provides it.)
  • While the app and the web page are built on mostly the same infrastructure, the company wants to be able to differentiate

Reference no: EM131559489

Questions Cloud

Compare and contrast online with offline servicing : You have an image of the original server core installation on a VHD. From the e-Activity, compare and contrast online with offline servicing.
Common challenges presented by green : According to Stenzel in Chapter 4, under the section titled "Common Challenges Presented by Green", building a financially sound business case.
Define random variable x that is associated with given data : DRIVING AGE REQUIREMENTS The minimum age requirement for a regular driver's license differs from state to state. The frequency distribution for this age.
Cost-effective way of doing business : Downloading products or controlling access to Web resources is a cost-effective way of doing business.
Drawing an erd diagram : As a company realizes they should be collecting new information about the activities that customers take on the website
Find the probability distribution for the random variable x : BIRTHRATES The birthrates in the United States for the years 1991-2000 are given in the following table.
Four it business management domains : Determine the interconnectivity of each of the four IT business management domains as discussed in Chapter 2 of the Stenzel textbook on page 57.
How much cash will crabb& co receive from issuing the bond : On January 1, 2015, Crabb& Co. issued 10-year bonds with a total face value of $500,000. How much cash will Crabb& Co. receive from issuing the bond
Freedom with fences : Assess the impact that the "Freedom with Fences" concept, as described by Robert Stephens, would have on the operations of an organization.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw the block diagrams

Mason's formula to show that you will get the same transfer function from the block diagrams.

  Evaluate the design and development process

Balsamiq and Axure are commercial products that evaluate the design and development process. Select either Balsamig or Axure and describe a situation where that tool would be more effective than the other. Justify your response

  Rest of the project activities

Please provide me of a good example that will help throughout the rest of the project activities. Please do not copy and paste from other sources to complete this assignment.

  Normalization and redundancy

Suggest one (1) of the problems that normalization seeks to solve within a database.

  Problem regarding the disjoint sets algorithm

Show that if all of the unions precede the finds, then the disjoint sets algorithm with path compression requires linear time, even if the unions are done arbitrarily.

  User computer by a web server-contains information

A cookie-a simple text file that is placed on a user's computer by a Web server-contains information about the user's visit to that website. It might also contain personal information a user provides to a website, such as a user name and preferenc..

  Algorithm that will convert a general multiway tree

Design and implement an algorithm that will convert a general multiway tree (each node may have more than two successors) to the corresponding ordered binary tree.

  Discuss the costs and benefits of applying formal methods

In Section 12.2.2, three different levels of formal methods have been introduced. Explain each one of these levels and discuss the costs and benefits of applying formal methods at each one of these levels.

  Article relevant to current social engineering threats

Select an article relevant to current social engineering threats.

  Devise an adaptive duplicate deletion algorithm

Devise an adaptive duplicate deletion algorithm that is more efficient than the above algorithm for this particular type of data.

  What command-line utility

When running a scan on your computer you find that a session has been established with a host at the address 208.85.40.44:80. Which protocol is in use for this session? What command-line utility might you use to use to find out who the host is?

  Write a class polybius, that encrypts and decripts strings

Write two function encode and decode. Encode accepts a string of upper case letters and returns a string of digits. Decode accepts a string of digits and returns a string of upper case letters.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd