Er diagram, normalization, relational structure only

Assignment Help Basic Computer Science
Reference no: EM13766579

Er diagram, normalization, relational structure only

Project Specification

The proprietors of BigM have approached you and asked if you could design a database to help them manage their business. The management has commissioned you (in your capacity as a Database Management System consultant) to analyse, design and develop an appropriate conceptual data model and relational database schema, based on the following information gathered about the current business activities.

BigM operates stores in many cities in Australia. Stores are referenced by store number. BigM also keeps store name, phone, fax, email for each store. Each store has a postal address containing street address, city, state and postcode.
Each store has a number of departments, for example, finance, accounts, sales, customer service etc. For each department, there is a department ID, department name, phone and e-mail address.
Each department has a number of employees. For each employee, BigM keeps a record of their employee ID, first name, last name, phone, date of birth, start date of his/her work and tax file number.

  • BigM also stores postal and residential addresses of their employees. For each address they need to store street address, city, state and postcode.
  • An employee can be employed as casual or fulltime basis. For a casual staff, his or her job type (for example, accountant, sales, customer service etc.), and hourly rate is recorded. For a fulltime staff, his or her job type and annual salary is recorded.
  • Each store is managed by an employee as a store manager and each department is supervised by an employee. The department supervisor is also the supervisor for all the staffs within that department.
  • Each store may be assigned a supervising store where all training, payroll, server application and help desk are located.
  • Each supervising store generates pay slips for all staffs (in this store and other stores being supervised) on a fortnightly basis. For each pay slip, the store records a pay ID, supervising store ID, employee ID, pay date, number of hours and the gross payment.
  • BigM sales different products like CDs, cloths, computers etc. For each CD it keeps a record of CD number, title, length, number of tracks, release date, category description, price and reorder level.
  • BigM would like to maintain information for each artist in the CD. They would like to include first name, last name and date of birth and website address, if they have one. If possible, BigM also wants to store number of tracks where a particular artist appears in a given CD.
  • For cloths and other products it stores product number, product description, brand, product size and price.
  • An inventory of the number of each particular product in each store is kept. BigM keeps track of

the quantity of each product that is on order, as well as the number currently available in each store.

  • Customer may place orders in the store. Customer details are always taken at each order. A customer is referenced by a customer number, customer first & last names, phone number and postal address, if available. For each address they need to store street address, city, state and postcode.
  • A customer may order more than one product at a time, and they may order multiple copies of the same product. BigM also records the date a product arrives and the date when it is picked up by the customer. Note that these dates may be different for each product.
  • BigM understands that they may not have provided you with sufficient information. If you need to make assumptions about their organisation please ensure that you record them.

Assignment Submission

You should produce a single pdf file, created using Word, containing all of the requirements as specified within this document. Your lecturer will provide details of how the file is to be submitted within lectures.

The design document should contain:

  • A completed copy of the SITE Assignment Coversheet.
  • An appropriate title page that includes an acknowledgement of all students you have spoken to about the assignment.
  • A table of contents and automatically generated page numbers.
  • An entity relation (E-R) diagram that models the problem which includes:
  1. all entities, relationships (including names) and attributes;
  2. primary (underlined) and foreign (italic) keys identified;
  3. cardinality and participation (optional / mandatory) symbols; and
  4. assumptions you have made, e.g. how you arrived at the cardinality/participation for those not mentioned or clear in the business description, etc.

The E-R should be completed using the standards of this course (crow's feet).

  • Normalisation of relations which identifies:
  1. dependency diagram for each relation
  2. the level of Normalisation achieved for each relation;
  3. the reasons for any relation that is maintained NOT in 3NF.
  • Relational data structures that translate your E-R diagram which includes:
  1. relation (table) names,
  2. attribute (column ) names and field types (as required by WAMP),
  3. primary and foreign keys identified;

The data structures should be shown using the standards of this course.

  1. A bibliography, in APA format, containing all resources used to complete the assignment. If no resources have been used please indicate this appropriately.

Assessment Criteria

  1. How clear and well-presented your submission is.
  2. E-R diagram: adherence to our standard, assumptions made, inclusion of correct primary

and foreign keys, appropriate entities, relationships, and attributes.

  • Normalisation: appropriate interpretation of each normal form, arguments for leaving the schema in the normal form you consider optimal.
  • Conversion of E-R diagram to relational schema: schema is a correct translation of the E-R submitted with appropriate tables, columns, and primary keys.

Reference no: EM13766579

Questions Cloud

What do we learn from the kola ceremony of hospitality : What do we learn from the kola ceremony of hospitality? Note how Achebe introduces-but does not fully explain--Igbo customs, rituals, and ceremonies in the novel.
Essential responsibilities of crime scene preservation : What are the essential responsibilities of crime scene preservation? Identify and describe them. Why is securing the crime scene so important to the process of crime scene investigation? Explain
Auditor plan for an examination : The independent auditor's plan for an examination in accordance with generally accepted auditing standards is influenced by the possibility of material misstatements. The auditor will therefore conduct the examination with an attitude of
The unhealthy and healthy fats : Define saturated fat, unsaturated fat, trans-fatty acids, and hydrogenated fats. How are trans-fatty acids harmful?
Er diagram, normalization, relational structure only : The proprietors of BigM have approached you and asked if you could design a database to help them manage their business. The management has commissioned you (in your capacity as a Database Management System consultant) to analyse, design and devel..
Define purchase commercial off-the-shelf software : What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (COTS)
Scene walk-through for evidence and chain of custody : Scene walk-through for evidence and chain of custody, Crime scene sketch, Documentation, Media liaison
Explain analysis of william shakespeare the taming of shrew : Explain the Analysis of William Shakespeare The Taming of the Shrew.
Write a program to read and add polynomials : Write a program to read and add polynomials - If the exponents are equal, then create a new term with that exponent and the sum of the coefficients, and advance both iterators.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Optional functionality: allow the user to print the report

A company hires you to write a program to track hourly employee arrival and departure times from work. In essence, you are tasked to make an online time clock

  Exploited both network and host vulnerabilities

Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..

  Explaining gui differences and security differences

With that being said, its great that each of you pointed out the GUI differences. What about the Security differences?

  Evaluate the technology, connectivity

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks.

  Use the graphics class to draw a line between the points

Given a graphics object g, write a few lines of code to have that graphics object draw a magenta circle (not filled in) that has a diameter of 200 pixels. What does invoking the base class paintComponent method accomplish?

  Write a program to determine the answers of the square root

How do you write a program to determine the answers of the square root of 30, the sine and cosine of 100, the value of the floor, ceiling, and round of 44.7, and the larger and the smaller of the character K and the integer 70? In Java code

  What uid and pid have the highest amount of physical memory

What UID and PID have the highest amount of physical memory a process has used and is not swapped out? Show all processes and full output.

  What is a plausible explanation of what may have happened

Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be ins..

  Create incident response policy for development of response

Create the incident response policy which covers the development of incident response team, disaster recovery process and business continuity planning.

  A week after the upgrade it is foud out that there are some

while maintaining your companys configuration management it is determined that you need to upgrade your switches. after

  Give time line which identify specific steps of installation

Give a time line, which identifies specific steps (including training) and related resources required to implement the recommended system.

  Web service management

How is Web service management different from conventional distributed computing  systems management?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd