How is susie business diagrammed

Assignment Help Basic Computer Science
Reference no: EM131660210

How is Susie's business diagrammed?

ERD

Susie sells seashells by the Colorado sea shore. She's contacted us, BL Inc., to make a database to support her online sales. Susie tracks the name and address of each customer, but she wants things to be simple so she has asked us to keep each as a single field.

Customers have at least one way of paying (payment source), and sometimes more. Checking, credit and debit cards, gold coins smuggled across the Wyoming border...they all work as do many other ways of paying. She wants to track the payment type, and - where appropriate - the account number, expiration date, bank name and bank phone for each payment source. Every payment source is associated with just one customer.

Payment sources are used to pay for orders, and orders have one or more inventory items on them. Payment sources may be added prior to actually being used to make a payment. It is important to know how many of each item is on each order. Inventory items might show up on multiple orders, though some items are new and haven't yet been ordered. All orders have at least a small payment made on them immediately.

She keeps a record of the item name and description for each seashell in her inventory. For the orders she tracks the order date, and the date the order shipped.

Here's the deal, though. There's not much seashore in Colorado, so her seashells are expensive. Sometimes an order must be paid for with multiple payment sources. Sometimes one order is paid off with the same payment source, but over time. For each payment, Susie wants to track the payment date and payment amount. She warned me that she doesn't want any payment information to get lost over time.

Customers also have one or more online accounts (the seashell business isn't totally legal). Online accounts are always owned by just one customer. Susie needs to capture the username, password and email for each account (usernames aren't unique). Sometimes those Wyoming border crossings don't work out due to the frozen bunny zombies. When a customer is deleted from the world of the living (and the database), their online account should be automatically deleted as well.

Reference no: EM131660210

Questions Cloud

Which is the best style for a successful negotiation : Describe the difference between distributive bargaining and integrative negotiation. Which is the best style for a successful negotiation and why?
Discuss the role of encryption in ensuring confidentiality : Discuss the role of encryption in ensuring confidentiality; use a popular encryption to make your point if needed.
Summarizing the major points : Find an article about Ransomware written within the last MONTH. Write 4-5 complete sentences summarizing the major points.
Complete proposal of selected topic of choice for the paper : Students are required to complete and submit a proposal of their topic of choice for the Paper. This proposal should include an overview of the topic.
How is susie business diagrammed : Susie sells seashells by the Colorado sea shore. She's contacted us, BL Inc., to make a database to support her online sales.
What is business process management : What is business process management (BPM)? Why do processes need management? What are BPM activities?
Compute the equivalent units of production for materials : Accounting 220 - Managerial Accounting Assignment. Compute the equivalent units of production for Materials and for Labor and Overhead for October
Describe the concept of cpu overclocking : Describe the concept of CPU overclocking. Include pros and cons, possible consequences, heat and power considerations, and cooling considerations.
Liability-in case of a forged drawer signature on a check : On whom can liability be imposed in the case of a forged drawer's signature on a check? What are the limits set by Section 4-406(f) of the Uniform Commercial.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Information security governance

Information security management and governance are not simply implemented tasks within organizations. An information security governance program is a program that must be thoroughly planned, include senior-level management involvement and guidance..

  Analysis on the viability of upgrading to windows

Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:

  It systems do not operate alone in the modern enterprise

It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.

  Describe how soft handoff works in cdma

Describe how soft handoff works in CDMA, why it is possible in 2G CDMA, and what are its advantages and disadvantages.

  Section of the marketing plan

You will create a complete Marketing Plan by the end of the course. You will write the third section of the Marketing Plan for this assignment. Use the Marketing Plan guide to identify the sections of the Marketing Plan and the marketing elements ..

  File metadata is stored in the master file table

In NTFS, file metadata is stored in the Master File Table as opposed to the File Allocation Table in FAT systems. There is much richer data available in the MFT, but what is the one thing provided by the MFT and not the FAT that makes it difficult to..

  Law of one price are two related concepts

Purchasing power parity and the law of one price are two related concepts.

  Derive the set of frequent items

Since items have different expected frequencies of sales, it is desirable to usegroup-based minimum support thresholds set up by users. For example, one may set up a small min support for the group of cameras but a rather large one for the group o..

  Print the name backwards

Prompt the user to enter his/her full name (see sample output). Use awhile loop to print the name backwards. Useslicing to make a new string in the format lastname, firstname. Print the new string.

  Explain what it acquisition mean

In your OWN WORDS please explain what IT Acquisition mean? Why is it important? How is IT acquisition different from commodity purchases?

  Cryptographic techniques and business cases

Identify methods of various cryptographic techniques and their business cases. Explain how IRM (Information Rights Management)benefits from the usage of encrypt

  How many would you expect to be nearsighted

Vision. It is generally believed that nearsightedness affects about 12% of all children. A school district tests the vision of 169 incoming kindergarten children. How many would you expect to be nearsighted? With what standard deviation?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd