Planned sleep overs and spontaneous pillow beatings

Assignment Help Basic Computer Science
Reference no: EM131218191

Create a UML diagram which would be suitable for a pillow fight database.

The design can utilise inheritance and weak entities. Multiplicities must be listed for associations.  

Details:

The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings.  Planned sleep over fights are most common and only involve other club members.  Spontaneous pillow beatings are loads of fun and involve going out and feather bashing the public.  The database needs to help us keep track of members so that we can quickly mount a last minute flash mob pillow assault on the public. We would need to record contact information so as to spread the word as quickly as possible.

The planned pillow fights are a little different from public gatherings and often involve a sleepover at either a member's home address or some other location.  Due to several complaints about member freeloading, we also want to keep a record of who brought food (and what they brought - yoyos and other cheap as biscuits are frowned upon in this club!).  It may be handy to have some basic food rating system- perhaps a food field and a simple 1-5 food rating. If a member brings something ordinary to one of these events too often, then they may as well have brought nothing and their record gets marked as a freeloader.

For sleepovers we record multiple pillow fight rounds and who participated.  This also involves recording the winner of each round.  Because these rounds are so important to a members status (and we want to be fair and everything), we also need to record info about the types of pillows used by each member during the round (feather, foam, synthetic, memory foam/rubber, bricks, sand etc).   On completion of a members only fight, we need to record the 1stprize winner and runner up for that sleep over/pillow fight weekend. These fight rounds can be categorised as normal or "slow-mo" (as in slow motion).

Reference no: EM131218191

Questions Cloud

What organs in your body control metabolism : What organs in your body control metabolism? Can you change your metabolism? If so how? Do you believe you have a slow or fast metabolism? Research metabolism and reply to at least 2 of your classmates posts.
What makes a dna fingerprint unique : What makes a DNA Fingerprint Unique? Persuade others to accept or reject hypotheses by presenting data and interpretations. Detail data, procedures, and outcomes for future researchers.
Determine the balances of the accounts : Journalize thy adjusting entries using the following additional accounts: Salaries and Wages Payable; Rent Revenue; Insurance Expense; Depreciation Expense-Building Depreciation Expense--Equipment; and Supplies Expense. Determine the balances of t..
What noise could stand in way of effectively communicating : How can the Shannon-Weaver communications model be applied to these? What noise (interruptions or barriers) could stand in the way of effectively communicating health information within the community?
Planned sleep overs and spontaneous pillow beatings : The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings.  Planned sleep over fights are most common and only involve other club members.
What are positive and negative controls : Positive and Negative Controls in Scientific Experimental design. What are positive and negative controls? When is it useful to use positive or negative controls?
Consultant for fantasy software : Imagine you are a consultant for Fantasy Software, a small company of ten employees. The company needs to integrate Android mobile devices into its work. The company has asked you to develop the deployment plan.
Explain the difference between a biological replicate : Explain the difference between a biological replicate, a technical replicate, and an experimental replicate. Provide an example of each type of replicate for the hypothetical caffeine/blood pressure experiment explained earlier.
Major security breach occurred on a wireless network : 1) Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Policies to keep it under control

No matter how much freedom you give your staff, it's important to retain some control over how technology is used in your business. Because when you have control, you can be confident.

  Advantage of modularizing code

Imagine you are a part of a team that is tasked with writing a mobile application (app) that will allow users to send pictures to their friends. The manager does not want to waste time creating code modules.

  What are two disadvantages of updating replicated data

Why is the ability to increase system capacity an advantage in a distributed database?

  Required to submit a research paper

You are required to submit a research paper (minimum of 14 pages / maximum of 16 pages), not including title, reference, or other non-text pages, diagrams, etc.) using the following parameters: Describe a project to security at facility using the ..

  Explain the role of modern day computing

From your own standpoint, explain the role of modern day computing (from portable ultrabooks to number-crunching supercomputers) in the application of optimization to real life design.

  What are purpose active directory folders and limitatation

What are purpose of Active Directory folders (not share folder)

  What is the programming model of a hcs12 microcontroller

What is the programming model of a HCS12 microcontroller

  Why wouldn''t you use it for this type of programming

logic gates as higher-level than transistors, and assembly language as lower-level than user programs. What is the meaning of the distinction between higher and lower levels in this context?

  Provide your opinion on the gui versus the command line

provide your opinion on The GUI versus the Command Line. Use the Internet to research the long standing debate of the "GUI versus the Command Line". Based on your research and what you have learned so far in this class.

  Describe the purpose of a risk assessment

You have been hired as a security consultant to secure the network of a Fortune 500 company. 1. Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment.. 2. Select risk assessment methodology and give your ..

  Elaborate on the relationship of analysisand optimization

From your current understanding of design, analysis, and optimization, elaborate on the relationship of analysisand optimization in the context of computational expense.

  Selection of right type of compensation agreement

How can the selection of the right type of compensation agreement save money?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd