Planned sleep overs and spontaneous pillow beatings

Assignment Help Basic Computer Science
Reference no: EM131218191

Create a UML diagram which would be suitable for a pillow fight database.

The design can utilise inheritance and weak entities. Multiplicities must be listed for associations.  

Details:

The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings.  Planned sleep over fights are most common and only involve other club members.  Spontaneous pillow beatings are loads of fun and involve going out and feather bashing the public.  The database needs to help us keep track of members so that we can quickly mount a last minute flash mob pillow assault on the public. We would need to record contact information so as to spread the word as quickly as possible.

The planned pillow fights are a little different from public gatherings and often involve a sleepover at either a member's home address or some other location.  Due to several complaints about member freeloading, we also want to keep a record of who brought food (and what they brought - yoyos and other cheap as biscuits are frowned upon in this club!).  It may be handy to have some basic food rating system- perhaps a food field and a simple 1-5 food rating. If a member brings something ordinary to one of these events too often, then they may as well have brought nothing and their record gets marked as a freeloader.

For sleepovers we record multiple pillow fight rounds and who participated.  This also involves recording the winner of each round.  Because these rounds are so important to a members status (and we want to be fair and everything), we also need to record info about the types of pillows used by each member during the round (feather, foam, synthetic, memory foam/rubber, bricks, sand etc).   On completion of a members only fight, we need to record the 1stprize winner and runner up for that sleep over/pillow fight weekend. These fight rounds can be categorised as normal or "slow-mo" (as in slow motion).

Reference no: EM131218191

Questions Cloud

What organs in your body control metabolism : What organs in your body control metabolism? Can you change your metabolism? If so how? Do you believe you have a slow or fast metabolism? Research metabolism and reply to at least 2 of your classmates posts.
What makes a dna fingerprint unique : What makes a DNA Fingerprint Unique? Persuade others to accept or reject hypotheses by presenting data and interpretations. Detail data, procedures, and outcomes for future researchers.
Determine the balances of the accounts : Journalize thy adjusting entries using the following additional accounts: Salaries and Wages Payable; Rent Revenue; Insurance Expense; Depreciation Expense-Building Depreciation Expense--Equipment; and Supplies Expense. Determine the balances of t..
What noise could stand in way of effectively communicating : How can the Shannon-Weaver communications model be applied to these? What noise (interruptions or barriers) could stand in the way of effectively communicating health information within the community?
Planned sleep overs and spontaneous pillow beatings : The pillow fights we hold come in two categories; planned sleep overs and spontaneous pillow beatings.  Planned sleep over fights are most common and only involve other club members.
What are positive and negative controls : Positive and Negative Controls in Scientific Experimental design. What are positive and negative controls? When is it useful to use positive or negative controls?
Consultant for fantasy software : Imagine you are a consultant for Fantasy Software, a small company of ten employees. The company needs to integrate Android mobile devices into its work. The company has asked you to develop the deployment plan.
Explain the difference between a biological replicate : Explain the difference between a biological replicate, a technical replicate, and an experimental replicate. Provide an example of each type of replicate for the hypothetical caffeine/blood pressure experiment explained earlier.
Major security breach occurred on a wireless network : 1) Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd