EER models, Database Management System

Assignment Help:
Ask question #MinimThe Georgia Tech Library (GTL) has approximately 16,000 members, 100,000 titles, and
250,000 volumes (an average of 2.5 copies per book). About 10 percent of the volumes are out on
loan at any one time. The librarians ensure that the books that members want to borrow are
available when the members want to borrow them. Also, the librarians must know how many copies
of each book are in the library or out on loan at any given time. A catalog of books is available online
that lists books by author, title, and subject area. For each title in the library, a book description is
kept in the catalog that ranges from one sentence to several pages. The reference librarians want to
be able to access this description when members request information about a book. Library staff
includes chief librarian, departmental associate librarians, reference librarians, check-out staff, and
library assistants.
Book can be checked out for 21 days. Members are allowed to have only five books out at a
time. Members usually return books within three to four weeks. Most members know that they have
one week of grace before a notice is sent to them, so they try to return books before the grace
period ends. About 5 percent of the members have to be sent reminders to return books. Most
overdue books are returned within a month of the due date. Approximately 5 percent of the
overdue books are either kept or never returned. The most active members of the library are
defined as those who borrow books at least ten times during the year. The top 1 percent of
membership does 15 percent of the borrowing, and the top 10 percent of the membership does 40
percent of the borrowing. About 20 percent of the members are totally inactive in that they are
members who never borrow.
To become a member of the library, applicants fill out a form including their SSN, campus
and home mailing addresses, and phone numbers. The librarians issue a numbered, machinereadable
card with the member’s photo on it. This card is good for four years. A month before a card
expires, a notice is sent to a member for renewal. Professors at the institute are considered
automatic members. When a new faculty member joins the institute, his or her information is pulled
from the employee records and a library card is mailed to his or her campus address. Professors are
allowed to check out books for three-month intervals and have a two-week grace period. Renewal
notices to professors are sent to their campus address.
The library does not lend some books, such as reference books, rare books, and maps. The
librarians must differentiate between books that can be lent and those that cannot be lent. In
addition, the librarians have a list of some books they are interested in acquiring but cannot obtain,
such as rare or out-of-print books and books that were lost or destroyed but have not been
replaced. The librarians must have a system that keeps track of books that cannot be lent as well as
books that they are interested in acquiring. Some books may have the same title; therefore, the title
cannot be used as a means of identification. Every book is identified by its International Standard
Book Number (ISBN), a unique international code assigned to all books. Two books with the same
title can have different ISBNs if they are in different languages or have different bindings (hardcover
or softcover). Editions of the same book have different ISBNs.
The proposed database system must be designed to keep track of the members, the books,
the catalog, and the borrowing activityum 100 words accepted#

Related Discussions:- EER models

Distributed query and transaction processing, Distributed query and transac...

Distributed query and transaction processing a.  Construct a query around any one of the functional divisions you made in 4a such that if executed in the distributed design of 4

What are called index-sequential files, What are called index-sequential fi...

What are called index-sequential files? The files that are ordered sequentially with a primary index on the search key are known as index-sequential files

Deadlock and its prevention, Deadlock And Its Prevention: As seen earlier,...

Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th

How the time stamps are implemented, How the time stamps are implemented ...

How the time stamps are implemented Use the value of the system clock as the time stamp. That is a transaction's time stamp is equivalent to the value of the clock when the tra

Differentiate between horizontal and mixed partitioning, Question: In r...

Question: In relation to distributed database answer the following questions: (i) Give a brief definition of distributed database. Support your answer with an appropriate di

Write the sql queries using data manipulation language, Problem 1. Writ...

Problem 1. Write the SQL queries using Data Manipulation Language (DML) statements. Insert values into student table with field names using insert command Display the

Update operations, The Update Operations : Update operations are used fo...

The Update Operations : Update operations are used for altering database values. The constraint violations faced by this operation are logically the similar as the problem faced

Structure of client server systems, Structure of Client Server Systems: In ...

Structure of Client Server Systems: In client/server architecture, clients show users who require services while servers give services. Both client and server are a combination of

Log, what is the need of a log in dbms

what is the need of a log in dbms

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd