Prepare an erd for the scenario, Database Management System

Assignment Help:

Question:

(a) Prepare an ERD for the scenario given below.

(b) Convert the ER diagram produced in (a) above into its physical design. You have to choose an appropriate Primary Key for each table identified in the scenario and underline it to differentiate it with other non key attributes. You also have to show any identified Foreign Key in the physical designed.

The Department of Computing and Mathematical Sciences of Imperial College has a set of courses provided for the undergraduate level. For each course a well defined set of admission criteria is specified; for instance, for the "Computer Science" course, 3 A-levels are required, minimum B for each, an A level in Mathematics being compulsory. Each course has a name, Type and duration. Each course consists of a set of modules, some compulsory and some optional. A certain module is described by its name, a short syllabus, type (lectured, seminar-like, project) and year (Level) of study for which it was intended. Each student enrolled with the department, is registered for one particular course. The student must attend the compulsory modules. The system must also store the grade obtained by each student for each module taken. For every year of study, from the set of optional modules, the student must attend a certain number which is specified in the course's description. Each module is taught by a single lecturer. However, there might be modules, from the optional ones, that are not taught at all (for instance, because no students have actually registered for them). There also can exist lecturers who do not teach at all, being only involved in research. Contact information (address, telephone, ...) plus personal details (date of birth, male/female, ...) is needed for both lecturers and students.


Related Discussions:- Prepare an erd for the scenario

Which is an advantage of view, Which is an advantage of view? The Advan...

Which is an advantage of view? The Advantages of view is Data security, Derived columns and Hiding of complex queries

What is called as recursive partitioning, What is called as recursive parti...

What is called as recursive partitioning? The system repeats the splitting of the input unless each partition of the build input fits in the memory. Such partitioning is known

Define null value, Define NULL value NULL value NULL means something is...

Define NULL value NULL value NULL means something is unknown. It does NOT mean null (the digit 0). Null is as well employed as attribute value for a particular entity in which

Define data independence, Data independence seems that "the application is...

Data independence seems that "the application is independent of the access strategy and storage structure of data". In other words, the ability to change the schema definition in o

Describe the most important classes of parallel machines, Question 1 Discu...

Question 1 Discuss the classification of DBMS based on location of database Question 2 Explain with examples different SQL commands used for creating and deleting relations.

Determine the persistent object, Determine the Persistent object Persis...

Determine the Persistent object Persistent object can be stored in one of the following: Files Cheap, permanent, simple storage Low level (Write, Read) Ap

ERD DIAGRAM, Law Associates is a large legal practice based in Sydney. You...

Law Associates is a large legal practice based in Sydney. You have been asked to design a data model for the practice based upon the following specification: The practice employs

Database part of ldb?, Is it mandatory to declare all the tables in Report ...

Is it mandatory to declare all the tables in Report by the key word tables for all the tables that exist in the structure of LDB, and are being explained in the Database part of LD

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Explain the deadlock avoidance, Define deadlock avoidance. An alternat...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd