Attribute on relationship and associative entity

Assignment Help Basic Computer Science
Reference no: EM132769824

Draw an ERD for the following situation, which is based on Lapowsky (2016): The Miami-Dade County, Florida, court system believes that jail populations can be reduced, reincarceration rates lowered, and court system costs lessened and, most important, that bet-ter outcomes can occur for people in and potentially in the court system if there is a database that coordinates activities for county jails, metal health facilities, shelters, and hospitals. Based on the contents of this database, algorithms can be used to predict what kind of help a person might need to reduce his or her involvement in the justice system. Eventually, such a database could be extensive (involving many agencies and lots of personal history and demographic data) once privacy issues are resolved. However, for now, the desire is to create a prototype database with the following data. Data about persons will be stored in the database, including profes-sionals who work for the various participating agen-cies as well as those who have contact with an agency (e.g., someone who is a client of a mental health facility, who is incarcerated, or both). Data about people include name, birth date, education level, job title (if the person is an employee of one of the participating agencies), and (permanent) address. Some people in the system will have been prescribed certain medicines while in the care of county hospitals and mental health facilities. A medicine has a name and a manufacturer. Each prescrip-tion is for a particular medicine and has a dosage. A pre-scription is due to some diagnosis, which was identified on a certain date, to treat some illness, was diagnosed by some facility professional, and has notes explaining family history at the time of the diagnosis. Each illness has a name and some medicines or other treatments commonly prescribed (e.g., certain type of counseling). Each participating agency is of a certain type (e.g., crim-inal justice, mental health) and has a name and a contact person. People visit or contact an agency (e.g., they are arrested by the justice system or stay at a shelter). For each contact a person has with an agency, the database needs to record the contact date, employment status at time of contact, address at time of contact, reason for visit/contact, and the name of the responsible agency employee.

Need two solutions, ER diagram via "attribute on relationship" and "associative entity."

Reference no: EM132769824

Questions Cloud

Determine the combined net income of the home office : December 31, 2012 inventories are P40,000 and P20,000 for the home office. Determine the combined net income of the home office
What is governance and compliance : What is governance and compliance? Why is it necessary to enforce governance and compliance in an organization?
Describe three qualitative factors that would be important : Describe three qualitative factors that would be important for management decision-making. Then, assess each of them in order of importance.
What is the taxable capital gain : Dakota wishes to report the minimum taxable capital gain allowed each year. What is the taxable capital gain for 2020
Attribute on relationship and associative entity : Need two solutions, ER diagram via "attribute on relationship" and "associative entity."
What will be the amount of the adjustment in the allowance : The? company management estimates that uncollectible accounts will be $12,000. What will be the amount of the adjustment in the Allowance for Bad Debts? account
Protect organizational assets against malware : Chapter 5 covered malware concepts and how Microsoft Windows protects against malware. Why is it important to protect organizational assets against malware?
Determine the standard cost per seal : Determine the standard cost per seal. Calculate the material, labor, and overhead variances. The Penny Worth Company produces rubber seals used in the aerospace
Incident response template : Using a web browser, search for "Incident response template". Look through the first five results and choose one for further investigation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Defense in some sexual harassment cases

In the 1977 term, the US Supreme Court issued two decisions that provide an affirmative defense in some sexual harassment cases

  Determine if a number is factor or not

Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits until ..

  Main ideas and contributions of the austrian school

In economics history, what are the main ideas and contributions of the Austrian School? Why does 'marginal' mean so much in economics?

  Problems and applications

Indicate what components of GDP (if any) each of the following transactions would affect. Check all that apply.

  Information security and safe computing

Explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability.

  Describe sequence diagrams

1. Describe sequence diagrams. Include in your discussion how to read them. What does a curved message call line do? 2. What is meant by saying that UP is an iterative and incremental process?

  Management information systems

What is systems thinking and how can management information systems enable and (possibly) improve business communications?

  Difference in terms of the information

Is there any difference in terms of the information that could be provided to the decision maker by an IS that was created using HSM

  Pros and cons of using stored procedures

Explain an example of 1 pros and cons of using stored procedures (SPROCS) or functions.

  Managerial issues of networked organization

Information systems infrastructure: evolution and trends. Big data and its business impacts. Managerial issues of a networked organization

  Evaluate history of cryptography from its origins

You will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history

  Describe operating system hardening

Describe operating system hardening. What tools and approaches are recommended? What steps, tools, and policies are used to secure networks?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd