Construct an entity relationship diagram

Assignment Help Basic Computer Science
Reference no: EM132161955

Objective: This is an individual assignment aimed to allow the students to design database systems and apply optimal strategies for efficient management of databases.

Outcome:

1) Creating visual representation of the logical structure of a database using Entity-Relationship diagram.
2) Apply normalization techniques to reduce redundancy in a database.

Task 1:

Submit a work proposal for this assignment by the end of week 8 which must include:

a) Understanding of deliverables - a detail description of deliverables.

b) General overview of proposed plan - initial understanding of solution to task2 and task 3.

c) Timeline for completion of task2 and task 3.

d) Resources required for completion of the assignment.

The work proposal must be submitted in a word file through the link available in Moodle. The proposal can also include draft answers.

Scenario:

Consider the following scenario modeling project management activities in an organization.

Oman science club is an education center in the Sultanate of Oman. It has many offices in Oman, each office is identified by its ID, and has a name, location and contact number. Each office employs many faculties and a faculty belongs to only one office. A faculty can be identified by his ID and has name, qualification and contact number.

Oman science club offers several educative programmes to develop team work and improve their academic skills in children. A faculty can teach one or more programme and a programme is taught by only one faculty. Each programme has a unique ID, name, tenure and venue. Once a child visits the office, the Customer Relation Officer will record the details of the child such as name, contact number, address and residence ID number, which is unique to every child. A child can choose any number of Programme or he may not choose any programme, a programme can be chosen by at least one child. Whenever a child chooses a programme, the date and score will be recorded to track the level of the child. The recreation center also offers different packages such as Abacus, All-round development, communication skills etc. to its children. Each package has unique code, name, term and price. A child can buy any number of packages, or need not buy one. A package will be bought by at least one child; otherwise the office cancels the package. When a child buys a package, the office wishes to record the date to maintain the term of the package.

Task 2:
a) Construct an Entity Relationship Diagram (ERD) for the above given scenario. Identify all the entities, attributes of each entity including primary key, not null, relationship between the entities and cardinality constraints. State any assumptions necessary to support your design.

b) For the above task, write your refection by describing the ERD in connection with concepts taken from literature in 400 to 500 words. The literature can include conference papers, scholarly articles, text & reference books.

Task 3:
a. Normalize the below given Item Request Form to UNF, First Normal Form, Second Normal Form, Third Normal Form.

b) Write your refection by describing the normalization process carried in the task above in connection with concepts taken from literature in 400 to 500 words. The literature can include conference papers, scholarly articles, text & reference books.

Be ready for a presentation and Viva to demonstrate your knowledge with the different concepts used in preparing the assignment. Schedule for the presentation will be announced in the class. Marks for task 2-3 will depend on the presentation and viva.

Attachment:- DBMS.rar

Verified Expert

This assignment was about making the ERD for the given scenarios.Identifying the ERD components and the descriptions.Steps of making the information system extensive normalized.And some technical response on all the above mentioned.

Reference no: EM132161955

Questions Cloud

Challenging aspects about adopting and supporting : What you consider to be the two most challenging aspects about adopting and supporting standards in wireless networking or wireless technologies.
Compare and contrast steganography and cryptography : Compare and contrast steganography and cryptography. Why steganography and how does it work? List examples of suitable carriers of steganographic payloads.
What would you say in the policy : You have been asked to draft a corporate usage policy regarding the use of instant messaging. The policy should encourage the use of IM and chat.
Challenging implementation issues for wireless networks : To what degree do these implementation issues keep organizations from adopting wireless technologies in their organization?
Construct an entity relationship diagram : Fundamentals of RDBMS (COMP 20002) - Construct an Entity Relationship Diagram (ERD) for the above given scenario. Identify all the entities
Describe instance where a government has taken some action : On the discussion forum, describe an instance where a government has taken some action the result of which is influence on commerce. Minimum 400 words.
Different states for a marketing plan : David is a lobbyist and he is secretly visiting different states for a marketing plan. Every midnight
Discuss the advantages of python as a software : Compare Python with other popular programming languages such as C# and Java. Discuss the advantages of Python as a software development tool.
What is stateful inspection : How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server?

Reviews

len2161955

11/9/2018 2:46:27 AM

Deliverables Aspects 0 1-5 6-7 8-10 Mark Task 3(b) Reflection on normalization Weak reflection Reflection is incomplete and not underpinned with literature Reflection is satisfactory and underpinned with literature Reflection is Excellent and accurately underpinned with literature

len2161955

11/9/2018 2:46:21 AM

1st Normal Form Irrelevant normal form. Wrongly normalized tables. Partially satisfies 1NF rules. Completely satisfies 1NF rules. 0 1-3 4-8 9-12 Mark 2nd Normal Form Irrelevant normal form. Wrongly normalized most of the tables. Partially satisfies 2NF rules. Completely satisfies 2NF rules. 0 1-5 6-12 13-15 Mark 3rd Normal Form Irrelevant normal form. Wrongly normalized most of the tables. Partially satisfies 3NF rules. Completely satisfies 3NF rules.

len2161955

11/9/2018 2:46:12 AM

Deliverables Aspects 0 1-4 5-7 8-10 Mark Task 2(b) Reflection on ERD irrelevant Reflection incomplete reflection with no underpinning Reflection is satisfactory and underpinned with literature Reflection is Excellent and accurately underpinned with literature Deliverables 0 1 2 Mark Task 3(a) Normalisati on UNF Irrelevant normal form. Wrongly normalized tables. Completely un normalized table

len2161955

11/9/2018 2:46:06 AM

Aspects 0-4 5-10 11-15 16-17 Mark Relationships of ERD and Primary Keys for all entities Inappropriate/we ak identification of relationships and key constraints partial Identification of different relationships and key constraints. Satisfactory identification of different relationships and key constraints Complete and accurate in Identification of different relationships and key constraints

len2161955

11/9/2018 2:45:55 AM

Deliverables Aspects 0 2-6 7-10 Mark Task 1 Work Proposal No submission Proposal is incomplete but has relevant information Complete and satisfactory proposal. Deliverables Aspects 0-5 6-11 12-16 17-18 Mark Task 2(a) (ERD) Entities and Associative Entities Inappropriate/we ak identification of different entities, and associative entity, the attributes partial Identification of different entities and associative entity, the attributes Satisfactory identification of different entities and associative entity, the attributes Complete and accurate in Identification of different entities, the attributes

len2161955

11/9/2018 2:45:37 AM

Final Assignment Submission: Detail feedback on the case study document will be provided. This feedback will help the team to reflect on your work. You can also carry forward the feedback comments in understanding and completing your final semester graduating project activities. Week 14

len2161955

11/9/2018 2:45:32 AM

Submission Week Case Study work proposal: Interim formative feedback on the case study work proposal will be provided. This feedback will help you to understand and reflect on your initial understanding of case study tasks. Week 10

Write a Review

Basic Computer Science Questions & Answers

  Civil court trial processes

From the e-Activity, describe some of the processes that take place in a civil court trial.  Justify the length of time each process takes.

  Parameter and returns the maximum number in the array

Write method max that takes an integer array as an input parameter and returns the maximum number in the array. Define this method in ArrayTest.java also.

  Program that determines for each of the five hands

Write a program that determines, for each of the five hands of the game, whether or not then Ace is played.

  What is the objective of compensation in the workplace

1. Define the terms Performance Management, Performance Evaluation, and Performance Feedback and explain how each of the three tools is used in the workplace.  2. What is the objective of compensation in the workplace and what are two factors affecti..

  Create the tables and relationship in access

If you were given an ERD that contained a M:N relationship between orders and products, what would you need to do in order to create the tables and relationship in Access?

  Find and allocate space for a heap object

Use it to compare the average number of iterations that the best fit, first fit, and next fit heap allocation techniques require to find and allocate space for a heap object.

  Strengths and weaknesses of university

Strengths and Weaknesses of University that attracts and distracts students from joining that university with respect to the theory of planned behaviour

  Imagine you are a senior systems administrator

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network ..

  Write a c++ program that accepts an angle in degrees

(Practice) An acute angle is less than 90 degrees, an obtuse angle is greater than 90 degrees, and a right angle is equal to 90 degrees. Using this information, write a C++ program that accepts an angle, in degrees, and displays the type of angle ..

  Differentiate between security architecture

Question 1: Differentiate between Security Architecture & Design and Information Security Architecture & Design Question 2: What is the CIA Triad (define each component)?  What is Defense-in-depth?  In order to meet both criteria, what are the mini..

  What is the elasticity of demand at the 2015 price

1. What is the elasticity of demand at the 2015 price? 2. What is the elasticity of demand at the 2016 price?

  Modern computer architecture standards

The X25 demodulator machine has been upgraded to modern computer architecture standards.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd