Create an erd to capture the business

Assignment Help Computer Engineering
Reference no: EM133218763

Question: You have been hired by Patriot Electronics (PE), a company that repairs smartphones, laptops, tablets, computers, and MP3 players. The CEO wants you to create a database to help run the business.

Create an ERD to capture the following business rules: When a customer brings a device to PE for repair, data must be recorded about the customer, the device, and the repair. The customer's name, address, and a contact phone number must be recorded (if the customer has used the shop before, the information already in the system for the customer is verified as being current). For the device to be repaired, the type of device, model, and serial number are recorded [or verified if the device is already in the system).

Only customers who have brought devices into PE for repair will be included in this system. Since a customer might sell an older device to someone else who then brings the device to PE for repair, it is possible for a device to be brought in for repair by more than one customer.

Reference no: EM133218763

Questions Cloud

Worst case runtime of any comparison : Prove that the worst case runtime of any comparison-based sorting algorithm is O(n lg n).
How many stall cycles do we need between : In a 5-stage pipelined ARM processor without forwarding, how many stall cycles do we need between ADD R2, R3, R4 and ADD R4, R3, R2?
Identify the different types of legal proceedings : David, a farmer, supplies organic free range eggs on a regular basis to the Peak Park Hotel and Country Club. Identify the different types of legal proceedings
Construct a nearest-neighbor classifier : Construct a nearest-neighbor classifier from this data set. How would you go about designing a nearest-neighbor classifier in this case?
Create an erd to capture the business : Create an ERD to capture the business rules: When a customer brings a device to PE for repair, data must be recorded about the customer,
Option for protecting perimeter of network : A virtual private network (VPN) is the best option for protecting the perimeter of a network.
Describe the goals of federal and state regulation : Describe the goals of federal and state regulation of the healthcare system. Why do they get involved? Explore an example of a governmental regulation
Encrypt and decrypt : Encrypt and decrypt the following numbers using the RSA algorithm: 45 55 65 75 85. Mandatory Instruction: The modulus must be greater than 85
Should all images of drinking and smoking be banned from TV : Do TV shows and films glorify drug usage and encourage youths to enter the drug trade? Should all images of drinking and smoking be banned from TV

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionproduce a work breakdown structure wbs and give

questionproduce a work breakdown structure wbs and give resources and cost by using a project management tool. as it

  Make a math model and the hash function implementation

Make a math model and the hash function implementation to automata system with a walking bomb and a walking robot.

  Write and execute and turn in a program to read angles

Write and execute and turn in (as screen captures) a program to read in the three angles of a triangle and print if the triangle is a valid one or not.

  What would you do to help create a national security culture

If you could, what would you do to help create a national "security culture," in which everyone is more knowledgeable and proactive about threats to information

  Implement a code in lisp to construct lists of random number

Implement a code in LISP to construct lists of random numbers, and lists of consecutive numbers. Show that length is correct for longer lists using the built in function length. Show that the average value of random list entries is as expected.

  Questionyour company has revealed that it must develop

questionyour company has revealed that it must develop processes and infrastructure to keep up with its client

  Determine how has hacking changed

Research Topic: The nature of hacking has changed in recent years with the change in usage of computing devices. How has hacking changed?

  What are the pros and cons of bidding on the job

Marvin's company was highly successful at winning contracts through competitive bidding. The company was project-driven and all of the revenue that came.

  How many hours and minutes are displayed on digital clock

Given the integer N - the number of minutes that is passed since midnight. How many hours and minutes are displayed on the 24h digital clock?

  Calculate the peak performance in g flops with reasoning

Calculate the peak performance in G flops with reasoning in each of the following two vector supercomputers. The Cray Y-MP C-90 with 16 vector processors.

  Write a program that accepts a filename

Write a program that accepts a filename and the delimiter string as arguments, and then displays each line with its fields reversed.

  Conduct additional research on existing theories

Conduct additional research on existing theories in business intelligence (BI). What common theories exist? Have the theories evolved over time?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd