Create entity relationship diagrams

Assignment Help Basic Computer Science
Reference no: EM133266159

Data modeling provides a logical representation of the system data. This is a high-level view that is not concerned with how or where the data will be stored or accessed. Data modeling allows the systems analyst to describe how the data will flow through the business processes.

During the analysis phase, the systems analyst creates logical data models. Entity relationship diagrams (ERD) are used to model the data.

Case J: University Library Borrowing System Try to create a set of use cases for a university library borrowing system.

The system will record the books owned by the library and will record who has borrowed what books. Before someone can borrow a book, he or she must show a valid ID card that is checked to ensure that it is still valid against the student database maintained by the registrar's office (for student borrowers), the faculty/staff database maintained by the personnel office (for faculty/staff borrowers), or against the library's own guest database (for individuals issued a "guest" card by the library).

The system must also check to ensure that the borrower does not have any overdue books or unpaid fines before he or she can borrow another book. Every Monday, the library prints and mails postcards to those people with overdue books. If a book is overdue by more than 2 weeks, a fine will be imposed and a librarian will telephone the borrower to remind them to return the book(s).

Sometimes, books are lost or are returned in damaged condition. The manager must then remove them from the database and will sometimes impose a fine on the borrower.

Using your use cases as your basis, complete the following:

Try to create entity relationship diagrams (ERD) that depict how the data flow through this new system.

Reference no: EM133266159

Questions Cloud

What is the output of the shellcode : What is the output of the shellcode below?
Pink elephant solution and pink elephant project : Do an application using the following names for the solution and project, respectively: Pink Elephant Solution and Pink Elephant Project.
The user frustration and annoyance : Define design optimization to enable user timely experience and avoid the user's frustration and annoyance.
Find approximation algorithm : Find an approximation algorithm to decide which costume to assign to which seamstress so that all the costumes are finished as soon as possible
Create entity relationship diagrams : Try to create entity relationship diagrams (ERD) that depict how the data flow through this new system.
Build-max-heap algorithm : Consider the following unsorted array: 5; 9; 1; 3; 8; 2; 0; 11; 4; ;10; 7a. apply the BUILD-MAX-HEAP algorithm to convert this arrag into a max-heap.
Find your brother private key : Your younger brother posts his RSA public key (N = 133, e = 7). You decide to show him that he needs to pick a stronger key. Find your brother's private key.
Data-driven companies outperform competitors financially : "Data-Driven Companies Outperform Competitors Financially," Thor Olavsrud discusses the path to becoming a data-driven company.
Transposition cipher : the order of the characters is changed to encrypt the message by writing the message in rows and then forming the encrypted message from the text of each column

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify a recent or potential future IoT attack

Research using the web to identify a recent or potential future IoT attack. when considering using IoT-enabled devices to avoid becoming an attack victim?

  Database modeling and normalization

Imagine that you work for a consulting firm that offers information technology and database services.

  Explain the operation of the modified register

The other input of the NAND gate provides a parallel-load control. Explain the operation of the modified register.

  Web search for methods employed by industry

Do a web search for other methods employed by industry or government to share information on possible incidents

  Statistically and clinically significant evidence

What is the difference between statistically significant evidence and clinically significant evidence?

  Question on database systems-concurrency control

A popular update operation is increment/decrement the numeric value of data object by 1. Suppose we are now to create a lock mode I, along with usual shared and exclusive lock modes. Consider a locking protocol that will require a request for a lo..

  Installation of the various handling equipment

State the factors that must be considered in the selection and installation of the various handling equipment.

  Research at least two articles on topic of big data

Research at least two articles on the topic of big data and its business impacts.

  How is privacy related to statistical database security

How is privacy related to statistical database security

  Create a simple alice world with two characters who engage

Create a simple Alice world with two characters who engage in a dialog.

  Name a type of document that can be created

Describe the functions of Microsoft Word that aid you in creating the document you named.

  Social responsibilities surrounding the sales of alcohol

What are the ways that IT can help comply with legal requirements and social responsibilities surrounding the sales of alcohol?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd