Creating er diagram

Assignment Help Operating System
Reference no: EM1379133

Question: Construct a table for consumer. The manager tells me that this table needs to track the following data: all customers' social security number, first and last name, address, city, state and zip code, email, phone number, birth date, and date of applying for a library card. Your task is to first "sketch" a customer table (basically what data items or columns should be included in the table) using the Customer_information table at background section as an example. The table should contain the following:

- Column heading include all the attributes that need to be in this table.
- Populate the table with five records of data

Design one more table: Customer checkout table to track the books and CDs that the customer has checked out from the library. Customers and Customer Checkout table are related to one another.

The Customer table contains the basic data on each customer and the primary key is customer number. There is one row for each customer.

The Customer Checkout table contains the data for each book. The primary key consists of two pieces of data: Checkout number and customer number. One customer can check out 1 or more books/CDs at a time, but only one customer on a check out order.

If I were to draw an ER diagram of my complete design for the community library, I could use Visio, or Microsoft word feature to draw the chart, or write down the table schemata and describe the relationships among them.

 

Reference no: EM1379133

Questions Cloud

Asymmetric encryption algorithm : Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:
Program of law of total probability : Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.
Design several security awareness posters : With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.
Maximum utilisation of the corporate intranet link : Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.
Creating er diagram : Construct a table for consumer. The manager tells me that this table needs to track the following data: all consumers' social security number, first and last name, address, city,
Java program editing : Prompt the user for the student's score and put that value into an object
Finding java code error : Indicate in the given code segment if an error occurs. If so, point to whether it is syntax, runtime or logic and how you would fix it.
Write the bubble sort : The village of Marengo conducted a census and collected records that have household data, including the number of occupants in each household.
Describe an example of an equity investment : Describe an example of an equity investment that can also produce income and describe a real or made up but realistic situation that could cause you or someone you know to have to use money from a financial reserve.

Reviews

Write a Review

Operating System Questions & Answers

  Write pseudocode of thread with and without semaphores

Assume we have two threads A and B A and B are to repeatedly print out ping and pong. Write down pseudocode of thread A and B How can this be solved with and without semaphores.

  Explain what can be done to prevent race condition

Suppose shared bank account exists between husband and wife and concurrently husband calls withdraw() function and wife calls deposit(). Explain how race condition is possible and what might be done to prevent race condition from occuring.

  Write a java program on professional expression assignment

Write a java program on Professional Expression Assignment

  Fragmented mean in reference to hard drives

What does fragmented mean in reference to hard drives, and what, if anything, should be done to prevent it. Describe the general path data takes in an application from user input to the computer hardware.

  It assets and intellectual property in opensource

Will IBM's plan to give away some of its IT assets and intellectual property and increase its support of opensource software products like Linux be a successful growth strategy in the "brutally competitive marketplace" in which it operates?

  Create algorithm which prevents deadlock using one semaphore

Using exactly one semaphore, create an algorithm which prevents deadlock. Do not be concerned about starvation and inefficiency.

  What is average rotational latency if seek time is given

5 Disk, seek time, latency, sector, request Single-platter disk rotation speed: 7200 rpm number of tracks on one side of platter. What is avg rotational latency?

  Operating system maps user-level threads to kernel

Suppose an operating system maps user-level threads to the kernel using the many-to-many model and the mapping is done through LWPs.

  Vliw processor

VLIW processor - assembler

  Write list of three known vulnerabilities for sql server

Using the internet as a source, compile a list of three known vulnerabilities for SQL Server on Windows operating systems and three vulnerabilities for Oracle on Unix.

  Deadlock avoidance and scheduling

Deadlock Avoidance and Scheduling

  Stand alone child process

Forking the child process

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd