Develop Entity-Relationship Diagram

Assignment Help Basic Computer Science
Reference no: EM133234575

1. Read the case study and develop an Entity-Relationship Diagram using the conventions for this unit. This diagram needs to describe all of the business rules in the case study.

2. Using this unit's Entity-Relationship to Relational Schema Algorithm, convert your Entity- Relationship Diagram into a relational schema.

3. Using MySQL create the database based upon your relational schema.

4. Enter two records into each of the relations that you have created in your MySQL database.

5. Correctly and appropriately comment your code so that it can be maintained by your client.

6. If you are stuck at any stage - speak to your tutor or email your Unit Coordinator for help.

Case Study

Ageing with Style Home Care is managed by Jane Thomas, a local philanthropist, and has been providing home and community care services (including personal care, gardening and domestic cleaning assistance) since 2012 from its Hobart office. The business has proven to be a popular choice among elderly Hobart residents in the 6 years it has been operating, however due to rising costs of inner-city office rentals in Hobart the business has decided to abandon its headquarters in favour of moving the operations to an online business model.

Ageing with Style Home Care provides personal care, gardening services and domestic cleaning services. Clients can access the services after receiving a diagnosis from their medical practitioner.

Potential clients of the business are assigned an ID when they enter their name into the web-based system. Each client registers their address, consisting of a street number, street name, suburb and postcode. Each client has one and only one address, but each address may have more than one client.

Each client is met by zero or more staff members before they leave the service, and each staff member will meet one or more clients. Staff members are identified by their Staff ID. Staff names, sex and age are also collected. Because this is a small organisation, each of the staff members are managed by zero or one staff members, except Jane Thomas who does not have a manager. The staff members may manage zero or more staff members.

Each diagnosis will affect zero or more clients, and each client may be affected by zero or more diagnoses. Diagnoses are identified with a diagnosis code, the medical practitioner ID and a description of the diagnosis.

Each diagnosis accesses one or more services from this business, and each service is used for one and only one diagnosis.

Each staff member holds one and only one qualification, and each qualification may have zero or more staff members qualified by it. Qualifications are uniquely identified by their name, but the database also holds some details about the qualification.

Given that each of the staff members specialise in a different area, each service is conducted by one and only one staff member, but a staff member may conduct many services or none at all. Each service has a service code and some general details about the service which should include what kind of service it is.

Ageing with Style Home Care hopes that these business rules will help you design and implement a database that includes some sample data that is appropriately commented so that Ageing with Style's in- house staff can further implement and develop the database.

Reference no: EM133234575

Questions Cloud

Mobile cloud computing : What will be the most difficult issues and challenges in the implementation?
Layers of osi model and functionality of each layer : Briefly mention the 7 layers of OSI model and functionality of each layer. explain how this communication will take place through the network.
Having technical mindset is analytical skill : Seeking new challenges and experiences to learn is an example of which analytical skill? Having a technical mindset is an analytical skill that involves what?
What are fundamental challenges to cybersecurity : What are the ethical issues associated with ransomware? What are Fundamental Challenges to Cybersecurity.
Develop Entity-Relationship Diagram : Develop an Entity-Relationship Diagram using the conventions for unit. Enter two records into each of relations that you have created in your MySQL database
List the contents of tmp using command ls -laht : List the contents of /tmp using the command ls -laht. List the contents of /tmp using the command ls -laht.
Distinguish between gane and sarson : Distinguish between Gane and Sarson and Yourdon symbols used in Data Flow diagrams.
Write pseudo-c code : Write pseudo-C code that uses the above CPU instructions to print the string to the printer
Why is the program counter pointer and not counter : Why is the program counter a pointer and not a counter? What is the function of the registers in a CPU.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How would you best troubleshoot the problem

A wireless laptop is trying to connect to a printer via a LAN. The laptop can find the printer, but cannot connect to it. How would you best troubleshoot.

  Determine the maximum stirrup spacing allowed for this beam

Using the two spacings determined in parts (a) and (b), devise an appropriate stirrup spacing layout for this beam.

  Good data visualization is trustworthy

With regards to chart types, explain what "R" means from "CHRTS." Explain what Kirk (2016) means by "Good Data Visualization is Trustworthy."

  Mobile devices in society today has indeed become ubiquitous

we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.

  Outline the basics of opening a blank workbook

Outline the basics of opening a blank workbook and using Formulas to work with data in Microsoft Excel.

  Differences between high and moderate FedRAMP ratings

You covered Azure identity management, policy, and compliance. Explain the differences between high and moderate FedRAMP ratings.

  What is the maximum size of the tcp header

The maximum window size of the TCP was originally designed to be 64 KB (which means 64 × 1024 = 65,536 or actually 65,535). Can you think of a reason for this?

  Check whether relation is boyce-codd normal form

Consider a relation R(A, B, C, D, E, F), with FDs AB → C , BC → D, D → E, BE → F and DF → C.

  Handbook of organisational guidelines and requirements

List at least five of the procedures that might be set out in a handbook of organisational guidelines and requirements.

  Compare and contrast linear and logistic regression methods

Compare and contrast linear and logistic regression methods. Support your answer with use cases for each regression model

  Determine the amounts to be allocated to the two models

Since the success of each model helps the other, the amount allocated to the first model should not exceed four times the amount allocated to the second model. Determine the amounts to be allocated to the two models to maximize the profit expected..

  Create plan that addresses the secure use of mobile devices

Create plan that addresses the secure use of mobile devices by internal employees and external employees as they use mobile devices to access these applications

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd