Explain the concept of foreign key using an example

Assignment Help Computer Engineering
Reference no: EM133240292

According to 2019 census, every resident in Merry Island over 10 years old owns a smart phone. Merry Island residents over 18 years are eligible for a driver's license. Government mandate Merry Island citizens to download contact tracing app and register by providing their name, address, contact number and an email address. A business owner or nominated authorised person behalf of the business can register one or more business venues by providing business name, address, business email address and contact number for each venue. Business owner/ nominated authorised person must also provide their name, contact details. Once a venue is successfully registered, a unique QR code is generated in the system. Business owners are responsible for guiding their customers check in to the venue using the QR code.

Question 1. "AppUser" that representing a Merry Island resident is a potential entity for the contact tracing app. Between the driver's license number and the mobile number, which one is more suitable as a primary key in "AppUser" entity? Why?

Question 2. Draw an entity relationship diagram (ERD) for contact tracing app.

Question 3. Explain the concept of Foreign Key using an example in your ERD.

Question 4. Explain how you resolve a potential many to many relationships in your ERD.

For ERD, the following marking criteria applies:
Correct format used for the ERD
Required entities shown with appropriate attributes
Correct primary key and foreign key (where appropriate) identified
Appropriate names given to entities
Appropriate relationships represented
Crows-feet notation or UML notation is shown for cardinality
Many to many relationships have been fully resolved in the final ERD

Reference no: EM133240292

Questions Cloud

How would you relate the cia model to business continuity : How would you relate the CIA model to Business Continuity and Service Availability obstacle? Is there any obstacles in Data Confidentiality/Auditability
Developing a student leadership program : The social change leadership theory is the most common theory used when developing a student leadership program.
Design a suitable access model for the three roles : MSPM1-GC New York University NOC of LTC Corp Limited has various levels of engineers managing the network - Design a suitable access model for the three roles.
What is a liberal arts education : What does a liberal arts education mean to you personally, and how do you see it preparing you for your career and life?
Explain the concept of foreign key using an example : Draw an entity relationship diagram (ERD) for contact tracing app and Explain the concept of Foreign Key using an example in your ERD
Find the forecasted number of passenger enplanements : Airport Layout Plan Paper - Find the forecasted number of passenger enplanements for the next 5, 10 years (from publication date) (Chapter 3)
Identify an employment opportunity : You will identify an employment opportunity you are interested in. This might be a job you are currently considering or a job you hope to obtain in the future.
What topology works best for the offices : What topology works best for the offices, given the availability of wiring closets? What topology works best for the factory floor, given its need for constant
How do you know when it is worth the effort to parallelize : How do you know when it is worth the effort to parallelize an algorithm once you've determined that it is at least possible? Give some examples other

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd