Identify the entity to which the primary key belongs

Assignment Help Management Information Sys
Reference no: EM131267387

Let us consider the information that your school tracks for a class. In this instance, a class is a scheduled course. For example, your school may offer FINA 2100- Introduction to International Financial Markets as a course. If the school offers it in the fall, then it becomes a class. Below, we have provided some basic business rules and many pieces of information that your school probably tracks about the class:

A course may (or may not) require one or more prerequisite courses, and a course may (or may not) serve as a prerequisite of other courses.

Each course belongs to a specific department and a department can have many courses.

One or more sections of a course will be scheduled each semester at different times of the day and on different days of the week.

One instructor will teach a scheduled course section in a specific classroom. The same classroom can be used for many different course sections at different times.

A department has many instructors and an instructor may teach for multiple departments.

Part 1: Complete the table

Fill out the table by following these instructions:

1) For each piece of information that the school wants to track, identify if it is an entity or an attribute (place an X in the appropriate column).

2) For each recognized attribute, identify if it is a primary key with an X in the Primary Key column.

3) Identify the entity to which the Primary Key belongs (write the name of the entity in the last column).

The first three rows are filled in to provide an example of how the table should be completed.

Part 2: Write a detail document

Using the provided information, write a detail document about the various scenarios described in Part 1 with respect to entities and their relationships. The E-R diagram will be created from your findings. Don't worry about going through the normalization process at this point. Identify the appropriate relationships among the entities, and define the minimum and maximum cardinality of each relationship. Make some additional assumptions about the business rules, if necessary.

Part 3: Create an E-R Diagram

Draw the initial E-R diagram based on the given business rules and the scenarios you defined in your detail document. Include a screen shot or jpeg of the E-R diagram in the CT03 assignment document for submission.

Reference no: EM131267387

Questions Cloud

Define your company target market : Define your company's target market. Analyze the types of consumers who will be drinking your beverage in demographic terms (i.e., age, education level, income, gender, ethnic group, etc.)
Write a program to find the sum of the test scores input : Write a C# program to find the sum of the test scores input by the user. Use this pseudocode as a guide to your design, in which the user inputs the number of test scores and each score.
How is the information age changing the nature of pricing : Explain how discounts, geographic pricing, and other pricing tactics can be used to fine-tune the base price.- Write a memo analyzing the factors you need to consider in your decision.
What is the ergodic capacity of this channel : Now assume that the transmitter can control the state of the channel and the receiver has access to channel state information. What is the capacity of the resulting channel?
Identify the entity to which the primary key belongs : Draw the initial E-R diagram based on the given business rules and the scenarios you defined in your detail document. Include a screen shot or jpeg of the E-R diagram in the CT03 assignment document for submission.
Information security professionals association : Select a non-profit cybersecurity organization.  CIUSPA - The Credit Union Information Security Professionals Association Identify aspects of the selected non-profit organization that align with Identity as a Service (IDaaS). How would the organiza..
Develop a price line strategy for each of the firms : Discuss product line pricing. - Develop a price line strategy for each of these firms:  a college bookstore, a restaurant, a video rental firm.
Create a project in which the input is the number of minutes : A local recording studio rents its facilities for $200 per hour. Management charges only for the number of minutes used. Create a project in which the input is the number of minutes it used the studio.
Develop the functional evolutionary maps of the markets : Develop the functional evolutionary maps of the markets and industry in which the company is embedded. Create functional maps (time-based evolutionary maps) for technology, product market, and manufacturing strategy of the firm. These maps will be..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Predicting kilowatt usage

Predicting Kilowatt Usage- Economics/Information System This paper uses excel to predict how kilowatt usage can be controlled over the next year using a growth grate

  Access control systemsaccess control

Access Control SystemsAccess Control Guidelines based on Data Classification Assignment RequirementsAssume you are a security engineer for a corporation. This corporation has developed a classification scheme as follows

  What are main advantages of using a network-based approach

What are the main advantages of using a network-based approach to project management rather than a Gantt chart? Under what circumstances might a Gantt chart be preferable to a network-based approach?

  Create a gantt chart illustrating the project tasks

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a simila..

  How many people could argue against my position

HOW does playing sports benefit people? WHICH people benefit from playing sports? Asking questions about the topic is a great way to find more specific information to include in my thesis.

  Analysis of wan found in the virtual organizations

Write the assessment for Riordan Manufacturing using the service request SR-rm-00-7 Analysis of WAN found in the Virtual Organizations

  What are strategies behind implementing risk management

What are some of the major strategies behind implementing risk management programs in today's technology filled world?

  Describe the challenges and opportunities of globalization

Describe the challenges and opportunities of globalization in a "flattened" world. List and describe six reasons why information systems are so important for business today.

  Different methods for keeping a personal health record

Visit www.myphr.com. Compare and contrast the two different methods for keeping a personal health record: paper vs. web-based

  Explain the types of information systems

Information Systems Proposal with five types of information systems that would work well for a new small nostalgic record company

  Develop estimate monthly budget for alternate site operation

Develop plans for alternate site relocation, and develop an estimated monthly budget for the alternate site operations. Detail out the Site Resumption Strategy and the time needed to become fully operational.

  Describe some of possible risks to the store security system

Draft a security policy that addresses the risks, identifies security goals, and discusses strategies for achieving those goals. Discuss some of the ethical and potential legal issues for the company and how the security measures that you've outlin..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd