List the different attributes for each entity

Assignment Help Basic Computer Science
Reference no: EM13984606

As a database expert, you were approached by a nonprofit organization to convert their data into a digital format. Currently all what they have are the paper forms shown below. The nonprofit organization collects money from donors either directly or through events. The collected money will be used to sponsor projects to help families in need. In the first project assignment (first phase) you will use the paper forms to identify the entities, their attributes, functional dependencies, and candidate keys. There will be NO coding, and you will NOT using Access for this assignment.

Use the forms to:

Identify the four entities the organization needs to track.

List the different attributes for each entity

Identify and document the functional dependences for all four entities (for example: EvenID (can determine) è (event description, .......)

Identify the Determinant for each entity, which can be used as Primary key. Some entities might not have a unique determinant, in this case create the proper surrogate key that can determine other attributes in an entity

Reference no: EM13984606

Questions Cloud

Favorite flavor of ice cream : In a recent survey, 35 percent indicated chocolate was their favorite flavor of ice cream. Suppose we select a sample of ten people and ask them to name their favorite flavor of ice cream.
Gas prices fluctuate often and in both directions : How responsive do you think consumers will be to the price change when these fluctuations occur due to changes in supply? Why? Use the various determinants of elasticity to explain your answer. How does the price elasticity of demand for gasoline imp..
What is the probability four or more name chocolate : a. How many of those in the sample would you expect to name chocolate? b. What is the probability exactly four of those in the sample name chocolate? c. What is the probability four or more name chocolate?
Suppose there is an increase in the saving rate : Suppose there is an increase in the saving rate. This increase in the saving rate will cause an increase in which of the following once the economy reaches its new steady state equilibrium?
List the different attributes for each entity : Identify the Determinant for each entity, which can be used as Primary key. Some entities might not have a unique determinant, in this case create the proper surrogate key that can determine other attributes in an entity
Positive population growth and technological progress : Assume that an economy experiences both positive population growth and technological progress. A reduction in the saving rate will cause:
Middle childhood or adolescent population : Create a brochure for prevention and treatment of that issue targeted at the middle childhood or adolescent population.
Prepare a contribution margin income statement for last year : What are some of the non-financial aspects of the automation decision that PB management should consider when deciding whether to embark on the automation project or not?
Explanation of the fmla law and appraise : Provide a brief explanation of the FMLA law and appraise this law.Which of these individuals is eligible for Family & Medical Leave Act (FMLA) leave?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Attacks to do a dos attack on web servers

We have studied in class how to use a variety of "slow" attacks to do a DoS attack on Web Servers. These attacks include SlowLoris, RUDY, Slow Reads etc. Perhaps the easiest such attack is SlowLoris. Recall that in this attack, a client sets up a ..

  Best practices for internetnetwork security

As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages with a minimum of 10 references regarding the topic: Best practices for internet/network security.

  Write a console program

Write a console program that repeatedly prompts the user to enter data until they type done (any case, Upper, Lower, or Mixed). As they enter the data, assign it to a two-dimension array where the first dimension contains exactly what they type an..

  Computer security week 4 discussions

Assume that you are part of a management team of a medium-size business that sells goods to consumers online. You know that your system was recently hacked, and that accounts and customer information may have been stolen. How do you respond to the..

  How much time for b to receive the whole file

Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a link of R=2 Mbps, and there are 4 routers between A and B.

  Bia determines the extent of the impact

According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific ex..

  Web security and how otp generated

Discuss the following task and write a report. WEB SECURITY,BACKGROUND RESEARCH,PROBLEM STATEMENT AND SOLUTIONS,One Time Password ,PROJECT REQUIREMENT,PROJECT IMPLEMENTATION,Architecture,How OTP Generated.

  How to build a gpa calculator with out using vectorization

How to build a GPA calculator with out using vectorization or any MATLAB array functions such as sum?

  Design a step by step algorithm

Design a step by step algorithm, keeping in mind the limitations of assembly language, to determine the physical address of the 3rd byte of the data segment variable LIST in the following code example.

  Explaining discrete-time system which moves between states

A decision maker observes a discrete-time system which moves between states {s1,s2,s3,s4} according to the following transition probability matrix?

  Describe a specific web or mobile application''s purpose

Describe a specific web or mobile application's purpose. How is it used. What changes has it brought about to its users? What are some likely future uses and enhancements. Remember to keep a business focus.

  How can organizations in a global market

how can organizations in a global market utilize Enterprise Content Management technology to maintain governance and control over content in ensuring regulatory compliance

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd