Modeling an emergency communication system

Assignment Help Basic Computer Science
Reference no: EM131223128

You are modeling an emergency communication system used to contact teachers in case inclement weather emergencies cause delayed openings or closures of the school. You may reach teachers by phone and/or email. The school must have at least one means of contact (phone or email) for each teacher. Each teacher may have more than one of each contact type. Which type of entity would you use in conjunction with the TEACHER entity to model a teacher's contact information?

You decide to model a CONTACT table with primary key of Teacher-ID and Contact-Info, which is the contact information itself. The school principal, a major stakeholder, tells you she wants to track the area code for each teacher's phone number(s):

Will your original modeling concept work? If not, how would you change the model to reflect the principal's request?

How many entities would you need to represent the unique attributes of telephone numbers and email addresses so that no entity contained null values?

The principal reminds you that every teacher must have at least one phone number, but having an email address is not a requirement. Where would you reflect the phone number constraint in your model?

Reference no: EM131223128

Questions Cloud

Compute interest expense for the semi-annual period : On January 1, 2013 the Mack Company issues $16,000,000 of 11% bonds dated January 1. Interest is payable semiannually on June 30 and December 31. The bonds mature in 4 years. The issue price of the bonds was $16,517,057.02 with no bond issue cost. qu..
Write a report recommending purchase of the company stock : Using the concepts from this course, you will analyze the strengths and weaknesses of the company and write a report either recommending or not recommending purchase of the company stock.
Discuss the ethical concerns this might present : Running a business presents challenges such as managing finances from a broad scale, including ensuring the bills are paid, credit is not misused, and keeping the doors open. Do you think there are ways to combat such challenges without having to lay..
Did you have any difficulties finding your ancestor : Did you have any difficulties finding your ancestor? For example, did you initially try to locate someone else and switch to the person you are reporting on? Was what you knew about your ancestor from family members today consistent with what was ..
Modeling an emergency communication system : You are modeling an emergency communication system used to contact teachers in case inclement weather emergencies cause delayed openings or closures of the school. You may reach teachers by phone and/or email. The school must have at least one mea..
Accounted for as part of stockholders equity : During 2014, Gordon Company issued at 104 four hundred, $1,000 bonds due in ten years. One detachable stock warrant entitling the holder to purchase 15 shares of Gordon’s common stock was attached to each bond. The market value of each detachable war..
What are the genotypes of the original parents in this cross : Biology 22 Problem Set 1 Fall 2015 Assignment. What are the genotypes of the original parents in this cross? Write each genotype to show which alleles are linked together on the same chromosome
Write a program to scan : Write a program to scan 2 integer numbers from user, then check for below conditions: a). If both the numbers are equal, print a message "Both numbers are equal". b). If first number is greater than second number, print a message "First number is gre..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write an sql statement to create a table named picture

Also assume that Name and Date Taken are required. Use Name as the primary key. Set the default value of Description to ‘(None)'.

  Part of project time management

Identify the planning tasks performed as part of project time management. What is the critical path for a project? Why is it important to know which tasks are on the critical path? How would you gain support from the project sponsor on the tasks o..

  Item is to identify causes of erp implementation

This assessment is worth 45% of the total available marks for this course. The purpose of this assessment item is to identify causes of ERP implementation failure at Waste Management Company and provide possible solutions which can be used for fut..

  Mesa community college can increase it''s green footprint

Please title the page appropriately. Please use Microsoft Word. Please double-space the Word Document. Be creative! Are we using Word to create all writing assignments?

  What is the 8-bit hex read address

What is the 8-bit hex read address?

  Fresh data instead of requiring web page to reload

Tim O'Reilly, "Web 2.0 is a loose collection of information technologies and applications, plus the web that use them" (Rainer, p. 174). Some 2.0 web sites are AJAX, tagging, blogs, and wikis. AJAX: "is a Web development technique that allows p..

  Instantiate three objects from the class

After creating the objects, use the object's ToString to display each objects information. Now set a value for the finalGrade in each object, and set graduateSemester in the third object to true. Again using the objects Tostring to display each ob..

  How would you specify this protection scheme in unix

Option 1: Write a 1- to 2-page paper that discusses the following scenario: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNI..

  What percent of teenage boys

(1) What percent of teenage boys have high cholesterol levels (2) We select a sample of n = 50 teenage boys. What is the probability that the sample mean will be less than or equal to 180 mg/dL?

  Security models and cloud operations

"Security Models and Cloud Operations" Please respond to the following: 1.  Analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your find..

  Additional web resources for telecommunication-network

You may search these questions or part of them on the web resource links available under "Additional Web Resources for Telecommunication & Network Security.pdf". If you do so, you must provide the reference to the resource as well as cite in your ..

  Please analyse the 2008 economic recession and provide

Please analyse the 2008 economic recession and provide a brief paper

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd