Specify all integrity constraints

Assignment Help Basic Computer Science
Reference no: EM131312701

Database design. Consider the following Supply Chain information system description. The system should support a collaborative supply chain composed of suppliers, manufacturers, shippers, and end customers. Items of different kinds are being moved in the supply chain.Manufacturers use Items of materials to manufacture Items of products for customers. Suppliers supply Items of materials to manufacturers; they also supply Items directly to Customers.Shippers (e.g., UPS, Fedex etc) move items from one business entity (supplier, manufacturer, customer etc) to another.Items have a unique id and weight. Every business entity(suppliers, manufacturers, customers etc.) is identified by its id,and has a shipping location (to be used by Shippers for shippingorders),address, phone, web location, and contact information.Every product item (e.g., a table) has a number of associatedmaterial/part items in certain quantities necessary to produce 1unit of the product item. For example,a table product item, requires 1 table top item, 4 leg items and 8screw items. Suppliers supply Items, using price per unit, whichmay vary among different Suppliers for the same Item.Suppliers have volume discount applied on the dollar amountcomputed based on price per unit.Volume discount is described by a percentage of deduction for amount above a predetermined bound.Manufacturers produce product Items; this production has an associated setUpCost and product cost per unit.Manufacturers may offer volume discounts to customers applied the same way suppliers apply volume discounts. Shippers price shipping services per pairs of (source, destination)pairs, where sources and destinations are shipping locations of business entities.The pricing of each shipper is based on the total weight of shipment from source to destination, using price per lb, and a volume discount applied on the total dollar amount. Customers have demand quantity for certain Items.The orders are recorded separately for shipping, manufacturing, and supply.Shipping orders capture information about a shipper, sender, and recipient (who are business entities) and the Item being shipped,and record the quantity of the Item shipped.Manufacturing orders capture information about a manufacturer, a manufactured Item, and the ordered quantity; andSupply orders capture information about a supplier, Item, and the quantity supplied.

1. Create an ER diagram, and specify all integrity constraints. If some information is missing, suggest additional assumptions and briefly explain their rationale.

Reference no: EM131312701

Questions Cloud

Exercise price and the number of shares underlying option : A put option on 100 shares of Generous Dynamics stock has an exercise price $115.0 per share. GD declares 4.0-for-1 stock split. What happens to the exercise price and the number of shares underlying the option?
Discuss about the online-transfer delay policy : What reason would a bank have for not wanting to adopt the online-transfer delay policy? What additional types of network security, not mentioned in the case, would you recommend?Identify three policies a bank could implement to help it improve netwo..
How much change would you expect to see at 2508f : What DL from ‘‘before tightening'' would you expect to see at 2508F if you were using ultrasonics to measure stretch?
Fundamentals of cost accounting : The manager of the Personnel Department at City Enterprises has been reading about time-driven ABC and wants to apply it to her department. She has identified four basic activities her employees spend most of the their time on: Interviewing, Hiring, ..
Specify all integrity constraints : Create an ER diagram, and specify all integrity constraints. If some information is missing, suggest additional assumptions and briefly explain their rationale.
Define and implement a multimap adt : A MultiMap ADT is similar to the Map ADT but it uses two keys that map to a single data item instead of a single key as used with the Map ADT. Define and implement a MultiMap ADT.
Compare and discuss ipv4 and ipv6 : Compare and discuss IPv4 and IPv6 in terms of their security advantages on the Internet.
Highlights the important elements : You have just completed 10 weeks of an introduction to networking course. Imagine you have been asked to create a one-day training course that highlights the important elements of what you have just learned within the past ten (10) weeks.
By how much will the clamping force on the joint be reduced : By how much will the clamping force on the joint be reduced? Sketch the new joint diagram, assuming maximum initial preload?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe a process framework in your own words

When we say that framework activities are applicable to all projects, does this mean that the same work tasks are applied for all projects, regardless of size and complexity? Explain.

  What happens and why that behavior is a problem

What kinds of problems can arise when two hosts on the same Ethernet share the same hardware address? Describe what happens and why that behavior is a problem.

  Differentiate between absolute and relative sectors

Differentiate between absolute and relative sectors. What are some typical drawbacks to Windows data acquisition tools

  Statement for master degree

This is purpose of statement for master degree. We would like some feedback about it and correct for grammatical mistakes if possible. Statement for master degree:

  Describe the conceptual model employed in the design

Compare and contrast the metaphors used in the design of applications that run on each type of monitor. Use Microsoft Visio, Microsoft PowerPoint, or any other modeling tool to create.

  Hardware-software setup required

According to the Siles (2010), the huge adoption of wireless technologies over recent years has placed wireless data (or Wi-Fi) networks, based on the 802.11 specifications, as one of the major attack vectors for organizations nowadays. Incident h..

  What must be done so that both generate the same

What must be done so that both generate the same (shorter) instruction sequence?

  Changes into memory without logging out

LINUX If you make changes to .bash_profile and you want to load those changes into memory without logging out and back in again, what command can you use?

  Hard drive on a traditional tower computer

How do you replace a hard drive on a traditional tower computer? If someone could walk me through the steps to install and setup, that would be very helpful! Thank you in advance

  Show that if strings over an alphabet are encoded

Show that if strings over an alphabet A with at least two letters are encoded over a one-letter alphabet (a unary encoding), then strings of length n over A require strings of length exponential in n in the unary encoding.

  Design and implement a dhcp solution

As a system administrator at Adatum Inc., a small company that has about 25 employees. You have 3 servers and 25 workstations to manage. Design and implement a DHCP solution for your company using Windows Server 2012 R2 that meet these requirement..

  Visual effects and mobile websites

Imagine that you add Internet Explorer filters to a Website containing fixed images to enhance the images with a shadow. After adding the filters, it fails to work. Explain why this may have happened. Propose another solution that you can use to g..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd