Which entities are dependent and which are independent

Assignment Help Computer Engineering
Reference no: EM131165854

BOAT CHARTER COMPANY

A charter company owns boats that are used for charter trips to islands. The company has created a computer system to track the boats it owns, including each boat's ID number, name, and seating capacity. The company also tracks information about the various islands, such as their names and populations. Every time a boat is chartered, it is important to know the date that the trip is to take place and the number of people on the trip. The company also keeps information about each captain, such as Social Security number, name, birthdate, and contact information for next of kin. Boats travel to only one island per visit.

QUESTIONS:

1. Create a data model. Include entities, attributes, identifiers, and relationships.

2. Which entities are dependent? Which are independent?

3. Use the steps of normalization to put your data model in 3NF. Describe how you know that it is in 3NF.

Reference no: EM131165854

Questions Cloud

What does the employment retirement income security act : What do you think Mrs. Jones should do at this point? -  What does the Employment Retirement Income Security Act of 1974 have to say about this issue?
Summarize and combine the information about the families : To analyze the interview results, compare and contrast common themes of the families' demographics, sociological, physiological, psychological, and cultural aspects. Explain the issues or problems that may exist for the families.
Explain why you have drawn all possible trees : Draw the minimum number of drawings of trees you can so that each tree with five vertices has one of those drawings. Explain why you have drawn all possible trees.
What solution would you propose for the company : What solution would you propose for this company? Discuss the role that data modeling would play in a project to solve this problem.
Which entities are dependent and which are independent : Create a data model. Include entities, attributes, identifiers, and relationships. Which entities are dependent? Which are independent? Use the steps of normalization to put your data model in 3NF. Describe how you know that it is in 3NF.
How much your recommendations would cost : What recommendations would you make to Len?  - How much do you think your recommendations would cost?
Does every tree have a vertex of degree 1 : Does every tree have a vertex of degree 1? If the answer is yes, explain why. If the answer is no, try to find additional conditions that will guarantee that a tree satisfying these conditions has a vertex of degree 1.
What is the formula to figure : One year ago, you invested $3,480. Today it is worth $3,700.50. What rate of interest did you earn? What is the formula to figure this out?
What are the major unknowns about how this will turn out : In taking the long view, what are the major unknowns about how this will turn out? What choices have you already made, and what opportunities have been granted or withheld from you that will determine this outcome?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Comprise the demerits of not seeing the customer

write a 200- to 300-word response to the following local computer support provides an over-the-phone experience for the

  Manage the threat, the risk, the disaster

Does one manage an imminent disaster or respond to it? Take a tornado, for example. Is this an imminent disaster waiting to happen? Do you manage the threat, the risk, the disaster or all three.

  Computer platformscomputer systems may be classified into

computer platformscomputer systems may be classified into two categories classical and quantum. this assignment will

  Medium access control methods

Task 1: Both the CSMA/CD with Token bus medium access control methods can be used in real time systems. Which one is better suited for real time applications? Explain.

  Steganography to send out messages

Suppose that a tightly knit group of political dissidents living in a repressive country are using steganography to send out messages to the world about conditions in their country.

  Explain how is cryptography technology used in it

question 1 how is cryptography technology used in it security?question 2 what are intrusions? describe the various

  Write down the sql command to add math scope

Write down the SQL command to add SUBJECT to TUTOR. The only values allowed for SUBJECT will be "Reading", "Math", and "ESL".

  Create a program which contains a function called sumn()

Create a program which Contains a function called sumN().

  Questiongiven a series of numbers that represent adding

questiongiven a series of numbers that represent adding fuel 2 and subtracting fuel 1 determine highest distance that

  Demonstrate that the expected search time for hashing

Demonstrate that the expected search time for hashing

  Should dma access to main memory be given higher priority

write a 200- to 300-word short-answer response to the followingshould dma access to main memory be given higher

  How to design the network

Pat's Engineering Works is a small company that specializes in complex engineering consulting projects. The projects typically involve one or two engineers who do data intensive analyses for companies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd