Database management, computer science, Basic Computer Science

Assignment Help:
Suppose you are designing a database for an art museum that owns a large volume of works of art. Each work of art is described by a unique item code, a title, a type, and a size. The size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist for some works is unknown. An artist is described by a unique artist ID, a name, a date of birth, and possibly a date of death. Data are maintained about an artist only if that artist has works currently owned by the museum. At any point in time, a work of art is either on display at the museum, held in storage, away from the museum as part of a traveling show, or on loan to another gallery. If on display at the museum, a work of art is also described by its location within the museum. A traveling show is described by a unique show ID, the city in which the show is currently appearing, and the start and end dates of the show. Many of the museum works may be part of a given show, and only active shows with at least one museum work of art are to be represented in the database. Finally, another gallery is described by a unique gallery ID, its name, and its city. The museum wants to retain a complete history of lending for each work of art to other galleries, and, for each time a work is lent, the museum wants to know the date the work was lent and the date on which it was returned. Drawing manually (but neatly, in pencil), try to construct an E-R diagram for this database.

Related Discussions:- Database management, computer science

Access time - storage devices, Access time: Access time: This is the t...

Access time: Access time: This is the time required to locate and retrieve stored data from the storage unit in response to a program instruction. That is the time interval be

Cryptography, Assume |s1|=|s2|=n and consider the functions defined, for an...

Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as: (a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2). We have that: A. G1 and G2 are pseudo-ra

7489 ttl ram device, The 7489 TTL Ram Device: The 7489 TTL Ram package ...

The 7489 TTL Ram Device: The 7489 TTL Ram package has 64 memory cells, each cell is capable of holding a single bit of data.  The cells are organised into locations, and each l

Powerpoint presentation of qualitative analysis approaches, Compare and con...

Compare and contrast two qualitative analysis approaches. You must select two that are a true contast eg  CAQADS (say leximancer ) v discourse analysis or thematic analysis by hand

Transaction-based model, Transaction-based model: Here,  the pricing i...

Transaction-based model: Here,  the pricing is based on providing a committed business service, for ex, processing payroll for a global company as part of HR offering and this

Programmable rom (prom) , PROGRAMMABLE ROM (PROM): The user can program...

PROGRAMMABLE ROM (PROM): The user can program a PROM after purchase.  Each memory bit element in the PROM contains a nichrome or silicon link that acts as a fuse.  The user can

In-door patient department, In-door Patient Department Ideally all ...

In-door Patient Department Ideally all features of OPD.  Both OPD and IPD modules should be inter-linked.  In addition all details pertaining to the patient's medica

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd