Database management, computer science, Basic Computer Science

Assignment Help:
Suppose you are designing a database for an art museum that owns a large volume of works of art. Each work of art is described by a unique item code, a title, a type, and a size. The size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist for some works is unknown. An artist is described by a unique artist ID, a name, a date of birth, and possibly a date of death. Data are maintained about an artist only if that artist has works currently owned by the museum. At any point in time, a work of art is either on display at the museum, held in storage, away from the museum as part of a traveling show, or on loan to another gallery. If on display at the museum, a work of art is also described by its location within the museum. A traveling show is described by a unique show ID, the city in which the show is currently appearing, and the start and end dates of the show. Many of the museum works may be part of a given show, and only active shows with at least one museum work of art are to be represented in the database. Finally, another gallery is described by a unique gallery ID, its name, and its city. The museum wants to retain a complete history of lending for each work of art to other galleries, and, for each time a work is lent, the museum wants to know the date the work was lent and the date on which it was returned. Drawing manually (but neatly, in pencil), try to construct an E-R diagram for this database.

Related Discussions:- Database management, computer science

Microsoft office, Finding someone who doesn''t use some aspect of Microsoft...

Finding someone who doesn''t use some aspect of Microsoft Office on a daily basis is difficult. Whether it is Outlook for email,Word for creating and editing documents,or Excel f

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Describe Priority Scheduling algorithm of operating system?, Priority Sched...

Priority Scheduling • The fundamental idea is straightforward: each process is assigned a priority, and priority is permitted to run. Equal-Priority processes are scheduled in FCF

What is Assembly Language?, Assembly language is fundamentally the local la...

Assembly language is fundamentally the local language of your computer. In principle the processor of your machine understands machine code (consisting of ones and zeroes). But wit

D, #questionWrite a program to find the area under the curve y = f(x) betwe...

#questionWrite a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two poi

Date mining, I have assignment in Date mning can you help me

I have assignment in Date mning can you help me

Management information system, suggest 5 ways by which new products and ser...

suggest 5 ways by which new products and services can be developed using management information system

Innovation, role of an system analyst as an innovator

role of an system analyst as an innovator

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd