Database schemas and dependencies, Database Management System

Assignment Help:

1. Staff(staffID, firstName, lastName, availabilityID, experience, phone, mobile, email);

2. Availability(availabilityID, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday, Sick Leave);

3. Services (serviceID, itemBaseID, timeBasedID, priceID)

4. ItemBased (itemBasedID,itemName,priceID);

5. TimeBased (timebasedID,timename, priceid,hourlyrate);

6. Clients(clientID, firstName, lastName, phone, mobile, email, bookingID, paymentID);

7. Registered Clients (rClientId, rClientName, rClientAge, rClientAddress, rClientGender, rClientCreditCardNum, rclientCash)

8. Non Registered (nClientId, nClientName, nClientAge, nClientGender, nClientCreditCard, nClientcash)


9. 7.Beauty Salon (salonID,venueID , staffID, bookingID);

10. Parlour (parlourID, parlourName, parlourAddress,);

11. Treatment Venue (venueID, staffID, shopID,parlourID)

12. Bookings (bookingID, serviceName, staffID, clientID, venueID, Time);

13. Payment(paymentType, paymentID,)


Related Discussions:- Database schemas and dependencies

Subclassing, In the ER diagram, one example of subclassing is depicted foll...

In the ER diagram, one example of subclassing is depicted following the Services entity. The subclasses Item Based and Time Based are created. The entity Services gains the attribu

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Equi-join, explain equi-join using illustration

explain equi-join using illustration

Properties of a transaction , Properties of a Transaction        A tra...

Properties of a Transaction        A transaction has four main properties. These are: Atomicity Consistency Isolation or Independence Durability or Permanen

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Develop network database ipad app, I want an iPad app that is a simple 1 pa...

I want an iPad app that is a simple 1 page form to complete with text. The Objective is to allow a few dozen people of the same organization (they're all on iPad) to open the app,

Proposed information analysis, Add generation capabilities and/or tailor th...

Add generation capabilities and/or tailor the built-in functionality of generator. This enables you to produce "all" the test data for the MySQL tables you produced in the previous

OLD HOME POLICIES, Write an sql statement to find what is the percentage of...

Write an sql statement to find what is the percentage of home policies which are from the state of Arizona out of all Home policies by Policy Value.

Design and building a distributed information system, prototype of a distri...

prototype of a distributed information system for a national car part retail outlet chain.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd