Determine candidate and primary key, Database Management System

Assignment Help:
  • A video rental company has several branches.
  • The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number.
  • Each branch is given a branch number, which is unique. Each branch is allocated staff, which includes a Manager. The Manager is responsible for the day-to-day running of a given branch.
  • The data held on a member of staff is his or her name, position, and salary. Each member of staff is given a staff number, which is unique.
  • Each branch has a stock of videos. The data held on a video is the catalog number, video number, title, category, daily rental, cost, status, and the names of the main actors, and the director. The catalog number uniquely identifies each video. However, in most cases, there are several copies of each video at a branch, and the individual copies are identified using the video number.
  • A video is given a category such as Action, Adult, Children, Drama, Horror, or Sci-Fi. The status indicates whether a specific copy of a video is available for rent.
  • Before hiring a video, a customer must first register as a member. The data held on a member is the first and last name, address, and the date that the member registered at a branch.
  • Each member is given a member number, which is unique. Once registered, a member is free to rent videos, up to maximum of ten at any one time.
  • The data held on each video rented is the rental number, the name and number of the member, the video number, title, and daily rental, and the dates the video is rented out and date returned. The rental number is unique.

(a)   Identify the main entity types of the company.

(b) Identify the main relationship types between the entity types and determine the multiplicity constraints for each relationship

(c)   Identify attributes and associate them with entity or relationship types.

(d)  Determine candidate and primary key attributes for each (strong) entity type.

(e)  Using your answers (a) to (d) create a single ER diagram. State any assumptions necessary to support your design.


Related Discussions:- Determine candidate and primary key

Single valued normalisation, Single Valued Normalisation  Codd in the y...

Single Valued Normalisation  Codd in the year 1972 formed three normal forms (1NF, 2NF, and 3NF). These were based on functional dependencies between the attributes of a relati

Explain the object-oriented decomposition, Explain the Object-oriented deco...

Explain the Object-oriented decomposition Object-oriented decomposition targets at identifying individual sovereign objects that encapsulate both a state and certain behavio

Production management, create an er diagram for production management in fi...

create an er diagram for production management in film industry

How is the database organised in oracle, How is the database organised in O...

How is the database organised in Oracle? Database organized within Oracle in terms of table and table holds attributes and values. A database consists of one or more logical

Write query to insert data in student table, Consider student (std_id, std_...

Consider student (std_id, std_name, date_of_birth, phone, dept_name). Put the data for a student with student id200, name arun, birth date 1 February, 1985, phone number (01110 328

Relationship between security and integrity, Relationship between Security ...

Relationship between Security and Integrity: Database security usually refers to access, while database integrity refers to avoidance of accidental loss of consistency. But usually

A basic model of database access control, A basic model of Database Access ...

A basic model of Database Access Control Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple mode

Distributed transaction atomic-consistent-isolated, A distributed transacti...

A distributed transaction consists of subtransactions that execute at different sites and access local DBMSs at those sites. For example, a distributed transaction that transfers m

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd