Determine candidate and primary key, Database Management System

Assignment Help:
  • A video rental company has several branches.
  • The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number.
  • Each branch is given a branch number, which is unique. Each branch is allocated staff, which includes a Manager. The Manager is responsible for the day-to-day running of a given branch.
  • The data held on a member of staff is his or her name, position, and salary. Each member of staff is given a staff number, which is unique.
  • Each branch has a stock of videos. The data held on a video is the catalog number, video number, title, category, daily rental, cost, status, and the names of the main actors, and the director. The catalog number uniquely identifies each video. However, in most cases, there are several copies of each video at a branch, and the individual copies are identified using the video number.
  • A video is given a category such as Action, Adult, Children, Drama, Horror, or Sci-Fi. The status indicates whether a specific copy of a video is available for rent.
  • Before hiring a video, a customer must first register as a member. The data held on a member is the first and last name, address, and the date that the member registered at a branch.
  • Each member is given a member number, which is unique. Once registered, a member is free to rent videos, up to maximum of ten at any one time.
  • The data held on each video rented is the rental number, the name and number of the member, the video number, title, and daily rental, and the dates the video is rented out and date returned. The rental number is unique.

(a)   Identify the main entity types of the company.

(b) Identify the main relationship types between the entity types and determine the multiplicity constraints for each relationship

(c)   Identify attributes and associate them with entity or relationship types.

(d)  Determine candidate and primary key attributes for each (strong) entity type.

(e)  Using your answers (a) to (d) create a single ER diagram. State any assumptions necessary to support your design.


Related Discussions:- Determine candidate and primary key

Define the third normal form, Define the Third Normal Form: The third ...

Define the Third Normal Form: The third normal form (3NF) is a normal form employed in database normalization. 3NF was initially defined by E.F. Codd in 1971. Codd's definitio

Explain the functional mode with help of an example, Explain the Functional...

Explain the Functional Mode with help of an example. Functional Model  The functional model shows a computation and functional derivation of data values in it without ind

Where does view definition stored, Where does view definition stored? ...

Where does view definition stored? A view definition is permanently stored as part of the database.

Explain the term - control as concurrent tasks, Explain the term - Control ...

Explain the term - Control as Concurrent Tasks As we know, any object can be implemented as a task in programming language or operating system. This is the most general approa

Explain the dependency relationship of object oriented, Explain the depende...

Explain the dependency relationship of object oriented A dependency is a relationship which states that a change in specification of one thing can affect another thing, but n

What is gathering information and producing erd, What is Gathering informat...

What is Gathering information and Producing ERD Gathering information: This could be a written document that explains the system in question with reasonable quantity of detai

What does conceptual design work, What does conceptual design work? A c...

What does conceptual design work? A conceptual design involves modelling independent of the DBMS.

What are the several forms of identity, What are the several forms of ident...

What are the several forms of identity? a) Value b) Name c) Built-in

Research in Concurency Control Protocols, Performance of Various Concurrenc...

Performance of Various Concurrency Control Mechanisms

Explain the shadow paging recovery technique, Explain the shadow paging rec...

Explain the shadow paging recovery technique.  Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd