Determine candidate and primary key, Database Management System

Assignment Help:
  • A video rental company has several branches.
  • The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number.
  • Each branch is given a branch number, which is unique. Each branch is allocated staff, which includes a Manager. The Manager is responsible for the day-to-day running of a given branch.
  • The data held on a member of staff is his or her name, position, and salary. Each member of staff is given a staff number, which is unique.
  • Each branch has a stock of videos. The data held on a video is the catalog number, video number, title, category, daily rental, cost, status, and the names of the main actors, and the director. The catalog number uniquely identifies each video. However, in most cases, there are several copies of each video at a branch, and the individual copies are identified using the video number.
  • A video is given a category such as Action, Adult, Children, Drama, Horror, or Sci-Fi. The status indicates whether a specific copy of a video is available for rent.
  • Before hiring a video, a customer must first register as a member. The data held on a member is the first and last name, address, and the date that the member registered at a branch.
  • Each member is given a member number, which is unique. Once registered, a member is free to rent videos, up to maximum of ten at any one time.
  • The data held on each video rented is the rental number, the name and number of the member, the video number, title, and daily rental, and the dates the video is rented out and date returned. The rental number is unique.

(a)   Identify the main entity types of the company.

(b) Identify the main relationship types between the entity types and determine the multiplicity constraints for each relationship

(c)   Identify attributes and associate them with entity or relationship types.

(d)  Determine candidate and primary key attributes for each (strong) entity type.

(e)  Using your answers (a) to (d) create a single ER diagram. State any assumptions necessary to support your design.


Related Discussions:- Determine candidate and primary key

Special workarea for interface, While using extract datasets it is required...

While using extract datasets it is required to have a special workarea for interface False.  It is not required to have a special workarea for interface

Confirming.., I just purchased a document for you guys and wanted to confir...

I just purchased a document for you guys and wanted to confirm that it will be send within an hour or 2 to my email or where will document be sent to?

Explain the query processing, Explain the Query Processing  Data Query ...

Explain the Query Processing  Data Query Processing permits a user to report or analyze structured and unstructured data pulled from multiple data sources.

Working and processing files, 1.  Define each of the following IN YOUR OWN ...

1.  Define each of the following IN YOUR OWN WORDS: (a)   File: (b)   Record: (c)   Field: (d)   Primary Key: (e)   Secondary Key: 2.  A travel agency wants t

What is the highest normal form of the table - normalization, In problems 1...

In problems 1 - 4, you are given the columns of a table, and a set of functional dependencies.  Determine the normal form of this table.  Remember that the normal form is the HIGHE

What is the use of group by clause, What is the use of group by clause?  ...

What is the use of group by clause?  Group  by  clause  is  used to apply  aggregate  functions  to a  set  of  tuples. The attributes given in the group by clause are used to

Draw an e_r model in oracle, Draw an E_R Model for the following: An or...

Draw an E_R Model for the following: An organization uses number of items of a equipment to generates goods. Each item is at one LOCATION, of one TYPE and has a DETAILED_DISCRI

Normalization e, explain normalization,and give the examples 1NF,2NF,3NF,BC...

explain normalization,and give the examples 1NF,2NF,3NF,BCNF.AND FUNCTIONAL DEPANDENACY AND DECOMPOSITION TECHNIQUES.

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

Cost of reading a file , A file of employee have 10,000 blocks on a cylinde...

A file of employee have 10,000 blocks on a cylinder of a disk with characteristics r=8ms and btt=0.6ms I want to know the cost of read inthe file under following conditions for a q

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd