Determine candidate and primary key, Database Management System

Assignment Help:
  • A video rental company has several branches.
  • The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number.
  • Each branch is given a branch number, which is unique. Each branch is allocated staff, which includes a Manager. The Manager is responsible for the day-to-day running of a given branch.
  • The data held on a member of staff is his or her name, position, and salary. Each member of staff is given a staff number, which is unique.
  • Each branch has a stock of videos. The data held on a video is the catalog number, video number, title, category, daily rental, cost, status, and the names of the main actors, and the director. The catalog number uniquely identifies each video. However, in most cases, there are several copies of each video at a branch, and the individual copies are identified using the video number.
  • A video is given a category such as Action, Adult, Children, Drama, Horror, or Sci-Fi. The status indicates whether a specific copy of a video is available for rent.
  • Before hiring a video, a customer must first register as a member. The data held on a member is the first and last name, address, and the date that the member registered at a branch.
  • Each member is given a member number, which is unique. Once registered, a member is free to rent videos, up to maximum of ten at any one time.
  • The data held on each video rented is the rental number, the name and number of the member, the video number, title, and daily rental, and the dates the video is rented out and date returned. The rental number is unique.

(a)   Identify the main entity types of the company.

(b) Identify the main relationship types between the entity types and determine the multiplicity constraints for each relationship

(c)   Identify attributes and associate them with entity or relationship types.

(d)  Determine candidate and primary key attributes for each (strong) entity type.

(e)  Using your answers (a) to (d) create a single ER diagram. State any assumptions necessary to support your design.


Related Discussions:- Determine candidate and primary key

Database recovery and security, Database Recovery And Security Introdu...

Database Recovery And Security Introduction In this part we will introduce two main issues relating to database management systems. A computer system suffers from dissi

Mis, explain three types of internet risks to the consummers whent he busin...

explain three types of internet risks to the consummers whent he business system is data dependent. how can we minimise these risks

What is the aim of logical schema, What is the aim of logical schema ? ...

What is the aim of logical schema ? The main motive of the logical schema is to ensure the portability of procedures and models on various physical schemas at runtime.

Compute the closure set, Compute the closure (F+) for the following set of ...

Compute the closure (F+) for the following set of the functional dependencies defined on R(a,b,c,d), where F - {c→ a, ab → d, a → b, d → c}, i.e. what are all of the FDs implied b

Define aggregate functions, Define Aggregate functions and what aggregate f...

Define Aggregate functions and what aggregate functions supported by the MySQL To calculate a summary value from a set of individual values and uses one of the functions known

Explain the structure of well formed formulae, Explain the structure of wel...

Explain the structure of well formed formulae in relational calculus. Ans: a. An atom is a formula b. If P1 is a formula, after that so are ¬P1 and (P1) c. If P1 and P2 a

Fragmentation, let us consider a table having 2200 records and the fixed si...

let us consider a table having 2200 records and the fixed size of the table to be considered as 25.then how many numbers of table is requredto perform horizontal fragmentation

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

Security and integrity, Security And Integrity After Reading the concep...

Security And Integrity After Reading the concepts of database recovery in the last section, let us now deal with a vital concept that helps in minimizing consistency errors in

What are the uses of the information in the data dictionary, What are the u...

What are the uses of the information in the Data dictionary? The following information is directly taken from the Data dictionary: Information on fields displayed with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd