Difference between a composite key and attribute, Database Management System

Assignment Help:

Question:

(a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate example.

(b) Use the following business rules to produce the E-R diagram. Identify at least two attributes for each of the identified entity. You should clearly show all the minimum and cardinality constraint on each side of the relationship.

(i) A department employs many employees, but each employee is employed by one department.

(ii) Some employees, known as "rovers," are not assigned to any department.

(iii) A division operates many departments, but each department is operated by one division.

(iv) An employee may be assigned to many projects and a project may have many employees assigned to it.

(v) A project must have at least one employee assigned to it.

(vi) One of the employees manages each department.

(vii) One of the employees runs each division.

(c) Map the ERD produced into its equivalent Relational Schema.


Related Discussions:- Difference between a composite key and attribute

Explain about primary key, Explain about primary key Primary Key: It ...

Explain about primary key Primary Key: It is one of the candidate keys that are taken to be the recognizing key for the entire table. E.g. although there are two candidate ke

The basic 2pl-two phase locking (2pl), Normal 0 false false ...

Normal 0 false false false EN-US X-NONE X-NONE

The extract statement do in extract datasets, What does the extract stateme...

What does the extract statement do in extract datasets? The data is written to virtual memory by extract commands.

Php optimization on iis 8, Project Description: We have purchased facebo...

Project Description: We have purchased facebook style chat software which we are using with our site. It is prepared in PHP but the rest of the site is developed asp.net. Iss

Relational declarative database language environment, Server Control It ...

Server Control It is usual to control access to the data via the front end application, for example by displaying data as ‘read only'. This part of the assignment illustrates ho

Give an example of operations from the functions of a bank, Give an example...

Give an example of Operations from the functions of a bank. For creation of a saving account, you can write: bank::: create -savings-account (customer)->account. For oper

Write the sql queries using data manipulation language, Problem 1. Writ...

Problem 1. Write the SQL queries using Data Manipulation Language (DML) statements. Insert values into student table with field names using insert command Display the

Differentiate between various levels of data abstraction, Differentiate bet...

Differentiate between various levels of data abstraction? Data Abstraction - Abstraction is the procedure to hide the irrelevant things from the users and represent the rele

Define radix conversion method, Define Radix conversion method  One cle...

Define Radix conversion method  One clever way to transform binary numbers to BCD notation (binary-coded decimal) is the "double dabble algorithm". It can be adapted to transfo

Explain foreign key, Explain Foreign Key? Foreign Key - Let there are...

Explain Foreign Key? Foreign Key - Let there are two relations (tables) R and S. Any candidate key of the relation R that is referred within the relation S is known as the fo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd