EER models, Database Management System

Assignment Help:
Ask question #MinimThe Georgia Tech Library (GTL) has approximately 16,000 members, 100,000 titles, and
250,000 volumes (an average of 2.5 copies per book). About 10 percent of the volumes are out on
loan at any one time. The librarians ensure that the books that members want to borrow are
available when the members want to borrow them. Also, the librarians must know how many copies
of each book are in the library or out on loan at any given time. A catalog of books is available online
that lists books by author, title, and subject area. For each title in the library, a book description is
kept in the catalog that ranges from one sentence to several pages. The reference librarians want to
be able to access this description when members request information about a book. Library staff
includes chief librarian, departmental associate librarians, reference librarians, check-out staff, and
library assistants.
Book can be checked out for 21 days. Members are allowed to have only five books out at a
time. Members usually return books within three to four weeks. Most members know that they have
one week of grace before a notice is sent to them, so they try to return books before the grace
period ends. About 5 percent of the members have to be sent reminders to return books. Most
overdue books are returned within a month of the due date. Approximately 5 percent of the
overdue books are either kept or never returned. The most active members of the library are
defined as those who borrow books at least ten times during the year. The top 1 percent of
membership does 15 percent of the borrowing, and the top 10 percent of the membership does 40
percent of the borrowing. About 20 percent of the members are totally inactive in that they are
members who never borrow.
To become a member of the library, applicants fill out a form including their SSN, campus
and home mailing addresses, and phone numbers. The librarians issue a numbered, machinereadable
card with the member’s photo on it. This card is good for four years. A month before a card
expires, a notice is sent to a member for renewal. Professors at the institute are considered
automatic members. When a new faculty member joins the institute, his or her information is pulled
from the employee records and a library card is mailed to his or her campus address. Professors are
allowed to check out books for three-month intervals and have a two-week grace period. Renewal
notices to professors are sent to their campus address.
The library does not lend some books, such as reference books, rare books, and maps. The
librarians must differentiate between books that can be lent and those that cannot be lent. In
addition, the librarians have a list of some books they are interested in acquiring but cannot obtain,
such as rare or out-of-print books and books that were lost or destroyed but have not been
replaced. The librarians must have a system that keeps track of books that cannot be lent as well as
books that they are interested in acquiring. Some books may have the same title; therefore, the title
cannot be used as a means of identification. Every book is identified by its International Standard
Book Number (ISBN), a unique international code assigned to all books. Two books with the same
title can have different ISBNs if they are in different languages or have different bindings (hardcover
or softcover). Editions of the same book have different ISBNs.
The proposed database system must be designed to keep track of the members, the books,
the catalog, and the borrowing activityum 100 words accepted#

Related Discussions:- EER models

Special workarea for interface, While using extract datasets it is required...

While using extract datasets it is required to have a special workarea for interface False.  It is not required to have a special workarea for interface

Explain concurrency control, Explain concurrency control? Concurrency ...

Explain concurrency control? Concurrency control Oracles multiversion concurrency control varies from the concurrency mechanism used by some other data base vendors. Read

Wound-wait scheme-deadlock prevention, " Wound-wait" scheme : It is based o...

" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

E - r schema with weak entity, Consider the E/R schema with weak entity set...

Consider the E/R schema with weak entity sets shown below. Come up with the SQL CREATE TABLE statements (with appropriate primary key, unique and foreign key constraints). Include

What are the different approaches for database design, What are the differe...

What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att

Unix System Administration, What Command You Use What Day of the week were ...

What Command You Use What Day of the week were you born

File organisation in dbms, File Organisation In Dbms Introduction ...

File Organisation In Dbms Introduction Databases are used to store information. Usually, the principal operations we have to perform on database are those relating to:

Ordering of tuples, In a relation, tuples are not inserted in any definite ...

In a relation, tuples are not inserted in any definite order. Ordering of tuples is not defined as a part of a relation definition. Though, records may be structured later accordin

DW, #ques Define a job scheduling strategy that will meet business requirem...

#ques Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd