subject
Computers and Technology, 30.09.2019 19:20 lohggg

Design er model specifying key attributes, entity types, relationship types (1: 1, 1: n, m: n), and structural constraints (partial or total participations). make your assumptions and state them (if any). choose appropriate attributes if not given as part of the requirement analysis. consider the following requirements for a university accommodation office: (a) each hall of residence has a name, number, address, telephone number and a hall manager who supervises the operation of the hall. the halls provide only single rooms which have a room number, place number and weekly rent rate. the total number of rooms provided by the accommodation office should be able to be computed on the fly. (b) the place number uniquely identifies each room in all of the halls controlled by the accommodation office and is used when renting a room to a student. (c) students may rent rooms throughout the academic year for various periods of time. each individual rent agreement between a student and the accommodation office is uniquely identified using a lease number. the data regarding rooms currently rented include the lease number, date that the students started rent period and date that the student wishes to terminate the rent period (if known). (d) information regarding an undergraduate student includes: student id, name (first, middle, last), home address (street, city, state, zipcode), date of birth, category of student (e. g. freshman, sophomore). (e) the total number of students living in each hall should be able to be computed. (f) information about a student's emergency contact is stored, including name, relationship, address, and contact number.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:00
What are the most likely causes of conflict at the meeting? check all that apply.
Answers: 1
question
Computers and Technology, 22.06.2019 20:00
Which type of file can be used to import data into a spreadsheet?
Answers: 1
question
Computers and Technology, 22.06.2019 23:00
Is an attack that relies on guessing the isns of tcp packets
Answers: 2
question
Computers and Technology, 23.06.2019 08:00
What is a scenario where records stored in a computer frequently need to be checked
Answers: 2
You know the right answer?
Design er model specifying key attributes, entity types, relationship types (1: 1, 1: n, m: n), a...
Questions
question
English, 28.09.2019 13:10
question
Social Studies, 28.09.2019 13:10