Computers and Technology

A library has a collection of items that they loan out to members. They refer to these items as holdings (as these are the items held). For each holding, they must keep track of its estimated value and the date it was originally acquired by the library. Items can be books, audio books, DVDs, or software. For books, we need to know the publisher. Audio books, the label. DVDs, the studio. And for software, the developer. 1. Draw an ER diagram that includes all of the necessary information in a single entity.
2. Draw an EER diagram version using supertypes and subtypes. Include subtype discriminators. Indicate whether there should be subtype overlap or disjoint. Indicate whether there is full or partial specialization. Add Assumptions to the side of your diagram to justify your design choices.
3. Add an entity for Library_Patron (we need to know at least their name and email address), and create an entity to keep track of when holdings are checked out and returned (and by whom).
4. Duplicate the EER diagram you made and expanded, but this time show the reverse of your choices for disjoint/overlap and partial/full-specialization. Add Assumptions to the side of your diagram to justify your design choices.
ER diagram should be made on paper or software anything works.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 09:00, jgrable5175
Designing a mobile web page is a little different from designing a regular web page. name at least three features that should be considered when designing a website that is mobile phone-friendly, and briefly explain why they are important.
Answers: 1
image
Computers and Technology, 24.06.2019 00:00, marika35
Visualizing a game of β€œtag” to remember the meaning of contagious
Answers: 3
image
Computers and Technology, 24.06.2019 13:00, ddaaaeeee2960
Which one of the following functions is not available on the autosum tool? sum average if max
Answers: 3
image
Computers and Technology, 24.06.2019 16:30, laureanogabriel
What is the item which could be matched with a statement below? software installed on a computer that produces pop-up ads using your browser an example of social engineering malware loads itself before the os boot is complete type of spyware that tracks your keystrokes, including passwords windows key + l the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer when someone who is unauthorized follows the employee through a secured entrance to a room or building a type of malware that tricks you into opening it by substituting itself for a legitimate program a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Answers: 1
Do you know the correct answer?
A library has a collection of items that they loan out to members. They refer to these items as hold...

Questions in other subjects:

Konu
History, 05.05.2020 19:37
Konu
Mathematics, 05.05.2020 19:37