Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Draw an ERD. The database should track work orders and tasks of work orders. The following detailed information requirements should be represented by the ERD.

Information stored about a customer includes a unique customer identifier, a name, and a billing address, which includes street, city, state, and zip.
A work order has a unique work order number, a creation date, a date required, a completion date, and a work address, which includes street, city, state and zip.
Customers submit work orders. Each work order is submitted by one customer only.
A work order is accomplished with a set of tasks. Each task has a unique identifier, a task name, and an hourly rate. Tasks are standardized across work orders so that the same task may be performed on many work orders.
When a work order is submitted, the company decides on which set of tasks needs to be performed. For ex, tasks T1, T4, T6 may need to be performed in order to accomplish work order W1. Tasks T2, T5, and T6 may need to be performed to accomplish work order W2. A task can require different number of hours to complete for different work orders. For ex, T6 of W1 may take 5 hours to complete while T6 of W2 may take 6 hours to complete. For each task required for a particular work order, the database needs to store the estimated number of hours. When the task is performed for that work order, the database should store the start date, the completion date, and the actual number of hours spent on that task.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9119197

Have any Question?


Related Questions in Computer Network & Security

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As