Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Please Suggest the Entities and Attributes and their data types for creating a database for the scenario below:

Cougar Pizza Pies is a new concept in pizza delivery. Dylan and Samantha Morgan have been serving high-class pizzas for over 20 years but have decided to take a new direction with their next pizza concept. Instead of focusing on an ever-increasing variety of specialty pizzas, the Morgans have decided to turn the value concept toward the high-volume, late-night pizza-delivery business. Certainly, being close to Atlanta United University, home of the Cougars, and its 38,000 students provides a deep and growing market for their business. As such, the Morgans are creating Cougar Pizza Pies to sell and deliver pizzas only between midnight and 4:00 a.m. A view of the current competitive landscape shows that no other business is currently targeting that same market.

The Morgans believe that the simplest business model will bring them the best success in their desired market. As such, the new restaurant will not have any seating (as most orders will be delivered), but it will allow for pickup of pizzas if needed. It will also have a limited menu of pizza types (thin, regular, or pan) and a limited topping list (pepperoni, sausage, ham, and extra cheese) in order to facilitate the high sales volume expected. Also, to coordinate special instructions from customers (delivery access, cooking preferences, etc.), the Morgans would like to have an area where they can add customer notes to orders.

Following their simplicity model, the Morgans have fixed their prices as follows:

? Thin and Regular Crust: $13.00

? Pan Pizza: $15.00

? Toppings: $2.00 each

Furthermore, for marketing outreach and research purposes, they would like to track orders by phone number, street address, city, state, and zip code.

The Morgans would like to determine and validate that their new business is profitable and business-savvy. Thus, they have hired you to design a database that supports the validation of the late-night pizza-delivery business. Along with any considerations mentioned above, they know they need to be able to track the following details in a database:

Pizza orders, including toppings added.

Customer who ordered pizza.

Address pizza was delivered to.

Name and phone number of employee who delivered pizza.

Name of employee who took pizza order.

Sales per hour, day, week, and month.

Delivery status details at various points in the night. Each order should have a status along with the order date and time and the delivery date and time. Note that if a customer picks up the pizza, the pickup time is the delivery time.

Some other considerations for the ordering process include the following:

? A customer can certainly order more than one pizza.

? Customers move often and may order from different locations (a friend's house, for instance), so address details may also change often. However, each customer would have one preferred address.

? Most orders need to be completed and delivered within an hour.

? The Morgans envision opening other stores in other college towns if this venture is successful, so they would like this database to handle multiple stores.

The Morgans are hoping to implement the database very soon, most certainly within the next few months.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92778296
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Artificial intelligence techniques assignment -

Artificial Intelligence Techniques Assignment - Combinatorial Optimisation Learning Outcomes Covered 1. Research and analyse the general nature of artificial intelligence and the problems it solves. 2. Apply and evaluate ...

Research the followingmy company is alibabadetermine its

Research the following my company is Alibaba Determine its mission, vision, and goals. Discuss its IT architecture. Describe its databases, data warehouse, and data mining. Discuss it network system. Discuss its security ...

What are the uses and value of statistical significance

What are the uses and value of statistical significance testing and the p-value as demonstrated in the various analytical techniques (t-tests, ANOVA, chi-square, etc.). What's the fundamental reason we apply these techni ...

Question suppose that the equallists function page 49 of

Question : Suppose that the equal_lists function (page 49 of Sebesta's Book Concepts of Programming Languages edition 11) is called with the lists ((A (B)) (C)) and ((A (B)) (C)) as the arguments. How many calls of equal ...

How does consumers influence the market price of goods it

How does consumers influence the market price of goods it sells, and what does the term, "market power" means?

Determine the number of moles of oleic acid in the

Determine the number of moles of oleic acid in the monolayer. Assume the nubmer of grams of oleic acid in the monolayer is  7.12×10 -6  g MW for oleic acid is 282 g/mol.

Its almost election day and the election officials need a

It's almost election day and the election officials need a program to help tally election results. There are two candidates for office-Polly Tichen and Ernest Orator. The program's job is to take as input the number of v ...

Suppose that we have a block cipher and want to use it as a

Suppose that we have a block cipher and want to use it as a hash function. Let X be a specified constant and let M be a message consisting of a single block, where the block size is the size of the key in the block ciphe ...

Truefalse questions no explanation is neededa on a

True/False Questions (NO explanation is needed): (a) On a Windows-based laptop computer the SECURITY registry file maintains a list of the host computer's wireless connections. (b) IEEE 802.11 Security Standard WEP (Wire ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As