Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question

Generate a complete ERD in Crow's Foot notation that be able to be implemented in relational model using the following description of operations. Hot Water (HW) is a small start-up company that sells spas. HW does not hold any stock. A few spas are set up in a simple warehouse so customers can see some of models available, other than any products sold have to be ordered at the time of sale.

1. HW can get spas from numerous different manufacturers.

2. Each manufacturer produces one or more changed brands of spas.

3. Each and every brand is formed by only one manufacturer.

4. Every brand has one or more models.

5. Every model is produced as part of brand. For instance, Iguana Bay Spas is a manufacturer that produces Big Blue Iguana spas, a premium-level brand, and Lazy Lizard spas, an entry-level brand. The Big Blue Iguana brand offers several models, including the BBI-6, an 81-jet spa with two 6-hp motors, and BBI-10, a 102-jet spa with three 6-hp motors.

6. Every manufacturer is identified by a manufacturer code. Company name, address, area code, phone number, and account number are kept in the system for every manufacturer.

7. For each brand, brand name and brand level (premium, mid-level, or entry-level) are kept in a system.

8. For each model, model number, number of jets, number of motors, number of horsepower per motor, suggested retail price, HW retail price, dry weight, water capacity, and seating capacity have to be kept in a system.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9718864

Have any Question?


Related Questions in Computer Engineering

1 what is the purpose of exclusive gates such as the xor

1. What is the purpose of exclusive gates such as the XOR and XNOR? 2. What function do these gates perform?

Question suppose that an application has m input variables

Question : Suppose that an application has M input variables and that each variable partitions the input space into N equivalence classes. The multidimensional partitioning approach will divide the input domain into how ...

How do you make a java program that reads two diagonal

How do you make a Java program that reads two diagonal points, say p1 and p2, of an up-right rectangle and finds both the smallest circle containing the rectangle and the largest circle that can be contained in the recta ...

A single precision ieee 754 number is stored in memory at

A single precision IEEE 754 number is stored in memory at address X. Write a sequence of ARM instructions to multiply the number at X by 16 and store the result back at X. You must accomplish this without using any float ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

The following conversation has some mistakes can u help me

The following conversation has some mistakes, can u help me point them out? what are the mistakes? Mark: Hi, David, my company does not use much computer technology and I would like to change that. But I have a few quest ...

In simple python form pleasewrite a script that asks the

In Simple Python form please: Write a script that asks the user to input the name of a file, opens the file, reads its contents, prints the contents of the file on the screen, and closes the file. If no such file exists, ...

Reading the biographybook where the body meets memory by

Reading the Biography Book : "Where the Body Meets Memory" by David Mura Questions: The internment camps were a very painful experience for Japanese Americans. They were also a very important and awkward chapter in Ameri ...

Select a failed software project and run a postmortem

Select a failed software project and run a postmortem analysis on it. You may choose one discussed in class or research one yourself. In your analysis, identify the following: What was the purpose of the software? How di ...

What are security planning principles what is policy-based

What are Security Planning Principles? What is policy-based security? (Hint for both: pure definition is not good enough. Answers need to be illustrated in the context of an example or scenario).

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As