Modern Database Management
Modern Database Management
13th Edition
ISBN: 9780134773650
Author: Hoffer
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 2, Problem 2.39PAE

(a)

Program Plan Intro

Drawing an ERD for the given situations and answering the given questions:

Check that the attribute name follows the naming convention or not? check if there is any associative entity in the given ERD and write it if it is present in the ERD? Check is the given ERD allow the project to be created before it is assigned to any employee? How can we change the ERD if the billing rate changes in the middles of the project?

(b)

Program Plan Intro

Draw an ERD for the data and provide definitions of all the relationship in the solution.

(c)

Program Plan Intro

Draw an ERD for the data and model the section with another methods.

(d)

Program Plan Intro

Draw an ERD for the given situation. Answer whether you draw more than one relationship between physician and patient. Provide reason for same. Mention whether you include hospital as an entity type or not and if your ERD allow for the same patient to be admitted by different physicians over time. Ways in which you include on the ERD the need to represent the date on which a patient is admitted for each time he or she is admitted.

(e)

Program Plan Intro

Draw an ERD for the given situation. Assume that credit result is not reused for multiple credit requests. Redraw the ERD for this new situation using two entity types, and then redraw it again by using one entity type. Which of these two versions do you prefer, and why?

(f)

Program Plan Intro

Draw an ERD for this situation. After that consider a new attribute, Hourly Rate, which is the rate a consultant charges a company for each hour of his or her services. Redraw the ERD to include this new attribute. Now, consider that each time a consultant works for a company, a contract is written describing the terms for this consulting engagement. Contract has attributes such as Company ID, Consultant ID, and Contract Date. Assume that a consultant can still work foronly one company at a time, redraw the ERD for this new situation. Can we move any attributes to different entity types in this latest situation? As a final situation, now consider that although a consultant can work for only one company at a time, we now need to keep the complete history of all consulting engagements for each consultant and company. Draw an ERD for this final situation. Explain why these different changes to the situation led to different data models, if they did.

(g)

Program Plan Intro

Draw an ERD for the given situation:

(h)

Program Plan Intro

Draw an ERD for the given situation:

(i)

Program Plan Intro

Draw an ERD for the given situation:

Blurred answer
Students have asked these similar questions
The next problem concerns the following C code: /copy input string x to buf */ void foo (char *x) { char buf [8]; strcpy((char *) buf, x); } void callfoo() { } foo("ZYXWVUTSRQPONMLKJIHGFEDCBA"); Here is the corresponding machine code on a Linux/x86 machine: 0000000000400530 : 400530: 48 83 ec 18 sub $0x18,%rsp 400534: 48 89 fe mov %rdi, %rsi 400537: 48 89 e7 mov %rsp,%rdi 40053a: e8 d1 fe ff ff 40053f: 48 83 c4 18 add callq 400410 $0x18,%rsp 400543: c3 retq 0000000000400544 : 400544: 48 83 ec 08 sub $0x8,%rsp 400548: bf 00 06 40 00 mov $0x400600,%edi 40054d: e8 de ff ff ff callq 400530 400552: 48 83 c4 08 add $0x8,%rsp 400556: c3 This problem tests your understanding of the program stack. Here are some notes to help you work the problem: • strcpy(char *dst, char *src) copies the string at address src (including the terminating '\0' character) to address dst. It does not check the size of the destination buffer. You will need to know the hex values of the following characters:
A ROP (Return-Oriented Programming) attack can be used to execute arbitrary instructions by chaining together small pieces of code called "gadgets." Your goal is to create a stack layout for a ROP attack that calls a function located at '0x4018bd3'. Below is the assembly code for the function 'getbuf', which allocates 8 bytes of stack space for a 'char' array. This array is then passed to the 'gets' function. Additionally, you are provided with five useful gadgets and their addresses. Use these gadgets to construct the stack layout. Assembly for getbuf 1 getbuf: 2 sub $8, %rsp 3 mov %rsp, %rdi 4 call gets 56 add $8, %rsp ret #Allocate 8 bytes for buffer #Load buffer address into %rdi #Call gets with buffer #Restore the stack pointer #Return to caller. Stack Layout (fill in Gadgets each 8-byte section) Address Gadget Address Value (8 bytes) 0x4006a7 pop %rdi; ret 0x7fffffffdfc0 Ox4006a9 pop %rsi; ret 0x7fffffffdfb8 0x4006ab pop %rax; ret 0x7fffffffdfb0 0x7fffffffdfa8 Ox4006ad mov %rax,…
In each of the following C code snippets, there are issues that can prevent the compilerfrom applying certain optimizations. For each snippet:• Circle the line number that contains compiler optimization blocker.• Select the best modification to improve optimization.1. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Remove printf or move it outside the loop.• Remove the loop.• Replace arr[i] with a constant value.1 int sum( int ∗ ar r , int n) {2 int s = 0 ;3 for ( int i = 0 ; i < n ; i++) {4 s += a r r [ i ] ;5 p r i n t f ( ”%d\n” , s ) ;6 }7 return s ;8 }2. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Move or eliminate do extra work() if it’s not necessary inside the loop.• Remove the loop (but what about scaling?).• Replace arr[i] *= factor; with arr[i] = 0; (why would that help?).1 void s c a l e ( int ∗ ar r , int n , int f a c t o r ) {2 for ( int i = 0 ; i < n ; i++) {3 a r r [ i ] ∗= f a c t o r…

Chapter 2 Solutions

Modern Database Management

Ch. 2 - List the four types of cardinality constraints,...Ch. 2 - Give an example, Other than those described in...Ch. 2 - What is the degree of a relationship? List the...Ch. 2 - Give an example (Other than those described in...Ch. 2 - Give an example of each of the following, other...Ch. 2 - Give an example of the use of effective (or...Ch. 2 - State a rule that says when to extract an...Ch. 2 - Prob. 2.18RQCh. 2 - In addition to explaining what action is being...Ch. 2 - For the Manages relationship in Figure 2-12a,...Ch. 2 - Explain the distinction between entity type and...Ch. 2 - Why is it recommended that every ternary...Ch. 2 - A cellular operator needs a database to keep track...Ch. 2 - Prob. 2.24PAECh. 2 - Answer the following questions concerning Figure...Ch. 2 - Prob. 2.26PAECh. 2 - You may have been assigned a CASE or a drawing...Ch. 2 - Consider the two E-R diagrams in Figure 2-25 Q,...Ch. 2 - Prob. 2.29PAECh. 2 - Are associative entities also weak entities? Why...Ch. 2 - Because Visio does not explicitly show associative...Ch. 2 - Figure 2-26 shows a grade report that is mailed to...Ch. 2 - Prob. 2.33PAECh. 2 - The Is Married To relationship in Figure 2-12a...Ch. 2 - Figure 2-27 represents a situation of students who...Ch. 2 - Figure 2-28 shows two diagrams (A and B), both of...Ch. 2 - Prob. 2.37PAECh. 2 - Review Figure 2-8LQ and Figure 2-22. Identify any...Ch. 2 - Prob. 2.39PAECh. 2 - Prob. 2.40PAECh. 2 - Prob. 2.41PAECh. 2 - Prob. 2.42PAECh. 2 - Prob. 2.43PAECh. 2 - Prob. 2.44PAECh. 2 - Prob. 2.45PAECh. 2 - Prob. 2.46PAECh. 2 - Prob. 2.47PAECh. 2 - Prob. 2.48PAECh. 2 - Draw an ERD for the following situation. (State...Ch. 2 - Prob. 2.50PAECh. 2 - Prob. 2.51PAECh. 2 - Review your answer to Problem and Exercise 2-49 if...
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr