MODERN DATABASE MGMT.(PEARSON CHANNEL)
13th Edition
ISBN: 9780136709299
Author: Hoffer
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 2.50PAE
Program Plan Intro
(a)
Draw an ERD for online marketplace which sells wallpaper, draperies and home decorating accessories based on provided information.
Program Plan Intro
(b)
User above ERD to name entities, attributes and relationships which will be needed to provide answer to following queries.
- Find other customers who had bought the same product a given customer or prospective customer had bought or was considering buying.
- Find other products other customers bought who also bought the product the customer just bought.
- Find other customers with at least three interests that overlaps with those of a given customer so that he can suggest to these customers other products they might want to purchase.
Program Plan Intro
(c)
Make changes in the ERD drawn above with respect to the given information.
Program Plan Intro
(d)
Make changes in the ERD drawn above with respect to the given information.
Program Plan Intro
(e)
User above ERD to name entities, attributes and relationships which will be needed to provide answer to following queries.
- Find products bought by customers in a same geographical area.
- Search products based on categories and characteristics of product.
- Find the products as per ratings, popularity and price.
In case the above ERD is not able to handle above queries make modifications in it to handle these queries.
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
I need help:
Challenge: Assume that the assigned network addresses are correct. Can you deduce (guess) what the network subnet masks are? Explain while providing subnet mask bits for each subnet mask.
[Hint: Look at the addresses in binary and consider the host ids]
I would like to know if my answer statment is correct?
My answer:
The main difference is how routes are created and maintained across different networks. Static routing establishes router connections to different networks from the far left and far right. The Dynamic routing focus emphasizes immediate connection within the router while ignoring the other connections from different networks. Furthermore, the static routing uses the subnet mask to define networks such as 25.0.0.0/8, 129.60.0.0/16, and 200.100.10.0/30, which correspond to 255.0.0.0, 255.255.0.0, and 255.255.255.252. On the other hand, dynamic routing uses the wildcard mask to inverse the subnet mask, where network bits become 0 and host bits become 1, giving us 0.0.0.255, 0.0.255.255, and 0.0.0.3. Most importantly, the CLI commands used for Static and Dynamic routing are also different. For static routing, the “IP route” corresponds with the network, subnet mask, and next-hop IP address. In contrast, dynamic routing uses…
1. [30 pts] Match the items on the left with the memory segment in which they are stored. Answers
may be used more than once, and more than one answer may be required.
1. Static variables
2. Local variables
3. Global variables
4. Constants
5. Machine Instructions
6. malloc()
7. String Literals
Answer
A. Code
B. Static
C. Heap
D. Stack
Chapter 2 Solutions
MODERN DATABASE MGMT.(PEARSON CHANNEL)
Ch. 2 - Define each of the following terms: entity type...Ch. 2 - Match the following terms and definitions....Ch. 2 - Contrast the following terms: stored attribute;...Ch. 2 - Prob. 2.4RQCh. 2 - Prob. 2.5RQCh. 2 - Prob. 2.6RQCh. 2 - State six general guidelines for naming data...Ch. 2 - Prob. 2.8RQCh. 2 - Prob. 2.9RQCh. 2 - State three conditions that suggest the designer...
Ch. 2 - List the four types of cardinality constraints,...Ch. 2 - Give an example, Other than those described in...Ch. 2 - What is the degree of a relationship? List the...Ch. 2 - Give an example (Other than those described in...Ch. 2 - Give an example of each of the following, other...Ch. 2 - Give an example of the use of effective (or...Ch. 2 - State a rule that says when to extract an...Ch. 2 - Prob. 2.18RQCh. 2 - In addition to explaining what action is being...Ch. 2 - For the Manages relationship in Figure 2-12a,...Ch. 2 - Explain the distinction between entity type and...Ch. 2 - Why is it recommended that every ternary...Ch. 2 - A cellular operator needs a database to keep track...Ch. 2 - Prob. 2.24PAECh. 2 - Answer the following questions concerning Figure...Ch. 2 - Prob. 2.26PAECh. 2 - You may have been assigned a CASE or a drawing...Ch. 2 - Consider the two E-R diagrams in Figure 2-25 Q,...Ch. 2 - Prob. 2.29PAECh. 2 - Are associative entities also weak entities? Why...Ch. 2 - Because Visio does not explicitly show associative...Ch. 2 - Figure 2-26 shows a grade report that is mailed to...Ch. 2 - Prob. 2.33PAECh. 2 - The Is Married To relationship in Figure 2-12a...Ch. 2 - Figure 2-27 represents a situation of students who...Ch. 2 - Figure 2-28 shows two diagrams (A and B), both of...Ch. 2 - Prob. 2.37PAECh. 2 - Review Figure 2-8LQ and Figure 2-22. Identify any...Ch. 2 - Prob. 2.39PAECh. 2 - Prob. 2.40PAECh. 2 - Prob. 2.41PAECh. 2 - Prob. 2.42PAECh. 2 - Prob. 2.43PAECh. 2 - Prob. 2.44PAECh. 2 - Prob. 2.45PAECh. 2 - Prob. 2.46PAECh. 2 - Prob. 2.47PAECh. 2 - Prob. 2.48PAECh. 2 - Draw an ERD for the following situation. (State...Ch. 2 - Prob. 2.50PAECh. 2 - Prob. 2.51PAECh. 2 - Review your answer to Problem and Exercise 2-49 if...
Knowledge Booster
Similar questions
- Build an Android App that shows a list of your favorite books' details. The App should have a set of java files that implement an adapter with RecyclerView. The details of the java files you need to create are described below. RecycleViewExample RHONDA BYRNE 2016 Listen to Your Heart: The London Adventure Ruskin Bond 2010 Business of Sports: The Winning Formula for Success Vinit Karnik 2022 A Place Called Home Preeti Shenoy 2018 Vahana Masterclass Alfredo Covelli 2016 The Little Book of Encouragement Dalai Lama 2021 Platform Scale: For A Post-Pandemic World Sangeet Paul Choudary 2021 Unfinished Priyanka Chopra Jonas 2018 1. The first java file should contain a data field which is in this case: Book_name, Author_name, Publication_year. 2. The second java file contains BookViewHolder. 3. The third java file contains the BookAdapter which is act as a bridge between the data items and the View inside of RecycleView. 4. The Mainactivity java file will contain some samples data to display.…arrow_forwardmodule : java Question3: (30 MARKS) Passenger Rail Agency for South Africa Train Scheduling System Problem Statement Design and implement a train scheduling system for Prasa railway network. The system should handle the following functionalities: 1. Scheduling trains: Allow the addition of train schedules, ensuring that no two trains use the same platform at the same time at any station. 2. Dynamic updates: Enable adding new train schedules and canceling existing ones. 3. Real-time simulation: Use multithreading to simulate the operation of trains (e.g., arriving, departing). 4. Data management: Use ArrayList to manage train schedules and platform assignments. Requirements 1. Add Train Schedule, Cancel Scheduled Train, View Train Schedules and Platform Management 2. Concurrency Handling with Multithreading i.e Use threads to simulate train operations, Each…arrow_forwardQuestion D.4: FIFO Page Replacement Consider the following page reference string: e, c, b, e, a, g, d, c, e, g, d, a Considering 4 frames, fill in the following table and then answer how many page faults would occur with the FIFO page replacement algorithm. RS: reference string; FO: frame 0, F1: frame 1, etc. Hint: all frames are initially empty, so your first unique pages will all cost one fault each. Time 1234567891011 12 RS e cb e agd ce g d a FO F1 F2 F3 Page fault? b) Total # page faults: c) Briefly (1-2 sentences) explain Belady's Anomaly that can occur in FIFO Page Replacement.arrow_forward
- Consider a system that uses a fixed-partition scheme, with equal partitions of size 2" bytes, and the main memory has 2¹8 bytes. A process table is maintained with a pointer to the resident partition for each resident process. How many bits are required for the pointer in the process table? Show all your steps.arrow_forwardUse the same semaphore notation shown above to describe how we can ensure the execution order of the following process execution graph: P6 P2 P7 P1 P3 P4 P5 Use all of the following semaphores in your answer: s1=0; s2=0; s3=0; s4=0; s5=0; s6=0;arrow_forwardConsider the set of process: Process ID Arrival Time Burst Time P1 0 5 P2 0 10 P3 + 15 P4 18 10 P5 22 20 a) Draw the GANTT chart for the Round Robin time quantum -5) scheduling algorithm. Use the same implementation you used for the programming assignmenti.e. the processes should always run in PID order. Assume there is no context-switch overhead. Show your work for partial credit. b) Write your answer to the following performance metrics given your above CANTT charts. Show your work for partial credit. Average Response time: Average Wating time: Average Turnaround time:arrow_forward
- Consider a file currently consisting of 10 blocks. Assume that the file control block and the new block information to be added are already in memory. Calculate how many disk I/O operations are required for the linked allocation strategy, if, for one block, the following conditions hold: HINTS: 1) ignore disk I/O associated with the file control block. 2) each read and each write is an explicit disk I/O. 3) assume a pointer to the end of the list for linked allocation a. The block is added at the beginning. b. The block is added in the middle. c. The block is added at the end. d. The block is removed from the beginning. e. The block is removed from the middle. f. The block is removed from the end.arrow_forwardSegment Base (original) Length Base (after compaction) 0 100 300 1 1400 600 2 450 100 3 3200 80 4 2200 500 5 3300 33 1. Given the original base addresses, what are the physical addresses for the following logical addresses? If it's an invalid address, just write "invalid". Note that (X, Y) => segment X, offset Y a) (0,350) b) (1,599) c) (2,50) d) (3,81) e) (4,300) f) (5.0) g) (5,34)arrow_forwardProcess Allocation A Max BCDABC D A Available B C PO 3 0 2 1 4 2 4 2 1 0 0 P1 0 1 0 1 0 2 2 2 P2 1 2 0 0 3 2 1 0 P3 0 1 1 2 1 1 1 2 P4 0 0 1 1 1 - 0 2 1 a) What is the content of the matrix Need? Process PO P1 P2 P3 P4 A Need BC D D ° b) Is the system in a safe state? If yes, give a safe sequence of processes. If not, explain why the system is not in a safe state. c) If a request from process P4 arrives for (1,0,0,0), can the request be granted immediately? Please state the reason.arrow_forward
- Consider N processes sharing the CPU in a round-robin fashion (N>=2). Assume that each context switch takes S ms and that each time quantum is Q ms. For simplicity, assume that processes never block on any event and simply switch between the CPU and the ready queue. Also, assume that a process is still in the ready queue while a context switch is happening. a) What happens if Q is much smaller than S? What happens when Q→→ ∞, i.e. is much larger than the maximum turnaround time of all the processes? Be brief (1-2 sentences max) in your answer. b) If you use RR for scheduling, which of the three performance metrics (waiting, response, turnaround time) is more likely to be improved? Why (1-2 sentences max)?arrow_forwardCompute the jackknife estimate of bias and standard error for the correlation statistics from the law82 data using r languagearrow_forwardQuestion D.1: Effective Access Time A computer keeps its page tables in memory. Memory access time is 100 nanoseconds (ns). Answer the following questions about the performance of this setup. Show your work. a) What is the effective access time (i.e. reading a word in memory) with no caching and a two-level page table? b) Consider the above scenario but with a TLB having a cache hit rate of 98%. If the TLB takes 20 ns to access, what is the effective access time of this setup when considering this TLB?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage


Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning