EBK USING MIS
EBK USING MIS
10th Edition
ISBN: 9780134658919
Author: KROENKE
Publisher: YUZU
bartleby

Concept explainers

bartleby

Videos

Textbook Question
Book Icon
Chapter 5, Problem 5.1UYK

Draw an entity-relationship diagram that shows the relationships among a database, database applications, and users.

Expert Solution & Answer
Check Mark
Program Plan Intro

E-R model:

  • It is a tool for creating data model.
  • It is used for developers to describe the content of data model by using two functions called entities and relationships.

Entity:

  • It helps the user for tracking something in database.
  • Example entities in student database system are Student, Grade, Course, etc.

Relationships:

  • Entities have relationships among each other.
  • For example, in student database, a Student has a relationship to Major and Student has a relationship to Advisor.

Attribute:

  • It used to describe the entity characteristics.
  • Example attributes of student entity is Student_id, Student_name, Student_address, etc.

Identifier:

  • It is an attribute or group of attribute, but its value is related with one and only one entity instance.

Example of E-R diagram:

EBK USING MIS, Chapter 5, Problem 5.1UYK , additional homework tip  1

Explanation of Solution

Entity Relationship diagram that displays relationship among the database, database application and users:

The below is the E-R diagram that shows the relationship that is laid among the database, database application and users:

EBK USING MIS, Chapter 5, Problem 5.1UYK , additional homework tip  2

User:

The person or end user that can process the application that is stored in the database.

Database application:

A database application is a collection of four elements namely forms, reports, queries and application which acts as an intermediate between the user and data of the database

Database:

Database is a collection of information that is used to store and retrieve the data. Data is organized in tables.

Explanation of the E-R diagram:

  • Many user can use the database application.
    • Example of the user entity could be “students”, “faculty”.
  • Many database applications can be present in a single database.
    • Example of the database application could be “Bookstore”,”Library”.
  • Only one database can contain many database application.
    • Example of the database could be “studentDB”,”BookStoreDB”.
  • The relationship between the user and the database application is “M:N (Many to many )relationship.
  • The relationship between the database application and theDatbase is “N:1”(Many to One) relationship.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
I would like to get help to resolve the following case
Last Chance Securities The IT director opened the department staff meeting today by saying, "I've got some good news and some bad news. The good news is that management approved the payroll system project this morning. The new system will reduce clerical time and errors, improve morale in the payroll department, and avoid possible fines and penalties for noncompliance. The bad news is that the system must be installed by January 1st in order to meet new federal reporting rules, all expenses from now on must be approved in advance, the system should have a modular design if possible, and the vice president of finance would like to announce the new system in a year-end report if it is ready by mid-December." Tasks 1. Why is it important to define the project scope? How would you define the scope of the payroll project in this case? 2. Review each constraint and identify its characteristics: present versus future, internal versus exter- nal, and mandatory versus desirable. 3. What…
2. Signed Integers Unsigned binary numbers work for natural numbers, but many calculations use negative numbers as well. To deal with this, a number of different methods have been used to represent signed numbers, but we will focus on two's complement, as it is the standard solution for representing signed integers. 2.1 Two's complement • Most significant bit has a negative value, all others are positive. So, the value of an n-digit -2 two's complement number can be written as: Σ2 2¹ di 2n-1 dn • Otherwise exactly the same as unsigned integers. i=0 - • A neat trick for flipping the sign of a two's complement number: flip all the bits (0 becomes 1, or 1 becomes 0) and then add 1 to the least significant bit. • Addition is exactly the same as with an unsigned number. 2.2 Exercises For questions 1-3, answer each one for the case of a two's complement number and an unsigned number, indicating if it cannot be answered with a specific representation. 1. (15 pts) What is the largest integer…
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Enhanced Entity Relationship Model; Author: Data Science Center;https://www.youtube.com/watch?v=ocQUtXPumdQ;License: Standard YouTube License, CC-BY