Map your high-level data model to a set of relational tables that represent the entity and relationship types. Identify primary, alternate, and foreign keys.

What will be an ideal response?


Outlet (outletNo, address, telNo, faxNo, mgrStaffNo)
Primary Key outletNo
Foreign Key mgrStaffNo references Staff(staffNo)

Staff (staffNo, fName, lName, address, telNo, DOB, sex, NIN, dateJoined, jobTitle,
salary, outletNo)
Primary Key staffNo
Alternate Key NIN
Foreign Key outletNo references Outlet(outletNo)

Vehicle (regNo, model, make, engineSize, capacity currentMileage, motDate, dRate,
outletNo)
Primary Key regNo
Foreign Key outletNo references Outlet(outletNo)

FaultReport (staffNo, regNo, dateChecked, faults)
Primary Key regNo, dateChecked
Foreign Key staffNo references Staff(staffNo)
Foreign Key regNo references Vehicle(regNo)

Note: Assumption is that a vehicle is checked for faults, only once on a given date.

PersonalClient (pclientNo, fName, lName, address, telNo, DOB, licenceNo)
Primary Key pclientNo
Alternate Key licenceNo

BusinessClient (bclientNo, bName, bType, address, telNo, faxNo)
Primary Key bclientNo

HireAgreement (hireNo, clientNo, regNo, dateStart, dateFinish, mileageBefore,
mileageAfter)
Primary Key hireNo
Foreign Key clientNo references PersonalClient(pclientNo) and
BusinessClient(bclientNo)
Foreign Key regNo references Vehicle(regNo)

Computer Science & Information Technology

You might also like to view...

Where can you find Microsoft Office for iPad?

A) The Microsoft Apps Store B) The Apple Store C) The Google website D) The Amazon website E) A and B

Computer Science & Information Technology

________ functions are predefined formulas that describe a collection of data

A) Financial B) Logical C) Statistical D) Information

Computer Science & Information Technology

Critical Thinking Questions Case 3-2 ? Your school is in a safe neighborhood, but there have been a few thefts at ATMs. You work part-time in your school's campus security office and have been asked to prepare tips for students about ATM safety. Thieves can capture a credit card number by placing a(n) ______ on an ATM.

A. swiper B. scanner C. sweeper D. skimmer

Computer Science & Information Technology

In this text, Boyce-Codd normal form is the same as ____.

A. unnormalized B. first normal form C. second normal form D. third normal form

Computer Science & Information Technology