subject

You have been hired as a database designer to develop a database for an Auto Repair business. You are given the following requirements: 1. The database should contain several shops each one having a unique ID, a name, an address, and a phone number.
2. The database should contain several mechanics each one having a unique ID, a first name, a last name, an address, an email, a phone number, a birth date, and a specialty.
3. The database should contain several customers each one having a unique ID, a first name, a last name, an address, an email, and a phone number.
4. The database should include several cars each one having a unique VIN, a make, a model, a color, and a manufactured year.
5. A mechanic can work in at least two shops and at most 10 shops and a shop has only one mechanic.
6. Each customer can bring at most 2 cars.
7. A mechanic does one or more services which have a unique ID, a description, parts, a date, a time, and a cost.
8. Services performed by a mechanic will repair the car and a car can be repaired by one or more services.

Required:
a. Construct an E-R diagram to capture as many requirements as possible. Model all the constraints which can be expressed in the E-R model.
b. State any constraints which can NOT be captured by the E-R model.
c. Translate your E-R diagram into relational tables. For each relation, identify the primary key, any foreign keys, and the necessary constraints

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 21:00
So im doing this school challenge and the teachers said whats the average text a student gets a day so i need to get about 20 in a day but dont know how can you guys 2163371293
Answers: 2
question
Computers and Technology, 23.06.2019 02:30
Research data that is presented using descriptive language is said to be
Answers: 2
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
question
Computers and Technology, 24.06.2019 10:00
Each time you save a document, you will need to type in the file type in which it should be saved you can select the save button to save it with the same file name if it has been previously saved you will need to select the location to save the file you will need to use the save as dialog box
Answers: 1
You know the right answer?
You have been hired as a database designer to develop a database for an Auto Repair business. You ar...
Questions
question
Law, 16.04.2021 18:00
question
English, 16.04.2021 18:00
Questions on the website: 13722361