1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
11

You are modeling a small part of an online flight reservation system, according to the following description. A flight is a sing

le non-stop hop between a pair of cities. A booking can include several flights and travelers (think of a family vacation hitting multiple cities), with the requirement that all the travelers are on all the flights in a booking. Furthermore, every booking has a single owner who is one of the travelers on that booking (think one family member booking the tickets for the entire family), and the owner can manage functionality on the system that other travelers cannot. A separate ticket is issued and priced individually for each traveler on a booking, and the ticket applies to all flights within that booking. Draw the most appropriate UML diagram for your model. Identify entities (classes/abstract classes/interfaces) clearly, and separate them according to their functionality--the separation should be faithful to the description above. Set up relationships between entities as precisely as possible. Inside each class in the diagram, only list the class name and minimal number of attributes required to characterize objects of that class (no operations needed). For the attributes, you are not required to show access level. For any ONE association, code the classes involved, detailing the fields ONLY.

Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
4 0

Answer:

Explanation:

The database schema can have following tables:

1. airport_table(apcode, apcity, apcountry)

2. airline_table(aid, aname, acountry)

3. flight_table(fid, aid, arrtime, depttime)

4. passenger_table(pid, pname, pcity, pcountry)

5 booking_table(bid, bdate, pid)

See attachment for the diagram

You might be interested in
Encryption relies on the use of _________to ensure that information is readable only by the intended recipient.
stich3 [128]

Answer:

Encryption Keys

Explanation:

In order to make sure only the intended recipient receives the information, encryption keys rely on a unique pattern, just like your house key, except instead of grooves and ridges encryption keys use numbers and letters.

4 0
3 years ago
Calculator and clocks are examples of -------------- in windows 7
Luden [163]
Utilities (not sure)
7 0
2 years ago
A circular copper disk of diameter D=10 cm rotates at frequency =1800 rev/min about an axis through its center and at right angl
MAXImum [283]

Answer:

Induced current is 0.226 A

Explanation:

To calculate potential difference we have

E =1/2Bomega*r2 =1/2*1*1800*3.14*0.05=141.3

putting values we get

the p.d is 141.3

7 0
3 years ago
Assume that source elements of length k are mapped in some uniform fashion into a target elements of length p. If each digit can
lukranit [14]

Answer And explanation

a)

r^k has 1/r^k probability guess the correct source

b)

Each element in r^p  is mapped by r^k / r^p . There are r^k^-^p  So there are  r^k^-^p -1 elements.

number of target elements = r^k^-^p

number of source elements = r^k^-^p -1

probability = r^k^-^p -1 /r^k

c) Probability of the correct target element

1/r^p

6 0
2 years ago
Select the correct answer Steven has been assigned a task to lead a team to analyze volumes of financial data Steven observes th
Alborosie

Answer:

The correct answer is B. Take periodic breaks and alternate between tasks.

Explanation:

This question is incomplete, the complete questions is this:

Select the correct answer Steven has been assigned a task to lead a team to analyze volumes of financial data Steven observes that his team members work for long hours he wants to help his team members to follow useful work habits increase work efficiently and avoid health issues what should Stephen advised his team to do.

A. Avoid taking breaks during work and work continuously.  

B. Take periodic breaks and alternate between tasks.  

C. Avoid sitting upright on chairs when experiencing physical fatigue.

D. Use cushions and small pillows below the computers to adjust their heights.  

E. Close curtains, blinds, and overhead lights to reduce eye fatigue.

In this case we need to take periodic breaks, in this way we will have more energy to keep working.

If we avoid breaks, we're going to be stressed out.

Always must sit upright on chairs to avoid physical fatigue.

Use cushions and small pillows are not necessary just sit upright on chairs.

We need to have a good natural illumination to reduce eye fatigue.

8 0
2 years ago
Other questions:
  • What are personal skills? A manner of individual style How a person manages and expresses oneself One's ability to excel at spor
    13·2 answers
  • 1024 Megabytes = ____________
    14·1 answer
  • .In Python, comments begin with the comment marker and continue ______.
    14·1 answer
  • Program ____ use graphical symbols and relational operators (such as < for "less than" and = for "equal to") to portray the s
    8·1 answer
  • Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
    13·1 answer
  • How do I find a back door password on my computer?
    12·1 answer
  • Some one help pls will mark brainless !!!!!
    13·1 answer
  • Which of the following would be least effective?
    10·1 answer
  • What should you do when you are working on an unclassified system and receive an email.
    10·1 answer
  • what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!