1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
6

6. An art museum owns a large volume of works of art. Each work of art is described by an item code (identifier), title, type, a

nd size; size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist for some works is unknown. An artist is described by an artist ID (identifier), name, date of birth, and date of death (which is null for still living artists). Only data about artists for works currently owned by the museum are kept in the database. At any point in time, a work of art is either on display at the museum, held in storage, away from the museum as part of a traveling show, or on loan to another gallery. If on display at the museum, a work of art is also described by its location within the museum. A traveling show is described by a show ID (identifier), the city in which the show is currently appearing, and the start and end dates of the show. Many of the museum works may be part of a given show, and only active shows with at least one museum work of art need be represented in the database. Finally, another gallery is described by a gallery ID (identifier), name, and city. The museum wants to retain a complete history of loaning a work of art to other galleries, and each time a work is loaned, the museum wants to know the date the work was loaned and the date it was returned.As you develop the ERD for this problem, follow good data naming guidelines.

Computers and Technology
1 answer:
baherus [9]3 years ago
8 0

Answer:

Answer:

Finding entities in the given question:

1. Art

2. Artist

3. Museum

4. Location

5.Travelling

6.Gallery

Finding attributes of above entities:

1. Art (item ID, title, type, size). Here size further composed of height, width, and weight.

2. Artist (artist ID, name, date of birth, date of death, nationality)

3.Travelling (show ID, start date, end date)

4. Gallery (gallery ID, name, city)

Finding relationship between the entities:

1. Developed

2.Display

3. Part

4. Loan

Explanation:

In the below attached diagram, the primary keys are listed as, “Item ID”, “Artist ID”, “Show ID”, and “Gallery ID”.

You might be interested in
: Show that the propositions (p ∨ q) ∧ (¬p ∨ r) and (p ∧ r) ⊕ (¬p ∧ q) are logically equivalent.
Ipatiy [6.2K]

Answer:

(p\vee q)\wedge(\neg p\vee r)\equiv(p\wedge r)\vee(\neg p\wedge q)

Explanation:

The statements are logically equivalent if they have the same truth tables. So let´s use truth tables in order to determine if they are logically equivalent or not:

The picture that I attached you shows the truth table for each case. As you can see in the highlight columns:

(p\vee q)\wedge(\neg p\vee r)\equiv(p\wedge r)\vee(\neg p\wedge q)

They are  logically equivalent because they have exactly the same truth values between each other. Hence, we can conclude that they are logically equivalent.

3 0
3 years ago
Which of the following statements is true of a time management plan? It is work in progress that need to be altered many times?
marusya05 [52]
Cake cake cake cake
3 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
"the most common way to access the internet is through ________."
liubo4ka [24]
The most common was is your phone
6 0
3 years ago
Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25
AfilCa [17]
0 1 10 11
Explanaition:
4 0
3 years ago
Other questions:
  • which of the following electromagnetic waves are not used for communication? a.gamma rays b.microwaves c.infrared waves d.radio
    5·1 answer
  • How is a cell named?
    12·1 answer
  • How to upgrade from office home to office professional
    13·1 answer
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    10·1 answer
  • Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
    11·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • In science class, Patricia is giving a presentation on the different types of flowers in her community. As part of her presentat
    5·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • Examples of pop in computer​
    14·1 answer
  • even if we reach that state where an AI can behave as human does,how do we measure if AI is acting like a human?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!