1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
12

A personal music database stores details of a personal music library, and can be used to manage your MP3, CD, or vinyl collectio

n. Because this database is for a personal collection, it’s relatively simple and stores only the relationships between artists, albums, and tracks.
Key requirements for the database:

The collection consists of albums.

An album is made by one or more artists.

An artist makes one or more albums.

An album contains one or more tracks

Artists, albums, and tracks each have a name.

Each track is on exactly one album.

Each track has a time length, measured in seconds.

When a track is played, the date and time the playback began (to the nearest second) should be recorded; this is used for reporting when a track was last played, as well as the number of times music by an artist, from an album, or a track has been played.

There’s no requirement to capture composers, group members or sidemen, recording date or location, the source media, or any other details of artists, albums, or tracks.

1.a) For the above problem, draw an entity relationship diagram with appropriate cardinalities (including lower and upper bounds) associated with the relationships. (20 points)

1.b) Based on the entity relationship diagram, create a relational model (in 3rd normal form). Identify any needed primary and foreign keys and draw the relationship lines between the specific attributes in each entity that are associated with the relationship.

Computers and Technology
1 answer:
Rudiy273 years ago
7 0

Answer:

Check the explanation

Explanation:

Step 1: identify the entitles

From the statement given, the given entitles are artists, albums, tracks and played.

Step 2: identify the relationships

  1. One artist can make many albums
  2. One album can contain many tracks
  3. One track can be played many times.

Conversely, each play is associated with one track, a track is on one album, and an album is by one artist.

Step 3: identify the key attributes

The only strong entity in the database would be the “artist”, which has an attribute of artist ID so as to uniquely identifies it

Each album entity is uniquely identified by its album combined with the artist ID of the corresponding artist entity.

A track entity is similarly uniquely identified by its track ID combined with the related album ID and artist ID attributes.

The played entity is uniquely identified by a combination of its played time, and the related track ID attributes.

Step 4: identify other relevant attributes:

The attributes are straight forward; artist, albums, and track have names as well as identifiers to uniquely identify each entity. The track entity has a time attribute to solve the duration and the played entity has a timestamp to store when the track was played.

Step 5: Draw a complete ER diagram

The diagram explaining this question can be seen in the attached image below:

You might be interested in
What is one way to improve the upward flow of information?
kobusy [5.1K]

Answer:

b.Encourage managers to have regular meetings with staff.

Explanation:

Upward flow of information is when the information is flown from the lower level of hierarchy to upper level of hierarchy in an organization. for example:- the flow of information from employees to the managers.

The upward flow of information can be improved by encouraging the managers to have meeting with the staff at regular interval of time.

4 0
3 years ago
What determines the keystroke to open a cmos editor? how can you find this information?
Brums [2.3K]
<span>Determining the keystrokes of opening the cmos editor depends on the ram contained in the parameters in BIOS.It can be a very daunting task however made more accessible by instructions detailed in various ways by others.Research is needed.</span>
3 0
3 years ago
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
in a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n)-------------------- respon
nataly862011 [7]

Answer:

Conditioned response

Explanation:

In a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n) conditioned response.

The dog has been conditioned to respond to the constant sound before his meal is served by drooling(salivating ) with the expectation of eating almost immediately after the sound had been made .

4 0
2 years ago
The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
artcher [175]

The publisher tab in the application control allows you to manage the various certificates that are used to sign to binaries. Publisher allow executables of a particular vendor, signed by a security certificate issued to the vendor by a Certificate Authority. Also, all applications and binary files either added to or modified on an endpoint that are signed by the certificate are automatically added to the whitelist.

3 0
2 years ago
Other questions:
  • Hudson has to maintain confidential college data in a workbook. He needs two team members to help him update data in the specifi
    7·2 answers
  • The IP address 129.53.82.20 falls under what class of IP addresses??
    5·2 answers
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • Select the statement that best describes the function of the cell wall. O it gives shape to plants cells. O it produces food fro
    14·1 answer
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • True or False? PPOs differ from HMOs because they do not accept capitation risk and enrollees who are willing to pay higher cost
    10·1 answer
  • Similarities between inline css and internal css​
    6·1 answer
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    10·2 answers
  • What type of software is an antivirus?
    5·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!