1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
12

A personal music database stores details of a personal music library, and can be used to manage your MP3, CD, or vinyl collectio

n. Because this database is for a personal collection, it’s relatively simple and stores only the relationships between artists, albums, and tracks.
Key requirements for the database:

The collection consists of albums.

An album is made by one or more artists.

An artist makes one or more albums.

An album contains one or more tracks

Artists, albums, and tracks each have a name.

Each track is on exactly one album.

Each track has a time length, measured in seconds.

When a track is played, the date and time the playback began (to the nearest second) should be recorded; this is used for reporting when a track was last played, as well as the number of times music by an artist, from an album, or a track has been played.

There’s no requirement to capture composers, group members or sidemen, recording date or location, the source media, or any other details of artists, albums, or tracks.

1.a) For the above problem, draw an entity relationship diagram with appropriate cardinalities (including lower and upper bounds) associated with the relationships. (20 points)

1.b) Based on the entity relationship diagram, create a relational model (in 3rd normal form). Identify any needed primary and foreign keys and draw the relationship lines between the specific attributes in each entity that are associated with the relationship.

Computers and Technology
1 answer:
Rudiy273 years ago
7 0

Answer:

Check the explanation

Explanation:

Step 1: identify the entitles

From the statement given, the given entitles are artists, albums, tracks and played.

Step 2: identify the relationships

  1. One artist can make many albums
  2. One album can contain many tracks
  3. One track can be played many times.

Conversely, each play is associated with one track, a track is on one album, and an album is by one artist.

Step 3: identify the key attributes

The only strong entity in the database would be the “artist”, which has an attribute of artist ID so as to uniquely identifies it

Each album entity is uniquely identified by its album combined with the artist ID of the corresponding artist entity.

A track entity is similarly uniquely identified by its track ID combined with the related album ID and artist ID attributes.

The played entity is uniquely identified by a combination of its played time, and the related track ID attributes.

Step 4: identify other relevant attributes:

The attributes are straight forward; artist, albums, and track have names as well as identifiers to uniquely identify each entity. The track entity has a time attribute to solve the duration and the played entity has a timestamp to store when the track was played.

Step 5: Draw a complete ER diagram

The diagram explaining this question can be seen in the attached image below:

You might be interested in
Which of the following statements are true?
Mamont248 [21]

Answer:

The answer is: c. Adding external CSS is a good practice for various reasons, including code organization.

Explanation:

External CSS improves maintainability in code.  

Internal CSS has precedence over external CSS, it means that internal will overwrite external CSS, but abuse of internal CSS  often makes hard to maintain HTML code on a large website.

Furthermore, it is much easier to modify one CSS(external) file that can impact multiple web pages than go into every HTML page and modify your styles per page. Many sites have hundred or more pages, go through each one wouldn't be productive.

3 0
3 years ago
Which statements about organizing messages in Outlook 2016 are true? Check all that apply. The Categories function is used for g
xenn [34]

Answer:

A. B. C. F. G.

Explanation:

5 0
3 years ago
Read 2 more answers
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
Anna007 [38]

Answer:

Internet is the correct answer for the above question.

Explanation:

  • The Internet Explorer define some security zone (which includes the Restricted sites, internet, Trusted sites, and Local intranet) which is used to block the unwanted sites which can be opened by some other websites.
  • When any user use any website, sometimes that websites open different websites. This security zone gives the features to secure the user from this event.
  • There are four-zone which are described in the first line, in which the internet zone is used to take all the websites which are not defined for the other security zone. It means that when any user does not decide the security zone for any websites then by default it comes in the internet zone.
  • This is also asked by the question, Hence "internet" is the correct answer.
4 0
3 years ago
What are the guided and unguided transmission media and what are the differences?
Ludmilka [50]

Answer:  They are forms of of carrying data from communication devices. The difference is the medium where the signal travels.

Explanation:

Hi, the difference between guided and unguided media is that in the guided media, the signal travels through a physical medium whereas, in unguided media, the signal travels through the air.  

Guided and unguided media are types of transmission media.

The transmission media carries electromagnetic signals, that transmit data between communicating devices like computers.

4 0
3 years ago
SHORT ANSWERS:
dem82 [27]

Answer:

Hard drive Microsoft have the highest priority actions

7 0
3 years ago
Other questions:
  • Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
    9·1 answer
  • An important advantage of using GUI data-entry objects is that you often can control what users enter by limiting their options?
    6·1 answer
  • Write a program that will open the file random.txt and calculate and display the following: A. The number of numbers in the file
    12·1 answer
  • Desmond must enter a long string of numbers (1 4 9 2 1 6 2 0 1 7 7 6) into an old computer every two hours or the computer will
    12·1 answer
  • I need urgent help. which of these network has minimum data loss. a. LAN b. MAN c. WAN ​
    11·1 answer
  • Data-as-a-service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    7·1 answer
  • According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.
    13·2 answers
  • Example of negative body language include all but
    8·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • CAN SOMEONE PLEASE DO THESE FOR ME I WILL GIVE BRAINLIESR AND 20 POINTS PLEASE ITS ONLY 5 QUESTIONS PLEASEEEE
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!