Question
SysCo Security Inc. is interested in automating their client management system. You have been hired to help them design data model. Listed below are the
SysCo Security Inc. is interested in automating their client management system. You have been hired to help them design data model. Listed below are the definitions of entities and business rules explaining the functionalities of the new client management system. Develop an EER model based on the information provided below:
1. Security Consultant hired by the firm can be a business consultant or a technical consultant, but not both.
2. Business consultants are contacted by a business to first determine security needs and provide an estimate of actual services to be performed.
3. Technical consultants implement these services based on the specifications developed by the business consultants.
4. Business consultant is identified by their Emp_id (identifier). Additional attributes include Name, Address (composed of Street, City, State, Zipcode), ContactNo, DOB, Age, Business Experience (composed of Number of Years, Type of Business, and Degree(s)).
5. Technical consultant is identified by their Emp_id (identifier). Additional attributes include Name, Address (composed of Street, City, State, Zipcode), ContactNo, DOB, Age, Technical Skills, and Degree(s).
6. Customer is identified based on Customer_id (identifier). Other attributes are Company name, Address (composed of Street, City, State, Zipcode), Telephone, Contact Title, Telephone Num, Business Type, and No_of_Emp.
7. A Customer can have many Consultants providing many services. Both Technical and Consulting services offered must be recorded by the database (Hint should have 2 relationships between customer, service, and consultant, one to show services performed, and the other to show services offered as part of the estimate).
8. Customers can have multiples Locations. Attributes of location are Customer_id (identifier), Location_id (unique only for each customer), Address (composed of Street, City, State, Zipcode), Telephone, and Building size.
9. A security Service is performed for a customer at one or more locations. Both services are performed, and an estimate is provided. Attributes of Service include Service_id (identifier), Service_Desc, Cost, Coverage, and Clearance Required.
10. Following are the entities, but they also reflect relationship between more than one entity:a. Services Performed, which have characteristics of Date, Amount, Technical Consultant, Services, and Customer.b. Estimates, which have characteristics of Date, Amount, Business Consultant, and Services.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started