1. Draw an ER diagram that captures the preceding information. Identify any constraints not captured by the ER diagram. 2. How would your design change if each drug must be sold at a fixed price by all pharmacies? 3. How would your design change if the design requirements change as follows: If a doctor prescribes the same drug for the same patient more than once, several such prescriptions may have to be stored.
Q: Create an HTML that displays the menu items from the XML file. Fruit Bowl$10.90 Caeser…
A: XML: Extensible Markup Language is a markup language and file format for storing, transmitting, and…
Q: When it comes to cryptography, what is the difference between symmetric and asymmetric?
A: what is the difference between symmetric and asymmetric .
Q: Write a program that asks the user to enter integers as the width and length of a rectangle that…
A: To write a code to calculate the area and perimeter of the rectangle by using pointers. I used C…
Q: Define the characteristics that are required for test-driven development. In the event that you…
A: Introduction: TDD is a technique of the software development in which test cases are written to…
Q: What are the methods for exchanging information under a company's information security incident…
A:
Q: Which network topologies do you believe are conceivable, and which ones do you advocate as being the…
A: Introduction: A Mesh Topology network has the most fabulous links, making it the most practical…
Q: Attacks by a man-in-the-middle (MITM) are very difficult to avoid. Please provide a thorough answer.
A: Introduction: A man-in-the-middle attack occurs when an intruder (specifically, a hacker) enters…
Q: What is the theoretical maximum arrival rate for a link that has a packet size of l and a bandwidth…
A: Introduction: First, we suppose that packets arrive at a network connection through a Poisson…
Q: (20 points) Consider the following function: 100(1 – 0.01x²)² + 0.02.a² (1 – x²)² + 0.1x² y(x) =…
A: % Script Description:Subplots with different plot schemes% Name :% Date…
Q: We need cache memory, which is also transistor-based, since RAM (Random Access Memory) is a volatile…
A: here in this question we will be discussing about what is cache memory and what is the need of cache…
Q: What variables had a role in the development of computer security into the present state of…
A: Introduction: Computer security, often known as cybersecurity, refers to the safeguarding of…
Q: List all of the strong association rules. O bd->a ad->e, be->d O ef->k O bd->e O bd->e, be->d
A: We will solve this question in step no. 2
Q: Provide the missing code segment in the portion with the TO DO remark in the following sample code.…
A: To complete the function compare present in the Dictionary class.
Q: If the exponent is 18, its actual value in excess - 15 nototion is 3. Therefre, this number, -I X…
A: Find the answer with reason given as below :
Q: Which log in Event Viewer would you use to track down attempted computer logins, if you had to?
A: Introduction: Navigate to Windows Logs> Security in Active Directory's Event Viewer. All of the…
Q: Task 5 Create an Employee Class that will have Two instance variable: name and workingPeriod A class…
A: Step-1: Start Step-2: Create a class Employee class Employee: Step-2.1: Create two instance…
Q: 2. Encrypt the word SHIELD using an alphabetic Caesar shift cipher that starts with a shift of 8 (A…
A:
Q: Virtual memory isn't used in embedded systems as much as it should be.
A: The virtual memory is the technique where the secondary memory is used as if it were a part of the…
Q: ct PatientInfo string name; int age; string problem; program must have a StaticQueue class that…
A: Code is below:
Q: 1) Write VHDL code of the following circuitY=(a xor b) or (not (c and b) ).
A: The answer is as follows.
Q: Write a program to determine the cost of an automobile insurance premium, based on driver's age. and…
A: car price=int(input("enter the car price"): age=int(input("enter the age") premimum=car price%3 if…
Q: Subject - Data Science 1) what is Attention based neural networks, classification and methodologies…
A: Attention based neural networks In neural network attention is a procedure that copies mental…
Q: You are given a non-negative number in the form of list elements. For example, the number 123…
A: The solution to the given problem is below.
Q: Are embedded computers and general-purpose computers different in terms of what they do?
A: Introduction: An embedded computer, a critical component of most embedded systems, is a mix of…
Q: What is the decimal equivalent of the binary number 1100110110110100 written in excess-15 notation?
A: To find decimal equivalent of the binary number 1100110110110100 written in excess-15 notation.
Q: When it comes to structural testing, what are the several stages?
A: Introduction: Several steps of the structural test process: Software testing should always start…
Q: 1- Add a function (copyArray) to copy the elements of the array list into a new array newList with a…
A: 1 - Add a function (copyArray) to copy the elements of the array list into a new array newList with…
Q: IoT systems are becoming more complex. What are the preconditions for contemplating the usage of…
A: Introduction: However, all full IoT systems have a common characteristic in that they are comprised…
Q: Which search engines are legal and ethical in their operations?
A: Explanation: The majority of the Internet users are familiar with the benefits of search engines.…
Q: We feel that Flynn's taxonomy should be enlarged by one level. A higher-level computer has a more…
A: A higher-level computer has a more advanced set of features than a lower-level computer. One can…
Q: Describe how a current operating system is able to support a feature of a previously installed…
A: NOTE :- Below i explain the answer in my own words by which you understand it well.…
Q: In what ways do symmetric and asymmetric key cryptography vary from one another and how do they…
A: Introduction: Differences between symmetric and asymmetric key encryption will be discussed: There…
Q: Explain how a cloud storage program varies from traditional client storage software in terms of…
A: Introduction: I am a proponent of the ease and value that cloud technology provides, since I now use…
Q: Q1- Write a program to read a number (x) from input. Then print all its factors.
A: a=int(input("Enter a number: "))print("The factors of",a,"are:")for i in range(1, a + 1): if a %…
Q: Make use of as many examples as you can to support your point of view. The bottom-up or the top-down…
A: The answer is given in the below step
Q: What is the function of cryptology in the field of information security?
A: Cryptography is a sort of data security approach that utilization codes to protect corporate…
Q: What is technical documentation? And what is it's used?
A: answer is
Q: Determine the output embedded by correct syntax. where: a=2; and b=3; if (a == b) { puts…
A: IF-ELSE STATEMENT:- The if-else statement is used when we want to execute the block on a conditional…
Q: What has changed in business and management decision-making as a result of information technology?
A: Introduction: Data gathering may be sped up using technology, allowing firm executives to make…
Q: In programming languages, what is the difference between regular and context-free grammars, what is…
A: Introduction: Regexps can be used to describe the syntax of Tokens. Any syntactic structure defined…
Q: Write a program that asks the user to enter integers as the width and length of a rectangle that…
A: As per the requirement program is completed. Note: In the question programming language is not…
Q: The processors in a multi-processor system must be synced in order to share memory. Traditional PC…
A: INTRODUCTION: MULTI PROCESSOR: A multiprocessor system comprises many processors and a communication…
Q: It's not clear how the SPEC CPU benchmarks solve the Whetstone, Dhrystone, and Linpack benchmarks'…
A: Introduction The SPEC CPU suites measure CPU performance by running a variety of applications,…
Q: No, I don't think it was an inside job that caused the current security breach concerning access…
A: Introduction: When private or protected information gets exposed, it is referred to as a data…
Q: Q2- Write a program to create a vector matrix A(10) from input. Then print only the numbers that…
A: ALGORITHM:- 1. Declare a vector. 2. Take input for 10 elements from the user. 3. Print the elements…
Q: You sometimes see numeric intervals given as 2 < x < 3 In C this interval does not have the meaning…
A: 2<x<3 is a combination of two statements x>2 and x<3 which means x lies between 2 and 3…
Q: What are the methods for exchanging information under a company's information security incident…
A: Introduction: When it comes to cybersecurity risks, an incident response plan is a collection of…
Q: How can I move between users without having to log out of my account?
A: Introduction: It is critical to log out of a computer since there are risks associated with not…
Q: Utilize a request for proposal to collect information on hardware and system software, as well as to…
A: Introduction: Without computer software, computer hardware is almost worthless. The term "software"…
Q: 11. Which of the following is the correct sequence of operations in a microprocessor? a) Opcode…
A: The Correct option is A A) Opcode fetch, memory read, memory write, I/O read, I/O write The sequence…
How would your design change if each drug must be sold at a fixed price by all pharmacies?
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 3 images
what is the meaning of IMUS? what does it identify
- A company that provides a movie-streaming subscription service uses a relational database to store information on movies to answer customer questions. Each entry in the database contains the following items: Movie ID (the primary key), movie title, year made, movie type, MPAA rating, starring actor #1, starring actor #2, starring actor #3, and director. Movie types are action, comedy, family, drama, horror, science fiction, and western. MPAA ratings are G, PG, PG-13, R, NC-17, and NR (not rated). Using a graphics program, develop an entity-relationship diagram for a database application for this database.Your task is to develop a database, in order to keep information on all sales at a motorcycle dealership. The database will include information on motorcycles, salespeople, sales, and customers. We assume for simplicity that the dealership sells only new motorcycles and that all motorcycles are produced by the same manufacturer. Each kind of motorcycle is called a model, and it has a unique model number. For each model, you want to store also its name, engine size in cubic centimeters (cc) which is an integer number, and the date when this particular model was introduced. For each salesperson, you want to store their employee ID number, first name, middle initial, last name, and the date when the employee was hired. For each customer, you want to store a customer ID number, first name, middle initial, last name, address information (city, state, and zipcode), phone number (given in standard US format), and e‐mail address. Assume that you do not have a zip code table available. Each…Please I want the EER or E-R Digram for this question: A patient is identified by patient id, and admission date. • A patient must be either an Emergency patient or a resident patient. • We must record the checkback date for Emergency patient. • Only resident patient is assigned to one room. Room has a unique number, degree, and floor number. • For each room there are a number of beds each of which has a bed number, specification. If a room is deleted, you need not keep track of its beds any longer. • Both emergency patient and resident are cared for by a responsible Doctor. Doctor is identified by Doctor number. For each Doctor, the name, several specialty, and years of experience must be recorded. • Doctors prescribe medicine for patients. Medicine is identified by trade name that has scientific name and formula. The medicine depends on another medicine to be taking before. • A doctor could prescribe one or more drugs for several patients, and a patient could obtain prescriptions…
- You have a list of all your contacts details that you would like to store in a database. Your goal is that when a record is inserted in contacts table, you also want this record to be stored (inserted) in a backup table. Assume you have the two tables created: CONTACTS and CONTACTS_BACKUP. These two (2) tables have the same records. The CONTACTS table have the following columns: CONTACT_ID (Primary_Key), FIRSTNAME, LASTNAME and MOBILE_NO. CONTACTS_ID FIRSTNAME LASTNAME MOBILE_NO 1 100 Princess Kim 813023895 2 101 Henry Packer 811257891 3 102 Petrus Johannes 855698712 4 103 Lukas Shilongo 832584691 The CONTACTS_BACKUP table have the same columns and records as the CONTACTS table. CONTACTS_ID FIRSTNAME LASTNAME MOBILE_NO 100 Princess Kim 813023895 2 101 Henry Packer 811257891 3 102 Petrus Johannes 855698712 4 103 Lukas Shilongo 832584691 You now need to keep both tables in sync so that when a record is inserted into the CONTACTS table it should automatically be inserted into…In this example, we will pretend that the student table in the university database is indexed by StudentID (the primary key), Major, Age, MaritalStatus, and HomeZipCode (all secondary keys). Let's pretend a university needed a list of students from the 45462 zip code who are either above the age of 25, married, and majoring in MIS or computer science OR who are under the age of 25 and majoring in computer engineering. Is there a way to use indexes to restrict results to to those entries that fulfill this condition?I am having some trouble with this for an assignment in Database. I am trying to create some queries for this homework: Assignment 5: Data Definition language and Transaction in MySQL This is what I am currently working on: On June 3, 2019, customer ‘10010’ makes a payment of $100 in cash. The payment ID is 3428. The query as it is as of this moment: SELECT PAYMENTINSERT INTO PAYMENT (PMT_ID,PMT_DATE,CUS_CODE,PMT_AMT,PMT_TYPE,PMT_DETAILS)VALUES(3428,6-3-2019,10010,100.00,cash,account),UPDATE CUSTOMERSET CUS_BALANCE = CUS_BALANCE + 100WHERE CUS_CODE=10010,COMMIT 2. On May 11, 2019, customer ‘10012’ makes a credit purchase of one unit of product ‘11QER/31’ with a unit price of $110.00; the invoice total is $118.80. The invoice number is 10983, and this invoice has only one product line. [note: no payment has been made here] The Query as of now: BEGIN TRANSACTION; INSERT INTO VOICE VALUES (10983, 10012, ’5-11-2019’), INSERT INTO LINE VALUES (10983, 1, ‘11QER/31’, 1, 110.00), UPDATE…
- You are asked to design a database for an University. This particular university has multipledepartments. Each department in that university offers one or more courses to the students. All thestudents are part of a certain department and they take courses in that department. A department hasa name, unique number and chairman. The courses have a name, a course number such as ‘311’ , acredit point value, and the year it commenced. A course cannot be identified uniquely with thecourse number, but the course number is unique for each department. Students have given names,surname, unique Student ID, Date of Birth and the year they enrolled. When a student takes a coursethe year and the semester he or she took that particular course is recorded. When he finishes thecourse , the grade and total marks are recorded. A student can take multiple courses but they are alsoallowed to drop a semester in that university by taking no courses. Construct an ER diagram usingthe requirements given here.…Database systems In SQL MurachCollege database. Provide a list of all of the students, the number of courses they are taking, and the number of different instructors they have across all of their courses. The first column should provide the last name of each student (column titled Student Last Name). The second column should provide the number of courses that each student is taking (column titled Number of Courses). The third column should provide the number of different instructors that each student has for all of the courses they are taking (column titled Number of Different Instructors). No other columns should be provided in the result. Organize the result by student last name in alphabetical order.Q2/ Consider the following table is used to store contact information: Name Company Address Phone1 Phone2 Phone3 ZipCode Joe АВС 123 5532 2234 3211 12345 Jane XYZ 456 3421 14454 Chris PDQ 789 2341 6655 14423 The table is considered as not normalized, explain why? And what is the INF of the table?
- Answer the given question with a proper explanation and step-by-step solution. c. Create a relastionship: You need to add a new column called DeptID in the Employee table, it will be the foreign key in this table, it should be text data type and 5 characters in length. Make sure you enter one of the corresponding departmentID's values (i.e., ECON, MIS, and BUS) for this column in the Employee table for this newly created DeptId column that you have entered in the Department table previously. Then, use the Relationships tool under Database Tools to create a relationship between the Department Table and the Employee table, i.e., connecting the two tables together via the primary key (DepartmentID in Department Table) and foreign key pair (DeptID in the Employee Table and choose Enforce Referential Integrity to set the integrity contraint between the foreign key and primary keyAnswer the given question with a proper explanation and step-by-step solution. For this question use the file data1.csv The file contains information on various customers. Each customer has a unique customer id. The data also has information on age income and Gender of the customers. Space can be used as a delimiter for this file. Find the following: A) The total number of the rows in the file. B) The number of unique customer ids in the datafile. For this question create a set object which will only allow you to add unique customer ids. C) The program asks user to provide an id and prints information about that customer. Make sure to take care for the errors due to invalid id (i.e., id does not present in data). Print “id not found” when id is not found. Save the file as Solution1.java. You can use either File Reader or Scanner classes to read the data in the csv file. Your program should print the following after filling the blanks with the appropriate values Outcome: The total…When you say "metadata," what do you mean exactly? In the context of a data set, the following is a definition of metadata: When might it be helpful to use information pulled from a set of results?