SlideShare a Scribd company logo
ER Tutorial 2 Chapter 9 - Questions 3, 4 and 5 V3.0 Copyright @ Napier University Dr Gordon Russell
Example 3 ,[object Object]
Continue d… ,[object Object]
Example 3 - Answer
Example 4 ,[object Object]
Example 4 - Answer
Example 5 ,[object Object]
Continued… ,[object Object]
Example 5 - Answer

More Related Content

Viewers also liked

Daniela gonzalez
Daniela gonzalezDaniela gonzalez
Daniela gonzalez
daniela1042
 
Final english work!
Final english work!Final english work!
Final english work!
C Rodrigo Reyes F
 
Asana
AsanaAsana
88 uklad okresowy_pierwiastkow
88 uklad okresowy_pierwiastkow88 uklad okresowy_pierwiastkow
88 uklad okresowy_pierwiastkowmaciekzwierz
 
Verbs
VerbsVerbs
City Of Capitola Hazard Mitigation 2010
City Of Capitola Hazard Mitigation 2010City Of Capitola Hazard Mitigation 2010
City Of Capitola Hazard Mitigation 2010
toddmayer
 
Asana
AsanaAsana
Blended porto
Blended portoBlended porto
Blended porto
jf_londono
 
Reach social Deck For Adidas
Reach social Deck For AdidasReach social Deck For Adidas
Reach social Deck For Adidas
Tommything
 
Verbs
VerbsVerbs
World history
World historyWorld history
World history
shazie1
 
Teaching Tefillah
Teaching TefillahTeaching Tefillah
Teaching Tefillah
kmedwed
 
Data modeling for the business
Data modeling for the businessData modeling for the business
Data modeling for the business
Christopher Bradley
 

Viewers also liked (16)

Daniela gonzalez
Daniela gonzalezDaniela gonzalez
Daniela gonzalez
 
Final english work!
Final english work!Final english work!
Final english work!
 
Asana
AsanaAsana
Asana
 
88 uklad okresowy_pierwiastkow
88 uklad okresowy_pierwiastkow88 uklad okresowy_pierwiastkow
88 uklad okresowy_pierwiastkow
 
Verbs
VerbsVerbs
Verbs
 
City Of Capitola Hazard Mitigation 2010
City Of Capitola Hazard Mitigation 2010City Of Capitola Hazard Mitigation 2010
City Of Capitola Hazard Mitigation 2010
 
Asana
AsanaAsana
Asana
 
Blended porto
Blended portoBlended porto
Blended porto
 
Reach social Deck For Adidas
Reach social Deck For AdidasReach social Deck For Adidas
Reach social Deck For Adidas
 
Potegowanie
PotegowaniePotegowanie
Potegowanie
 
Verbs
VerbsVerbs
Verbs
 
World history
World historyWorld history
World history
 
Teaching Tefillah
Teaching TefillahTeaching Tefillah
Teaching Tefillah
 
Ekosistemak
EkosistemakEkosistemak
Ekosistemak
 
Dynastia piastow
Dynastia piastowDynastia piastow
Dynastia piastow
 
Data modeling for the business
Data modeling for the businessData modeling for the business
Data modeling for the business
 

Similar to Er tut 2

Fidic contract administration
Fidic contract administrationFidic contract administration
Fidic contract administration
Zabeel Institute
 
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital ImperativesModernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
Cognizant
 
PC
PCPC
PC
PCPC
Vendor Management - An Overview (Project File)
Vendor Management - An Overview (Project File)Vendor Management - An Overview (Project File)
Vendor Management - An Overview (Project File)
Jyoti Kumari
 
Bank Customer Segmentation & Insurance Claim Prediction
Bank Customer Segmentation & Insurance Claim PredictionBank Customer Segmentation & Insurance Claim Prediction
Bank Customer Segmentation & Insurance Claim Prediction
IRJET Journal
 
Chapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docx
Chapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docxChapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docx
Chapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docx
cravennichole326
 
outsourcing
outsourcingoutsourcing
outsourcing
sourov_das
 
Professionalising change in insurance
 Professionalising change in insurance  Professionalising change in insurance
Professionalising change in insurance
Accenture Insurance
 
Cs141 term project
Cs141 term projectCs141 term project
Cs141 term project
Fahadaio
 
For Milestone Three, you drafted your campaign outline with your.docx
For Milestone Three, you drafted your campaign outline with your.docxFor Milestone Three, you drafted your campaign outline with your.docx
For Milestone Three, you drafted your campaign outline with your.docx
AKHIL969626
 
Getting role taxonomy right enables effective rate card negotiation e book
Getting role taxonomy right enables effective rate card negotiation e bookGetting role taxonomy right enables effective rate card negotiation e book
Getting role taxonomy right enables effective rate card negotiation e book
Neo Group Inc
 
Pricing Models in IT Industry
Pricing Models in IT IndustryPricing Models in IT Industry
Pricing Models in IT Industry
Vivekanandan M
 
Question 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docxQuestion 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docx
makdul
 
Chapter 7 Solution
Chapter 7 SolutionChapter 7 Solution
Chapter 7 Solution
Deborah Gastineau
 
Four steps to Offshoring success
Four steps to Offshoring successFour steps to Offshoring success
Four steps to Offshoring success
Satish Bhagwat
 
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsWhitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Happiest Minds Technologies
 
Module 2 - SCM Notes.pdf
Module 2 - SCM Notes.pdfModule 2 - SCM Notes.pdf
Module 2 - SCM Notes.pdf
RoopaDNDandally
 
Resume_Vinod
Resume_VinodResume_Vinod
Rohan_Purekar
Rohan_PurekarRohan_Purekar
Rohan_Purekar
Rohan Purekar
 

Similar to Er tut 2 (20)

Fidic contract administration
Fidic contract administrationFidic contract administration
Fidic contract administration
 
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital ImperativesModernizing the Insurance Value Chain: Top Three Digital Imperatives
Modernizing the Insurance Value Chain: Top Three Digital Imperatives
 
PC
PCPC
PC
 
PC
PCPC
PC
 
Vendor Management - An Overview (Project File)
Vendor Management - An Overview (Project File)Vendor Management - An Overview (Project File)
Vendor Management - An Overview (Project File)
 
Bank Customer Segmentation & Insurance Claim Prediction
Bank Customer Segmentation & Insurance Claim PredictionBank Customer Segmentation & Insurance Claim Prediction
Bank Customer Segmentation & Insurance Claim Prediction
 
Chapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docx
Chapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docxChapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docx
Chapter 1 HW.docxInsurance Operations Chapter 1 QuestionsNam.docx
 
outsourcing
outsourcingoutsourcing
outsourcing
 
Professionalising change in insurance
 Professionalising change in insurance  Professionalising change in insurance
Professionalising change in insurance
 
Cs141 term project
Cs141 term projectCs141 term project
Cs141 term project
 
For Milestone Three, you drafted your campaign outline with your.docx
For Milestone Three, you drafted your campaign outline with your.docxFor Milestone Three, you drafted your campaign outline with your.docx
For Milestone Three, you drafted your campaign outline with your.docx
 
Getting role taxonomy right enables effective rate card negotiation e book
Getting role taxonomy right enables effective rate card negotiation e bookGetting role taxonomy right enables effective rate card negotiation e book
Getting role taxonomy right enables effective rate card negotiation e book
 
Pricing Models in IT Industry
Pricing Models in IT IndustryPricing Models in IT Industry
Pricing Models in IT Industry
 
Question 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docxQuestion 1The board of directors is considering updating the fle.docx
Question 1The board of directors is considering updating the fle.docx
 
Chapter 7 Solution
Chapter 7 SolutionChapter 7 Solution
Chapter 7 Solution
 
Four steps to Offshoring success
Four steps to Offshoring successFour steps to Offshoring success
Four steps to Offshoring success
 
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsWhitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
 
Module 2 - SCM Notes.pdf
Module 2 - SCM Notes.pdfModule 2 - SCM Notes.pdf
Module 2 - SCM Notes.pdf
 
Resume_Vinod
Resume_VinodResume_Vinod
Resume_Vinod
 
Rohan_Purekar
Rohan_PurekarRohan_Purekar
Rohan_Purekar
 

Recently uploaded

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 

Recently uploaded (20)

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 

Er tut 2