SlideShare a Scribd company logo
Donation
PK Donation ID NUMERIC(10,2)
FK1 Contact ID NUMERIC(10,2)
Donation Date CHAR(10)
Donation Amount CURRENCY
Donation Type TEXT(10)
Donation Cause TEXT(10)
Donation Comments By Donor TEXT(10)
Contact
PK Contact ID NUMERIC(10,2)
First Name TEXT(10)
Last Name TEXT(10)
Email Address CHAR(10)
Phone Number 1 NUMERIC(10,2)
Phone Number 2 NUMERIC(10,2)
Total Donations Made NUMERIC(10,2)
Total Amount Of Money Donated CURRENCY
Alumni Status? TEXT(10)
Reg/Non-Reg Status? TEXT(10)
Organization/Individual Status? TEXT(10)
Address
PK Address ID NUMERIC(10,2)
FK1 Contact ID NUMERIC(10,2)
Type Of Address TEXT(10)
Street CHAR(10)
City TEXT(10)
State TEXT(10)
Zip Code NUMERIC(10,2)
Country TEXT(10)
Address Line 2 CHAR(10)
Attendance
PK AttendanceID NUMERIC(10,2)
FK1 Contact ID NUMERIC(10,2)
FK2 EventID NUMERIC(10,2)
Attendance With Family? TEXT(10)
Attendance With Friend? TEXT(10)
Attendance Alone? TEXT(10)
Event
PK EventID NUMERIC(10,2)
Event Name TEXT(10)
Event Date CHAR(10)
Event Location CHAR(10)
Event Description CHAR(10)
has
has
has
has

More Related Content

Viewers also liked

Análisis de las complementariedades en la ocupación. Una perspectiva microeco...
Análisis de las complementariedades en la ocupación. Una perspectiva microeco...Análisis de las complementariedades en la ocupación. Una perspectiva microeco...
Análisis de las complementariedades en la ocupación. Una perspectiva microeco...
i2tic
 
Infographic AddSocial (ng)
Infographic AddSocial (ng)Infographic AddSocial (ng)
Infographic AddSocial (ng)
Dennis Veldhuis
 

Viewers also liked (7)

Absolut - Plano de Mídia
Absolut - Plano de MídiaAbsolut - Plano de Mídia
Absolut - Plano de Mídia
 
Análisis de las complementariedades en la ocupación. Una perspectiva microeco...
Análisis de las complementariedades en la ocupación. Una perspectiva microeco...Análisis de las complementariedades en la ocupación. Una perspectiva microeco...
Análisis de las complementariedades en la ocupación. Una perspectiva microeco...
 
La contaminacion-ambiental-091023082715-phpapp01
La contaminacion-ambiental-091023082715-phpapp01La contaminacion-ambiental-091023082715-phpapp01
La contaminacion-ambiental-091023082715-phpapp01
 
El ingenio y la valentía del viejo simio
El ingenio y la valentía del viejo simioEl ingenio y la valentía del viejo simio
El ingenio y la valentía del viejo simio
 
Contenido programatico
Contenido programaticoContenido programatico
Contenido programatico
 
Infographic AddSocial (ng)
Infographic AddSocial (ng)Infographic AddSocial (ng)
Infographic AddSocial (ng)
 
известные личности
известные личностиизвестные личности
известные личности
 

More from Kunal Sharma

Impact of Current Technology on Information Agencies
Impact of Current Technology on Information AgenciesImpact of Current Technology on Information Agencies
Impact of Current Technology on Information Agencies
Kunal Sharma
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
Kunal Sharma
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
Kunal Sharma
 
Improving the Wi-Fi in the Carrier Dome Feasibility Report
Improving the Wi-Fi in the Carrier Dome Feasibility ReportImproving the Wi-Fi in the Carrier Dome Feasibility Report
Improving the Wi-Fi in the Carrier Dome Feasibility Report
Kunal Sharma
 
Multi Vendor Wireless Channel Interference.docx
Multi Vendor Wireless Channel Interference.docxMulti Vendor Wireless Channel Interference.docx
Multi Vendor Wireless Channel Interference.docx
Kunal Sharma
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
Kunal Sharma
 

More from Kunal Sharma (6)

Impact of Current Technology on Information Agencies
Impact of Current Technology on Information AgenciesImpact of Current Technology on Information Agencies
Impact of Current Technology on Information Agencies
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
Improving the Wi-Fi in the Carrier Dome Feasibility Report
Improving the Wi-Fi in the Carrier Dome Feasibility ReportImproving the Wi-Fi in the Carrier Dome Feasibility Report
Improving the Wi-Fi in the Carrier Dome Feasibility Report
 
Multi Vendor Wireless Channel Interference.docx
Multi Vendor Wireless Channel Interference.docxMulti Vendor Wireless Channel Interference.docx
Multi Vendor Wireless Channel Interference.docx
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
 

HendricksERD

  • 1. Donation PK Donation ID NUMERIC(10,2) FK1 Contact ID NUMERIC(10,2) Donation Date CHAR(10) Donation Amount CURRENCY Donation Type TEXT(10) Donation Cause TEXT(10) Donation Comments By Donor TEXT(10) Contact PK Contact ID NUMERIC(10,2) First Name TEXT(10) Last Name TEXT(10) Email Address CHAR(10) Phone Number 1 NUMERIC(10,2) Phone Number 2 NUMERIC(10,2) Total Donations Made NUMERIC(10,2) Total Amount Of Money Donated CURRENCY Alumni Status? TEXT(10) Reg/Non-Reg Status? TEXT(10) Organization/Individual Status? TEXT(10) Address PK Address ID NUMERIC(10,2) FK1 Contact ID NUMERIC(10,2) Type Of Address TEXT(10) Street CHAR(10) City TEXT(10) State TEXT(10) Zip Code NUMERIC(10,2) Country TEXT(10) Address Line 2 CHAR(10) Attendance PK AttendanceID NUMERIC(10,2) FK1 Contact ID NUMERIC(10,2) FK2 EventID NUMERIC(10,2) Attendance With Family? TEXT(10) Attendance With Friend? TEXT(10) Attendance Alone? TEXT(10) Event PK EventID NUMERIC(10,2) Event Name TEXT(10) Event Date CHAR(10) Event Location CHAR(10) Event Description CHAR(10) has has has has