Upload
phiosco
View
215
Download
0
Embed Size (px)
Citation preview
8/6/2019 univer db
1/2
Relationships, Entities and Database Design -The University Database
(Page 4 of 4 )The university database stores details about university students, courses, the semester a student
took a particular course (and his mark and grade if he completed it), and what degree program eachstudent is enrolled in. The database is a long way from one thatd be suitable for a large tertiaryinstitution, but it does illustrate relationships that are interesting to query, and its easy to relate towhen youre learning SQL. We explain the requirements next and discuss their shortcomings at the endof this section.
Consider the following requirements list:
1 The university offers one or more programs.2 A program is made up of one or more courses.
3 A student must enroll in a program.4 A student takes the courses that are part of her program.5 A program has a name, a program identifier, the total credit points required to graduate, and the
year it commenced.6 A course has a name, a course identifier, a credit point value, and the year it commenced.7 Students have one or more given names, a surname, a student identifier, a date of birth, and the
year they first enrolled. We can treat all given names as a single objectfor example, JohnPaul.
8 When a student takes a course, the year and semester he attempted it are recorded. When hefinishes the course, a grade (such as A or B) and a mark (such as 60 percent) are recorded.
9 Each course in a program is sequenced into a year (for example, year 1) and a semester (forexample, semester 1).
The ER diagram derived from our requirements is shown in Figure 4-12. Although it is compact, thediagram uses some advanced features, including relationships that have attributes and two many-to-many relationships.
In our design:
Student is a strong entity, with an identifier, student_id, created to be the primary key
used to distinguish between students (remember, we could have several students with the samename).
Program is a strong entity, with the identifier program_id as the primary key used to
distinguish between programs.
Each student must be enrolled in a program, so the Student entity participates totally in the
many-to-one EnrollsIn relationship with Program. A program can exist without having
any enrolled students, so it participates partially in this relationship.
Figure 4-12. The ER diagram of the university database
1 A Course has meaning only in the context of a Program, so its a weak entity, with
course_id as a weak key. This means that a Course is uniquely identified using its
course_id and the program_id of its owning program.
8/6/2019 univer db
2/2
2 As a weak entity, Course participates totally in the many-to-one identifying relationship with
its owning Program. This relationship has Year and Semester attributes that identify its
sequence position.3 Student and Course are related through the many-to-many Attempts relationships; a
course can exist without a student, and a student can be enrolled without attempting anycourses, so the participation is not total.
4 When a student attempts a course, there are attributes to capture theYear
andSemester
,and the Mark and Grade.
What it doesnt do
Our database design is rather simple, but this is because the requirements are simple. For a realuniversity, many more aspects would need to be captured by the database. For example, therequirements dont mention anything about campus, study mode, course prerequisites, lecturers,timetabling details, address history, financials, or assessment details. The database also doesnt allow astudent to be in more than one degree program, nor does it allow a course to appear as part of differentprograms.
Please check back next week for the conclusion to this article.
DISCLAIMER: The content provided in this article is not warranted or guaranteed by DeveloperShed, Inc. The content provided is intended for entertainment and/or educational purposes in order tointroduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon thereader to employ real-world tactics for security and implementation of best practices. We are not liablefor any negative consequences that may result from implementing any information covered in ourarticles or tutorials. If this is a hardware review, it is not recommended to open and/or modify yourhardware.