Using the Entities and Attributes you created for your business from the week 1 discussions, show the tables and relationships resulting from your

 

Using the Entities and Attributes you created for your business from the week 1 discussions, show the tables and relationships resulting from your model in the form of an E/R diagram.  Be sure to identify key attributes and relationships across all entities.

You can use Microsoft tools like PowerPoint/Visio, or any other graphical modeling tool to create your E/R diagram.

Business from week 1:

 

Custom 3D Printed Jewelry

Business Overview: Custom 3D Printed Jewelry is a niche business specializing in designing, customizing, and producing 3D printed jewelry pieces such as rings, necklaces, bracelets, and earrings. Customers can choose from pre-designed pieces or request custom designs. The business uses advanced 3D printing technology to create unique, personalized jewelry items.

Possible Entities and Their Attributes

1. Customer

  • CustomerID: 
  • FirstName:
  • LastName: 
  • Email: 
  • Phone: 
  • Address: 
  • JoinDate: 

2. JewelryPiece

  • JewelryID: 
  • Name: 
  • Description: 
  • Type: 
  • Price: 

3. Order

  • OrderID: 
  • OrderDate: 
  • CustomerID: 
  • TotalAmount: 

4. OrderDetails

  • OrderDetailID:
  • OrderID: 
  • JewelryID: 
  • Quantity: 
  • Price: 

5. Customization

  • CustomizationID: 
  • JewelryID: 
  • CustomerID: 
  • Details: 
  • DesignFile:

Database Processing and Application Software

Database Processing

  • Relational Database Management System (RDBMS): A relational database, such as MySQL, PostgreSQL, or Microsoft SQL Server, would be ideal for managing the entities and their relationships.
  • CRUD Operations: The system will require Create, Read, Update, and Delete operations to manage customers, jewelry pieces, orders, and customizations.
  • Transaction Management: To ensure data integrity, particularly for order processing and payment transactions.
  • Search and Filtering: Customers should be able to search for jewelry pieces by type, material, price range, etc.
  • Reporting: Generate reports on sales, customer orders, popular items, etc.

Application Software

  • Web Application: A user-friendly web application for customers to browse jewelry pieces, place orders, and request customizations. Technologies could include HTML, CSS, JavaScript, React.js for the front-end, and Node.js or Django for the back-end.
  • Inventory Management System: To keep track of available materials and manage inventory levels for 3D printing supplies.
  • Customer Relationship Management (CRM): To manage customer interactions, track order history, and handle customer support.
  • Design Software Integration: Integration with 3D design software (e.g., Blender, Tinkercad) to handle custom design requests and process 3D models.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can