Home / Information Systems

Information Systems - 45

Target In this table we underline the identification data. The source of each PTH must be the identification key data, the target may not be the identification key data. When the target is not the identification key then we have an entity (in the case of entity A:). In case the identification key ...

Information Systems - 16

Chapter 3 Current situation analysis 1 Purpose of request  Introduces methods and tools to help determine the current state of existing systems.  Find out in detail the field in which an organization want to complete the function.  Determine the expression of the organizations goals ...

Information Systems - 61

For example: DEPARTMENT MSK TENK MONHOC one many Belong MSSV MSK STUDENTS HOT NOW much MSMH TENMH LT TH much Register Many-to-many relationship (nn) is converted into 2 consecutive numbers: 0,n/1,n and 0,n/1,n 16 MSK TENK FACULTY 1,1 1,n MSSV MSK STUDENTS HOT NOW 1.1 MONHOC MSMH TENMH LT TH 0,n DK ...

Home Reference Doccument