Information Systems - 45
Target In this table we underline the identification data. The source of each PTH must be the identification key data, the target may not be the identification key data. When the target is not the identification key then we have an entity (in the case of entity A:). In case the identification key ...







