Premium Essay

Data Design

In:

Submitted By TheManOfSteaI
Words 2762
Pages 12
Homework Assignment #4

Problems #65 - #94 from page 311. Please provide your answer after each problem and submit the file with your answers through Blackboard.

EliteVideo is a startup company providing concierge DVD kiosk service in upscale neighborhoods. EliteVideo can own several copies (VIDEO) of each movie (MOVIE). For example, the store may have 10 copies of the movie “Twist in the Wind”. “Twist in the Wind” would be one MOVIE and each copy would be a VIDEO. A rental transaction (RENTAL) involves one or more videos being rented to a member (MEMBERSHIP). A video can be rented many times over its lifetime, therefore, there is a M:N relationship between RENTAL and VIDEO. DETAILRENTAL is the bridge table to resolve this relationship. The complete ERD is provided in Figure P7.65.

Figure P7.65 EliteVideo ERD

[pic]

65. Write the SQL code to create the table structures for the entities shown in Figure P7.65. The structures should contain the attributes specified in the ERD. Use data types that would be appropriate for the data that will need to be stored in each attribute. Enforce primary key and foreign key constraints as indicated by the ERD. CREATE TABLE PRICE (

PRICE_CODE INTEGER NOT NULL UNIQUE, PRICE_DESCRIPTION CHAR(15) NOT NULL, PRICE_RENTFEE VARCHAR(3) NOT NULL, PRICE_DAILYLATEFEE VARCHAR(3) NOT NULL, PRIMARY KEY (PRICE_CODE));

CREATE TABLE MOVIE ( MOVIE_NUM INTEGER NOT NULL UNIQUE, MOVIE_TITLE VARCHAR(35) NOT NULL, MOVIE_YEAR INTEGER NOT NULL, MOVIE_COST NUMBER NOT NULL, MOVIE_GENRE CHAR(6) NOT NULL, PRICE_CODE INTEGER, PRIMARY KEY (MOVIE_NUM), FOREIGN KEY (PRICE_CODE));

CREATE TABLE VIDEO ( VID_NUM INTEGER NOT NULL UNIQUE, VID_INDATE DATE

Similar Documents

Premium Essay

Database and Data Warehousing Design

...head: DATABASE AND DATA WAREHOUSING DESIGN Database and Data Warehousing Design Yolanda McCollum Dr. Constance D. Blanson CIS499: Information Systems Capstone February 11, 2014 Database and Data Warehousing Design Why does one need data warehousing? According to Total Metrics (2013): 1. The prime purpose of a Data Warehouse is to store, in one system, data and information that originates from multiple applications within, or across, organizations. The data may be stored ‘as received’ from the source application, or it may be processed upon input to validate, translate, aggregate, or derive new data/information. 2. Most of the data load functions are processed in batch. There are few on-line data maintenance functions. The on-line functions that do exist tend to update the reference files and data translation tables. 3. A database alone does not constitute a Data Warehouse system. At a minimum, a Data Warehouse system must include the database and corresponding load functions. Data reporting functions are optional. They may, or may not be an integral part of the Data Warehouse system. 4. The prime purpose of storing the data is to support the information reporting requirements of an organization i.e. multiple users and multiple applications. 5. The Data Warehouse may, or may not, provide the required reporting functions. In some cases, external applications access the Data Warehouse files to generate their own reports and queries. 6. Data Warehouse functions...

Words: 880 - Pages: 4

Free Essay

Implications of Big Data for the Design, Implementation and Use of Enterprise-Level Information Systems in Defense

...Implications of Big Data for the design, implementation and use of enterprise-level information systems in Defense While technology rapidly advances and information becomes a strategic asset, Big Data arouses the demand of politicians and military leaders to make use of possible information advantages to allegedly better support the military mission (DOD, 2010). However, the defense sector is still struggling with the implementation of adequate enterprise-level information systems. Therefore, militaries have to assess the necessity of using Big Data within the different business processes, and they have to ensure that the current implementation of enterprise-level information systems remains adaptable and scalable for future business needs. The amount of data is continuously on the rise due to the rapid growth of mobile devices and applications, smart sensors and devices, cloud computing solutions, and […] portals (“Impact,” 2013). Also, the capability to analyze and to correlate structured with unstructured data will enhance. But militaries must avoid getting distracted from implementing a good information management system that serves current business needs, rather than trying to rapidly dominate Big Data. Instead, the success of todays mission has to gain center stage. Thus, one has to focus on three principles. First: One has to act now but also has to keep in mind that there has to be a transition from information management to Big Date in the future, as Big Data will affect more...

Words: 647 - Pages: 3

Premium Essay

Data Design Methods

...Data Design Methods Introduction Many organizations and companies rely on databases to run their operations and achieve competitive advantage. Database design refers to the different parts of the design of an overall database system. It can be thought of as the logical data structures used to store data, and the forms and queries used as part of the overall database application within the database management system (Wikipedia.org). The paper focuses on database design methods and steps that can be taken to achieve a good design structure that avoids redundancy, duplicate data or the absence of required data. The need to understand database models Databases are important to the organizational setting. Databases allow organizations to share data across multiple applications and systems. Organizations build several databases each one sharing data with several information systems. This is because it is almost impractical to build one database to meet an entire organization’s needs. Therefore data design is critical to the consistency, integrity and accuracy of the data in a database. A database that is improperly designed will make it difficult to retrieve certain types of information. Besides, there is the risk that searches will produce inaccurate results or information that may have potential damaging effects on a company's bottom line. Inaccurate database may also affect the daily operations of a business and its future direction. A good database addresses the informational...

Words: 1407 - Pages: 6

Premium Essay

Data Base Design

...my credit information and my banking transaction or online purchases.The way this pizza shop is handling personal information can lead to information security breaches anytime and is unethical. Information security breaches may cause real harm and distress to the individuals they affect such as serious embarrassment or inconvenience, identity fraud, lives may even be put at risk. Even if privacy is not in itself a fundamental right, it is necessary to protect other fundamental rights. 3) What role does information security play in this scenario? Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. For the scenario , in the above video I feel that different Information security tools must be used by the company to...

Words: 354 - Pages: 2

Free Essay

Business Data Analysis- Fennal Design

...Module code: BSS002-6 Module Name: Business Data Analysis Submission: 30 November, 2012 I my class I learn how to simulate data to solve a problem. I learn to use excel and some function in it these are =SUM() = RAND() =AVERAGE() =STDV() =RANDINV() =VLOOKUP() and few more . These are widely used function when I simulated data in excel. In task 1 I find out how to calculate or forecast how much card should we print. I use a random variable with =RAND( function and use =VLOOKUP() function to find out demand from discreet variable called cumulative probabilities. This is discrete because we find out the range by frequency distribution. Then I use if function to calculate disposable cost with =IF (Demand>Production,(Demand-Production)*Disposable cost, 0). This function works with logical criteria. It says that, if demand is greater than production then disposable cost will be (Demand-Production)*Disposable cost, if not then “0”. Then I calculated profit. Then I simulated 1000 trial with 4 types demand to find out with demand will give us maximum profit and this was $40000. If we print $40000 cards then we can make profit of $57758 which is higher than other. Then we use DATA ANALYSIS add-in to simulate descriptive statistic. From here we can answer question no 2 also. If you print 20000 cards then will make profit of 46178 which is less than what can we make in 40000 printed cards. In here simulated demand is uncertain variable when is used for forecasting...

Words: 671 - Pages: 3

Free Essay

Sdd Template

...dSoftware Design Document (SDD) Template  Software  design  is  a  process  by  which  the  software  requirements  are  translated  into  a  representation  of  software  components,  interfaces,  and  data  necessary  for  the  implementation  phase.  The  SDD  shows  how  the  software  system  will  be  structured  to  satisfy  the  requirements.  It  is  the  primary  reference  for  code  development  and,  therefore,  it  must  contain  all  the  information  required  by  a  programmer  to  write  code.  The  SDD  is  performed  in  two  stages.  The  first  is  a  preliminary design in which the overall system architecture and data architecture  is defined. In the  second stage,  i.e. the detailed design stage,  more detailed data  structures are defined and algorithms are developed for the defined architecture.  This  template  is  an  annotated  outline  for  a  software  design  document  adapted  from  the  IEEE  Recommended  Practice  for  Software  Design  Descriptions.  The  IEEE  Recommended  Practice  for  Software  Design  Descriptions  have  been  reduced  in  order  to  simplify  this  assignment  while  still  retaining  the  main  components and providing a general  idea of a project definition report. For your  1  own  information,  please  refer  to  IEEE  Std  1016­1998  for  the  full  IEEE  Recommended Practice for Software Design Descriptions.  1  http://www.cs.concordia.ca/~ormandj/comp354/2003/Project/ieee­SDD.pdf (Team Name)  (Project Title) ...

Words: 1105 - Pages: 5

Premium Essay

Nt1310 Unit 1 Assignment

...User Understanding User research was performed to understand how the users work with the application. Users from medical practice (pathologist and physician) were recruited for user analysis through contextual inquiry. Our team member prepared pre and post questioners for analysis. Pathologist: They are the primary users of this device. A blood sample of a person is taken and is mixed with reagent that is provided with the device. Then the compound is put for testing. The device performs various tests and delivers the result. The user retrieves the result and loads it to the application. Then the result gets displayed in multiple window, the user then alters by navigating across window and comparing with other data and performs analysis on...

Words: 927 - Pages: 4

Premium Essay

Nt1330 Unit 6 Assignment

...Assignment Description: For the unit 2 assignment, I needed to develop a critical path method (CPM) for the design phase of the ABC Video Rental store project. It was suggested that we use table 6-6 from The New Software Engineering by Sue Conger (2008, p. 167) as a guideline for the development of the CPM. Table 6-6 outlines the functional requirements for the program and what different software options, existing or available for development of the application, would be able to meet those requirements. A table that I found more useful for the assignment goals was Table 6-16 which outlined and defined design phase tasks along with an estimated function point value for each task (Conger, 2008, p. 188). After displaying my CPM for the ABC project design phase I will outline the critical path, the various tasks that fit the dependencies from table 6-6, how the various tasks might be distributed between a two-person team of a project manager and software...

Words: 761 - Pages: 4

Free Essay

It 163

...1 1. The major goals of a database designer are to properly design a database that provides you with access to up-to-date and accurate information and also to prevent unnecessary duplication of data. One of the basic advantages of the database design is that it helps identify research gaps. All data is stored in one place where it’s easy to find, it’s also designed to be a multimedia system. A correct design is essential to achieving your goals. 2. A null value is that there is no value at all; an absence of a data and it’s not really the same as a zero. Why it’s not the same as a zero because a zero is a zero balance the null value is that its non-data, a data that is not present right now. The three interpretations for a null value are SQL-unknown value, true and false. 3. A switchboard is a form that includes buttons to perform a variety of actions. It is important to a database designer because it ensure users that they can switch between tables, report, and forms by viewing them. What it can do is that access displays a switchboard on which the users’ clicks a button to indicate the table that they want to view. What it can not do is switch between programs. 4. I think that general managers like in a bank should have access to certain tables in the database while other users are “blocked” from that same data. It won’t be right if both have access to the same data because there are personal data the other user should not see or use. For the college example I...

Words: 392 - Pages: 2

Premium Essay

Nt1330 Unit 3

...1. List and describe at least nine factors considered in the design specifications for a new system. Give at least one example for each one? The nine factors which are considered in the design specifications for a new system are 1. Input: The whole design of the system depends on the inputs that we provide to develop the system. Ex: Flow, Data Entry. 2. Output: The system developers should consider all the factors like medium, environment, database and timing Ex: medium, timing. 3. Processing: Perform computations, handle program modules, timing of the output. and display the required reports. Ex: Computations, program modules 4. Manual Procedures: The system must consider the nature of the activities, who perform them, how, when and where they are performed. Ex: what activities, when, how 5. Database design: The design of the system must be able to handle the volume of data, execute quickly, record the specifications and organize the files Ex: logical data model, record specifications...

Words: 972 - Pages: 4

Premium Essay

Dynamite Electronics

...DYNAMITE ELECTRONICS (DE) Objectives of QML Obtaining QML status is a generic way to qualify a manufacturer without extensive end-of-manufacturing qualification testing on each device design. It reduces and replaces the end-of-manufacturing testing with in-line monitoring and testing using SPC. It shifts the focus from device-level to process-level. The foundation for this approach is a TQM approach within the manufacturing environment. It enables a manufacturer to apply for the Malcolm Baldridge National Quality Award within five years of the initial request for the QML status. (Spurgeon, Susan P., Marcinko, Frank, Mengele, Martin J., Lyman, Richard C. "QPL or QML - A Quality Trilogy Approach." 1990 - ASQC Quality Congress Transactions - San Francisco. 1990, pp. 189-193.) QML approach certifies processes rather than individual parts. The key objectives of the QML are: • built-in quality • training and motivation of all employees • Continual improvement the two steps in achieving QML status are: certification and qualification. Certification Requirements. The certification requirements are: • controlled processes • continued improvement • quality-management approach • self-audit with quality enhancement • technical-review board (TRB) acting as corporate conscience • verified reliability of process Qualification Requirements. The qualification requirements are: • Demonstration of the stability and predictability of the manufacturing line (for example, two actual...

Words: 1543 - Pages: 7

Free Essay

Case Study 1: Harriet’s Fruit and Chocolate Company

...physical infrastructure of the orchards, orchard shacks, and the cold storage building. After doing some detailed investigations of the physical infrastructure of the orchards, orchard shacks, and the cold storage building revealed some ideas that we can implement in the network design. The investigation also showed that wireless technology would be the best solution between the three areas. With that being said the orchard area would be the only problem we would need to find out how big the orchard area is so we can install access points so a good signal can all ways be delivered. Determining the distance will also aid in the network design on what cables like fiber optics or RJ cables, as well as the selection of technologies and devices to meet the design goals. The number of buildings should be determined and what equipment they should contain which types of network devices needed for this landscape. 2. Make a list of business goals for Harriet’s Fruit and Chocolate Company and determine the constraints that will affect these goals. Business goals for Harriet’s Fruit and Chocolate Company are to provide high quality products to customers. Also to provide immediate and real-time access to inventory data to aid in sales, to do this an upgrade logistics would have to take place which in turn everything would have to go digital, we would not be able to continue with the older mom and pop structure we have been used too. Taking those outdated technologies out and bringing in new...

Words: 582 - Pages: 3

Premium Essay

Theme Park Design Guidelines

...Park Design Guidelines & Data Province of British Columbia Ministry of Environment Lands and Parks A NATURAL LANDSCAPE ARCHITECTURE FOR BRITISH COLUMBIA’S PROVINCIAL PARKS BC PARKS: PARK DESIGN GUIDELINES & DATA Overview Simplicity in design and restraint in construction creates park facilities suited to what attracts visitors in the first place – recreation in the natural park landscape. q The aim of Park Design Guidelines & Data is to help BC Parks staff use their park expertise to produce appropriate facility landscapes. These guidelines identify design criteria and planning processes for BC Parks staff to provide sustainable, appropriate park recreation facilities. They promote facility design that requires the least visible development. q A design approach to visitor facilities is defined that: Recognizing the facilities are an integral part of a park means reducing the impact of use and basing planning and design decisions on local and regional considerations – for the park environment’s long term health. Maintaining natural park landscapes and environments will help ensure the quality of visitor experiences now and in the future. At neighbouring Bromley Rock Provincial Park and Stemwinder Provincial Park, illustrated left, natural site elements create facilities that blend into the natural park landscapes. These examples show the careful expenditure of resources and the thoughtful use of native materials...

Words: 32924 - Pages: 132

Premium Essay

Nt1310 Unit 3 Circuit Design

...The optimum design selection for this project is design 03. This design was selected by considering several factors. The first factor which was considered is the complexity of the circuit design. As there are two processors the work load is divided and therefore error percentage can is reduced. Sensor interfacing is carried out with the microcontroller and the GSM and PC interfacing is done using the arduino. If an error occur in the system it will be easily troubleshoot as the system is virtually divided and three different program codes are being used. When comparing with the other two designs the work load will more on the processor therefore it will affect the accuracy and the effectiveness of those system in the long run. In data transmission design 01 has used a RF for wireless communication, and the design 02 has used a Bluetooth device for its wireless data communication. As the system is wireless there will be various interferences from other equipment, result in errors in the system. And if this system is implemented in a small nursing home or a hospital, the radio frequency signals may be interfere with other medical equipment which will cause instability in this system as well as other equipment too....

Words: 511 - Pages: 3

Free Essay

Annual Revise Project

... Executive Summary e goal of our project is to investigate the fundamental problem that plagues all software development: the gap between the intentions of the designer, as described (often only minimally) in design and specification documents, and the behaviour of the delivered system, as realized in the code. We are developing new languages, tools and methods to address this problem. Our work also incorporates independent analyses of designs and code. By applying our design analyses, we can be sure that the design as described has the intended consequences the designer had in mind. By applying our code analyses, we can eliminate flaws that do not depend on comparison to a design, and can discover properties that can be later fed into a conformance analysis. Rather than pursuing a single, narrow research approach, we have tried to explore the problem from many angles. We consider how a codebase may be analyzed in the presence of some design models; how it might be analyzed if there is no explicit design documentation; and how minimal design properties expressed as code annotations might be exploited. We have developed static analyses that require no execution of the code but can simulate the effect of all possible executions, and dynamic analyses that require a test suite but can produce more accurate results. Some of our static analyses are conservative, and can guarantee properties of all executions; others are sound in their error reports, so that no false alarms are...

Words: 647 - Pages: 3