Free Essay

Database Assigment

In:

Submitted By radenkotfzr
Words 408
Pages 2
1. Name the five phases of the traditional systems development life cycle, and explain the purpose and deliverables of each phase. 2. In which of the five phases of the SDLC do database development activities occur? 3. Are there procedures and processes that are common to the use of SDLC, prototyping, and agile methodologies? Explain any that you can identify and then indicate why the methodologies are considered to be different even though fundamental procedures and processes are still included. 4. Explain the differences between user views, a conceptual schema, and an internal schema as different perspectives of the same database. 5. In the three-schema architecture: a) The view of a manager or other type of user is called the schema. b) The view of the data architect or data administrator is called the schema. c) The view of the database administrator is called the schema. 6. Why might Pine Valley Furniture Company need a data warehouse? 7. As the ability to handle large amounts of data improves, describe three business areas where these very large databases are being used effectively. 8. In the section "Disadvantages of File Processing Systems," the statement is made that the disadvantages of file processing systems can also be limitations of databases, depending on how an organization manages its databases. First, why do organizations create multiple databases, not just one all-inclusive database supporting all data processing needs? Second, what organizational and personal factors are at work that might lead an organization to have multiple, independently managed databases (and, hence, not completely follow the database approach)?

9. Consider your business school or other academic unit as a business enterprise. a. Define several major data entity types and draw a preliminary enterprise data model (similar in notation to Figure l-3a). b. Would your business school or academic unit benefit from a multitiered architecture for data? Why or why not?

10. Using the notation introduced in this chapter, draw a single diagram that represents the following relationships in the hospital environment. a. A HOSPITAL has on its staff one or more PHYSICIANS. A PHYSICIAN is on the staff of only one HOSPITAL. b. A PHYSICIAN may admit one or more PATIENTs. A PATIENT is admitted by only one PHYSICIAN. c. A HOSPITAL has one or more WARDs. Each WARD is located in exactly one HOSPITAL. d. A WARD has any number of EMPLOYEES. An EMPLOYEE may work in one or more WARDs.

Similar Documents

Premium Essay

Database Managment - Chapter 1 Assigment

...CHAPTER 1 ASSIGNMENT 1. Part A a. Automatic information processing was introduced by James Power whose company later became known as IBM b. The emergence of reusable data opened up the horizons for database management systems. c. Data provides a competitive advantage for businesses of all shapes and sizes. Part B a. Backup and recovery technology allows database managers to sleep in peace knowing their data is safe. b. Data Security protects consumers from data theft. c. Data privacy is very important. Hospital employees, for example, are only allowed access to certain parts of the EMR system which holds patient data. 2. 1986 – When my world began… IBM becomes the first company to use a one megabit chip in the IBM 3090 1991 – The first web site was built at CERN labs and put online August 6th 1992 – Microsoft Access was released 1995 – MySQL’s initial release 1998 – Google began 2004 – Emergence of Web 2.0 2007 – Amazon releases the Kindle fostering a huge database of electronic books 2013 – MySQL is the second most widely used database management system 2015 – I take Database Management class with Mr. Ted Lee! 3. Here at the Show Me The Money Bank of Tennessee, our database systems allows us to send birthday greetings, send Congratulations to new graduates and newlyweds, reward long time clients, and off the most competitive interest rates on cars, houses, boats, etc. 4. Early data management was very time consuming. The examples of the seven years it took...

Words: 341 - Pages: 2

Premium Essay

Strategy

...WORLD VISION POSITION DESCRIPTION |KEY POSITION INFORMATION | |Job Title |DM&E Coordinator | |13 | |Reports To |Program Team Leader | |Department/Group |Quality Team |Location |Sarajevo | WORK CONTEXT / BACKGROUND: World Vision’s earliest involvement in Bosnia-Herzegovina (BiH) was in 1994. Over the years, WV BiH has re-shaped its ministry from a largely return-focused program to one in alignment with the country’s basic development needs. WV BiH strategic intent is to contribute towards CWB in BiH (child wellbeing). To date, WV BiH works in partnership with communities, local and national government, faith-based institutions and civil society for the well-being of children. WV BiH makes no distinction of faith, ethnicity or gender when delivering its assistance to children and their families. Currently WV BiH employs 80 staff across the country. The overall annual budget for World Vision Bosnia and Herzegovina is around $4.6 million. PURPOSE OF POSITION: To lead the DM&E processes of intentional design and gathering of evidence of programs. This will be done through the...

Words: 1594 - Pages: 7

Free Essay

Hibernate

...Hibernate allows us to do object relational mapping. Simply this mean, conversion of objects derived from java classes inside the application, directly to tables in the database. This will reduce the effort utilized in drawing ER diagrams, normalization (conceptual design) as well as physically writing SQL coding to complete the physical design inside the RDBMS. Hibernate will prevent getting your java code dirty via writing SQL within it. If you use hibernate, no sql within your java application at all. Also hibernate provides:- • Caching of frequently used data record. Its several times efficient than retrieving from the database. • Needn’t opening and closing database connections. This will prevent memory leakage problems • Allow the java application to work with multiple DBMSes. • Small change in the java code will alter the table in the DB. Needn’t dropping the table. • 80% of code reduction in the application program When the required operation was initiated from the application, hibernate is versatile enough to auto generate the required SQL coding Go to this site called www.hibernate.org/downloads After going into the site .. notice some changes Look at the release bundles .. under the release bundle , download the latest version Add those into the library.. all those jar files to the library And then add a xml file and name as hibernate.cfg And then go to project file and search for a file in the name of hibernate.cfg.xml And from that get the...

Words: 309 - Pages: 2

Premium Essay

Efficiency and Collaboration

...beneficial to switch to a more relational database like Microsoft Access. In turn, this will help improve internal communication and help streamline some of the work processes for the sales department. Currently the Party Plates Company uses Microsoft Excel to track personnel data in a spreadsheet inputting small amounts of repetitious data each time a record is created. Although Microsoft Excel and Microsoft Access offer some of the same tools such as applying filters, sorting table data, and extracting information, Microsoft Access a relational database, has features to track actions and events in multiple related tables. It offers more built in tools better to organize, track, and to make a relational structure between the tables by using a common field for the purpose of creating queries, forms, and reports large amounts of data than Microsoft Excel. The Party Plates Company would benefit from the use of converting their personnel data from single Microsoft Excel spreadsheets into a relational database, such as Microsoft Access (2012 Microsoft Corporation). There are many benefits that Party Plates would get from using Microsoft Access. The cost is reasonable to the other databases available; this system permits customization of databases making it possible to manage other functions together in the same area and not have to use more than one database. Microsoft Access prevents the duplication of the same information entered into the database. This will help save time entering...

Words: 720 - Pages: 3

Premium Essay

Test

...| In a database system, a question such as "Find the names of all students who take class ENG210" is called aAnswer | | Selected Answer: |    query | Correct Answer: |    query | | Question 2 4 out of 4 points | | | Protecting the database from unauthorized access or modification is calledAnswer | | | | | Selected Answer: |    data security | Correct Answer: |    data security | | | | | Question 3 4 out of 4 points | | | In a bank, all of the following are examples of end users EXCEPT aAnswer | | | | | Selected Answer: |    database administrator | Correct Answer: |    database administrator | | | | | Question 4 4 out of 4 points | | | A data dictionary can be used toAnswer | | | | | Selected Answer: |    record the database structure | Correct Answer: |    record the database structure | | | | | Question 5 4 out of 4 points | | | The miniworld that is represented in a database is also called theAnswer | | | | | Selected Answer: |    universe of discourse | Correct Answer: |    universe of discourse | | | | | Question 6 4 out of 4 points | | | In the staged database design approach, in what order are the three models developed?Answer | | | | | Selected Answer: |    conceptual, logical, physical | Correct Answer: |    conceptual, logical, physical | | | | | Question 7 0 out of 4 points | | | The process of categorizing objects by identifying...

Words: 773 - Pages: 4

Premium Essay

Strategic Hr

...Query and * Implement database systems. Unit abstract An understanding of: * Database tools and * Database technologies * Database * Complex data structures and interface Databases provide the infrastructure to many organisations and they offer support to key business applications and information systems. The most common database model used commercially is the relational one. The aim of this unit is to: * Provide a knowledge and understanding of database systems, including * Design principles * Practical implementation and development skills for both the system designer and software engineer. The importance of structured query languages should be stressed, in terms of how they can be used to manipulate data and how they are used for a variety of tasks including querying and report writing. On completion of this unit the learner should be able to understand, design, query and implement a database(s). Learners will also have a theoretical insight into the requirement for designing a database that meets a given user or system requirement and that is functional, user friendly and robust. Learning outcomes On successful completion of this unit a learner will: 1. Understand data models and database technologies 2. Be able to design and implement relational database systems 3. Be able to use manipulation and querying tools 4. Be able to test and document relational database systems. Unit content ...

Words: 576 - Pages: 3

Premium Essay

Project

...1.0 Introduction. This chapter of the project report comprises of the background of the study, statement of the problem, general and specific objectives of the research, scope of the study and significance of a computerized records management system. 1.1 Background information. I have much concentration on one of primary school known as kyegera parents primary school. It is one of the many privately owned primary schools in kampala district. This primary school was constructed and started operating in 2006 to offer good education to the young generation in the district and perhaps competite with the rest of the country’s schools. The manual based granding system is the current system used by this education institute as I analyze this system I found that the system was costly in terms of purchasing papers, calculator and minimising error. A computerized granding management system for an education institution is all about simpling stundents granding, securing reports, managing and quick retrieval of data and storage of large volume of data with the help of hard drive and can be kept for long period of time. It also allows deletion and editing of data which cannot be done on paper. 1.2 Problem statement. The institutions current system is mainly manual based granding system which are costly in terms of granding using calculator , storage and securing records from intruder to access them. 1.2.1 General objective. The purpose of this project is to design a computerized...

Words: 8272 - Pages: 34

Premium Essay

Benefits of Using Microsoft Access

...Efficiency and collaboration proposal Benefits of using Microsoft Access Microsoft Access is a database application included in Microsoft Office, which helps businesses to save money. The different components and features make Microsoft access easy to use. The database application is beneficial to the work environment and offers a quick-learning format (Demand Media, Inc., 1999-2012). People can create an operational database in less than one-hour when importing information from other Microsoft Office applications (Demand Media, Inc., 1999-2012).Microsoft Access is capable of taking information from the enterprise software. More than one person can access or use the database at a time. People can add, delete, and update information instantly without the knowledge of programming languages (Demand Media, Inc., 1999-2012). Beginners can use the database wizard to create database objects and relationships that has easy to follow instructions. The database application helps to avoid errors and duplicates of data. The application is compatible with word and excel. There is no database code needed to perform database functions where with other applications a code is required. Microsoft Access has predesigned database templates allowing people to add data immediately without developing a template (Demand Media, Inc., 1999-2012). A business would benefit from Microsoft Access because most businesses grow and collect data over the years. The business can use the application to...

Words: 267 - Pages: 2

Premium Essay

Portfolio Management Database Design

...Stock Portfolio Management The following exercises are designed to provide you more practice with querying an Access database. To begin this exercise, retrieve the file PortfolioManagment.accdb from Blackboard (found in the Learning Module called Databases & Access -> Presentation & Data Files). Open the database file. Design Challenges 1. Open the Client table. How many records does it have? ______ How many fields does it have? ______ 2. What is the primary key for the Client table? 3. Set the primary key for the Stock table. 4. Review the data types assigned to the Stock Purchase table. One data type is incorrect. Please correct the data type and save the change. 5. Set the primary key for the Stock Purchase table. 6. Create a form for the Client table that allows easy entry of a new client. 7. Using your form you just created, add yourself to the Client table. Call the form Client Entry Form. 8. Add your favorite stock to the Stock table. Make up data if you do not know specifically what exchange or current price it trades at. 9. Buy 100 shares of the stock that you just added to the Stock table. Query Challenges 10. Select the Stock table. Create a query called NYSE Stocks that lists all stock tickers traded on the NYSE. The resulting query should be sorted by the stock’s name. 11. Select the Stock table. Create a query called Expensive Stocks that lists all stocks whose stock price is greater...

Words: 437 - Pages: 2

Premium Essay

Iformatio System and Software Applicatio

...Information System and Software Application BIS/219 April 25, 2012 Information System and Software Application There are many types of information systems and software application that an organization uses to run their business. Today organization uses information system and software application to broaden their horizon and allow their business to function at its full capacity. For example, human resources uses the software application to manage employees, were is accounting uses the software application to help manage the company finances and other application that help manage the company on a day- to- day operations, databases; hardware and network are also examples of the information system. Every organization has different and specific duties they must perform. The information systems and Software application is use to run a business in today environment as well as managing every aspect of their business affairs. Also it will help determined how well a business is doing and which direction it is going. Business that takes the opportunity to seek investment in this type of software can help take accurate inventory of their company. Three major organization departments that help runs a company are human resources, marketing, and accounting. Human resources gather the information that relates to the employees and their company. Human resources uses the information system and software applications to help maintain the company, such as hiring, employees...

Words: 733 - Pages: 3

Premium Essay

Databases

...Examples of database and table creation The following examples use the create keyword to create the sample staff database and define the tables. These example OQL statements illustrate the use of the column constraints and the default keyword. Example 1 create database staff; // creates the staff database The following insert defines the managers table. create table staff.managers ( EmployeeID int NOT NULL PRIMARY KEY, Name text NOT NULL, Department text default "Sales", Gender text, Age int, unique ( EmployeeID ) // indicates that the data in the // EmployeeID column must be unique. ); For the managers table: • The EmployeeID and Name columns cannot be NULL. • The EmployeeID column is the primary key and must be unique. • If no value is inserted into the Department column for a given record it takes the value "Sales". Example 2 The following insert creates the staff.employees table. create table staff.employees ( EmployeeID int NOT NULL PRIMARY KEY, Name text NOT NULL, Skills list type text, Gender text, Age int // There is no comma here because this ...

Words: 978 - Pages: 4

Premium Essay

Flix2You

...Summary 3 Scope of Work 4 Project Management 5 Project Resources and Budget 8 User Analysis 10 Organization of Data 14 Database Administration 17 Database Backup and Recovery 19 Legal Issues 22 Works Cited 25 Appendix A – DDL Script 26 Appendix B – Sample Reporting 37 Executive Summary Illuminated Communications offers this solution to meet the growing demands of Flix2You. We understand the limitations of the existing database design and have proposed a new design that will provide Flix2You a more robust database environment intended to capture more customer data.  This will address the primary concerns of Flix2You and allow for the understanding of its customer’s habits that it seeks to gain. Included in this document you will find our scope of work, as it has been determined based on the requirements that have been provided. With that we developed a project plan highlight the major milestones from project start to final sign off. Please note that Illuminated Communications will provide comprehensive testing, training, and support past go live to ensure our solution meet the demands of Flix2You. Understanding Flix2You users is important to our design process. We have included an in-depth user analysis to help us build our system to support the needs of all Flix2You user from upper management personnel to database administrators. Illuminated Communications has several modifications to the infrastructure of the existing systems so Flix2You will...

Words: 5807 - Pages: 24

Free Essay

Internet Databases

...Internet Databases I do support medical information electronically stored on an Internet database because the advantages out weight the disadvantages. A major benefit is if you or a family member gets into an accident, then the ambulance will have access to yours or a family member’s information. This can save your life because if you cannot remember or unresponsive, then the information will already be in the database. Maybe you are out of town on business and you go to the hospital, then the hospital staff can have access to you information (Macdonald, 2007).  Having all your information in the database can help to make sure you are not given the wrong medication, which this can cause serious health problems and even death. Also, this can make it easier for the medical staff to retrieve your information as soon as possible, so you can receive the best medical care. Not have the database can lead to more deaths and medical mistakes because it can take longer for the medical staff to get your information. The disadvantages of the database would be if others were reading you information without your knowledge or consent. With having information stored on the Internet database can steer people to pay for the information, the records getting exchanged because of blackmail, or the information getting stolen. Since there are many hackers that can get into the Internet database and they can get the information to sell them to anyone. Having people reading your information...

Words: 326 - Pages: 2

Premium Essay

Student

...Alfredo Cruz Triana March 12, 2014 * What are the two major components of SQL and what functions do they serve? To answer this question we first have to understand what is SQL and how is it important for computer programming. Based on the information I found researching on this subject, SQL is nothing more than a database programming language designed for managing data held in a relational database management system also know as RDBMS. SQL also became a standard of the American National Standards Institute (ANSI) in 1986, and of the International Organization for Standardization (ISO) in 1987. One of the major components of SQL is the data definition language or DDL, which manages table and index structure. This component is simply used for defining the database structure. DDL are the create, alter, rename, drop, and truncate statements which will be better explained in another question of this assignment. The other major component is data manipulation language or DML, which is used for retrieving and updating data. Said component is the subset of SQL also used to add and delete data with the use of insert, update, delete, and merge. This database language is immensely useful in the field of computer engineering. Managing data is one of the many important tasks an engineer will have to perform in his or her career. Obtaining this knowledge will ensure a much successful career for years to come. * What are the advantages and disadvantages of SQL? Like everything...

Words: 675 - Pages: 3

Premium Essay

A Survey of Sql Injection Defense Mechanisms

...A Survey of SQL Injection Defense Mechanisms Kasra Amirtahmasebi, Seyed Reza Jalalinia and Saghar Khadem Chalmers University of Technology, Sweden akasra, seyedj, saghar{@student.chalmers.se} Abstract SQL Injection Attack (SQLIA) is a prevalent method which makes it possible for the attackers to gain direct access to the database and culminates in extracting sensitive information from the firm’s database. In this survey, we have presented and analyzed six different SQL Injection prevention techniques which can be used for securing the data storage over the Internet. The survey starts by presenting Variable Normalization and will continue with AMNESIA, Prepared statements, SQL DOM, SQLrand and SQLIA prevention in stored procedures respectively. that determining whether a SQL statement is allowable or not is done by checking the existence of normalized statement in the ready-sorted allowable list. 2.1. Background Many web pages ask users to input some data and make a SQL queries to the database based on the information received from the user i.e. username and passwords. By sending crafted input a malicious user can change the SQL statement structure and execute arbitrary SQL commands on the vulnerable system. Consider the following username and password example, in order to login to the web site, the user inputs his username and password, by clicking on the submit button the following SQL query is generated: SELECT * FROM user_table WHERE user_id = ‘john’ and password...

Words: 5643 - Pages: 23