Premium Essay

Database Unit 1 Lab 1

In: Computers and Technology

Submitted By AHertzler
Words 447
Pages 2
Lab 1 1. A collection of information accessible from a computer or server 2. DBMS is a Database Management System that organizes information internally. 3. Dbms stores information, spreadsheet runs formulas 4. Product | Use | Where it was used | Cost | DB2 | Open database environment | A small single-user application to a large multi-user system. | $598 + $99 additional user | Microsoft Access | Relational databases that have tables of data. | Software developers and data architects | $199 (Amazon) | Microsoft SQL Server | primary function is to store and retrieve data as requested by other software applications | workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users | Vary (Different Prices for different purposes) | Filemaker Pro | database engine with a GUI-based interface | ??? | $329.00 | Oracle | transfer any customer info from one location to any other in the world | larger organizations and small chain stores | ??? (Couldn’t find anything) | Mysql | database for use in web applications | Personal and commercial use | $2k-$10k/year |

5. “DBMS stands for database management system whereas RDBMS stands for relational database management system; these softwares are created to maintain and utilize large scale collection of data in an efficient manner.” http://www.differencebetween.info/difference-between-dbms-and-rdbms 6. 290 7. Peng J Wu 8. Footlocker: Employee ID, VIP ID, VIP Purchase $, Sku # Sold, Hookup %, … 9. Sean 10. Nouns | Major Topic | Hospital | Patient | Depression drug | Drug | 20 doctors | Depression level | 400 patients | Appetite | Prozac or new drug | Sleeping | Test supervisor | Activities | 18 months | Physical side effects | Twice a month | Blood pressure | Increased depression | Blood test |

Similar Documents

Premium Essay

Unit 1 Lab 1.1 - 1.4 Pt2520

...Mark Henry Salvador PT2520 Nyguen Unit 1 Lab 1.2 Nouns | Major Topics | Doctors | Each doctor must have their own database for their own patients. | Patients | Each patient will require a database of information (depression state, eating, sleeping, physical and internal problems) for each time they visit twice a month for 18 months. | Drugs | Will need a way to see which patients will receive the drug and the traditional drug. | Supervisor/Researchers | Keep track of every drug that is being hand out. Researchers will need a way to keep data into a neat database so that they can see every bit of information that is required including doctor notes and which drug is being given to each patient. | Mark Henry Salvador PT2520 Nyguen Unit 1 Lab 1.3 Major Topics Requirement to track its software Licensing scheme Installation and uninstallation of software Must have a copy of software available If it must be purchased, it has to be bought History: Law requires that any business, including a school, track its software. It is important to know what software the school owns, in what versions, and what the license agreement for that software is. Scope: A database will insure that you have information on important legal and personal documentation of accounts. Objective: Create a way to track the software that is currently being installed, uninstalled and bought for faculty, staff computers, and software. Preliminary Timeline: 1st week: Figure out the...

Words: 339 - Pages: 2

Premium Essay

Lab 1

...Unit 1 Labs Lab 1.1 Step 13 Lab 1.2 Define Major Topics for a Database NOUNS | MAJOR TOPIC | Doctors | Patients | Drugs | Side Effects | Researchers | Patient Information | Westlake Research Hospital | Conducting test of new Depression Drugs | Lab 1.3 Create a Statement of Work Scope The Software-Tracking database will be used to help manage the school’s software licensing. The software will be monitored for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be tracked for which version and licensed copy of software is currently running on each system. Constraints The database can be used for accessing the faculty and staff’s logon to the school employee website for the purpose of inputting and updating hours worked. Faculty and staff members can conduct business related work, such as adjusting work schedules, and student’s grades in the system but are not able to view student’s personal files in the registrars system. Objectives * Make for a more efficient system by allowing employees to have control of shared calendars and student’s grades. * Improve the tracking of Software Licensing and the Lifecycle of programs. Tasks and Timeline 1. Gathering Data: Meet with School Board and those involved to discuss the needs and wants for a database. Time Allotted: 3 weeks. Deliverables: A list of interviews...

Words: 365 - Pages: 2

Premium Essay

It Project Management

...Development) • (Web Systems Development) BSc/BSc (Hons) Information Technology Management for Business BSc (Hons) Computer Games (Design) BSc/BSc (Hons) Cyber Security and Networks BSc/BSc (Hons) Networked Systems Engineering IT PROJECT MANAGEMENT 1 module code M3G405252 MODULE HANDBOOK – TRIMESTER A SESSION 2015/2016 Module Code: M3G405252 Module Title: IT PROJECT MANAGEMENT 1 Standard Module Abbreviation: ITPM1 Module Level: 3 Credit Points: 20 Module Leader: Edwin Gray, Office: M609, email:e.gray@gcu.ac.uk September 2015 Issue 1 01/09/2015 Edwin M Gray, BA, MSc, MBCS, CITP, CPSSADM Contents Page 1 Introduction 3 2 Module Overview 3 3 Module Descriptor 4 4 Module Assessment 7 5 Feedback 10 6 Indicative Reading 10 7 The Library, Saltire Centre 11 8 Learning Material Supplied By Module Leader 12 9 Module Delivery Structure 12 10 Learning and Teaching Plan 14 M3G405252 IT PROJECT MANAGEMENT 1 INTRODUCTION This handbook gives details of the module content, teaching schedule, recommended reading, assessment and feedback strategies used for students undertaking the module IT Project Management 1 (M3G405252 (old code: COMU350) Module Leader contact details: Eddie Gray, M609, (e.gray@gcu.ac.uk) Programmes Taking This Module This module’s host programmes are: • P01627 BSc/BSc (Hons) Computing (Information Systems Development) • P00249 BSc...

Words: 3307 - Pages: 14

Premium Essay

It- 3rd Year

...E-COMMERCE (TIT-501) UNIT I Introduction What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston...

Words: 2913 - Pages: 12

Premium Essay

Wk 3 Lab

...Week 3 Lab Part 1: Web and Database Attacks & Malware and Malicious Software Learning Objectives and Outcomes Upon completing this lab, students will be able to: * Identify web application and web server backend database vulnerabilities as viable attack vectors * Develop an attack plan to compromise and exploit a web site using cross-site scripting (XSS) against sample vulnerable web applications * Conduct a manual Cross-site Scripting (XSS) attack against sample vulnerable web applications * Perform SQL injection attacks against sample vulnerable web applications with e-commerce data entry fields * Mitigate known web application and web server vulnerabilities with security countermeasures to eliminate risk from compromise and exploitation Overview This Lab will demonstrate a Cross-site Scripting (XSS) exploit and an SQL Injection attack on the test bed web application and web server using the Damn Vulnerable Web App (DVWA) loaded on an Apache Web Server on “TargetUbuntu01” Linux VM server. They will first identify the IP target host, identify known vulnerabilities and exploits, and then attack the web application and web server using XSS and an SQL Injection to exploit the web application using a web browser and some simple command strings. Assignment Requirements Watch the Demo Lab in Learning Space Unit 5 and then answer questions 1-10 below. Lab Assessment Questions & Answers 1. Why is it critical...

Words: 1054 - Pages: 5

Premium Essay

Srs for Lgu System

...com Lab Section: Lab Instructor: Date: AB-5L Andrel Del Rosario January 11, 2012, Wednesday Software Requirements Specification for Assessment Page ii Contents IN THIS TEMPLATE YOU WILL FIND TEXT BOUNDED BY THE “” SYMBOLS. THIS TEXT APPEARS IN ITALICS AND IS INTENDED TO GUIDE YOU THROUGH THE TEMPLATE AND PROVIDE EXPLANATIONS REGARDING THE DIFFERENT SECTIONS IN THIS DOCUMENT. THERE ARE TWO TYPES OF COMMENTS IN THIS DOCUMENT. THESE COMMENTS THAT ARE IN BLACK ARE INTENDED SPECIFICALLY FOR CMSC128. THESE COMMENTS THAT ARE IN BLUE ARE MORE GENERAL AND APPLY TO ANY SRS. PLEASE, MAKE SURE TO DELETE ALL OF THE COMMENTS BEFORE SUBMITTING THE DOCUMENT. .................................................................................................................................III THE EXPLANATIONS PROVIDED BELOW, DO NOT COVER ALL OF THE MATERIAL, BUT MERELY, THE GENERAL NATURE OF THE INFORMATION YOU WOULD USUALLY FIND IN SRS DOCUMENTS. IT IS BASED ON THE IEEE REQUIREMENTS AND WAS ADAPTED SPECIFICALLY FOR THE NEEDS OF SOFTWARE ENGINEERING COURSES. MOST OF THE SECTIONS IN THIS TEMPLATE ARE REQUIRED SECTIONS, I.E. YOU MUST INCLUDE THEM IN YOUR VERSION OF THE DOCUMENT. FAILURE TO DO SO WILL RESULT IN MARKS DEDUCTIONS. OPTIONAL SECTIONS WILL BE EXPLICITLY MARKED AS OPTIONAL. IF YOU HAVE ANY QUESTIONS PLEASE CONSULT WITH YOUR LAB INTRUCTOR.> ................................................................................................................................III 1 INTRODUCTION...

Words: 2799 - Pages: 12

Premium Essay

Nt1230 Syllabus

...5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus ...

Words: 1834 - Pages: 8

Premium Essay

Data Communication and Networking

... | |1 |MC9231 |Computer Networks |3 |0 |0 |3 | |2 |MC9232 |Microprocessors and its |3 |0 |0 |3 | | | |Applications | | | | | |3 |MC9233 |Software Engineering |3 |0 |0 |3 | |4 |MC9234 |Computer Graphics |3 |0 |0 |3 | |5 |MC9235 |Web Programming |3 |0 |0 |3 | |PRACTICAL | |6 |MC9237 |Graphics Lab |0 |0 |3 |2 | |7 |MC9238 |Microprocessor Lab |0 |0 |3 |2 | |8 |MC9239 |Web Programming Lab |0 |0 |3 |2 | | TOTAL |15 |0 |9 |21 | MC9231 COMPUTER NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Communication...

Words: 1592 - Pages: 7

Free Essay

Securing Linux Lab Assignment

...Week 3 Lab This lab consists of two parts. Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Harden Linux server services when enabling and installing them, and keep a security perspective during configuration * Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened before hosting a web site * Configure and perform basic security for a MySQL database, understanding the ramifications of a default installation and recommending hardening steps for the database instance * Install, setup and perform basic security configuration for Sendmail to be able to leverage the built-in messaging capabilities of the Linux System * Enable and implement secure SSH for encrypted remote access over the network or across the Internet of a Linux server system Overview This lab is an extension of the previous hands-on labs, and it incorporates security hardening for Linux services and applications loaded in the physical server. This demonstration will configure security and hardened services...

Words: 2020 - Pages: 9

Premium Essay

Organizational Innovation at Sap Labs India

...Organizational Behaviour-II Project On Organizational Innovation at Submitted to Prof. Manish Kumar Submitted by Section C Group: 6 PGP/16/128- Anand Ganesh Patil PGP/16/149- Irshad Anwar PGP/16/150- Mohamed Anas PGP/16/155- Prabhu P PGP/16/159- Ram Kumar Venkatesh PGP/16/171- Shyam Prasath B Organizational Behaviour-II Acknowledgement We would like to thank our Organizational Behaviour-II Professor Prof Manish Kumar for guiding us throughout the project and providing valuable inputs. We would also like to thank the employees and management of SAP Labs India Pvt. Ltd., Bangalore for extending their help to understand the organization and providing us valuable insights about the innovation and change process in SAP. 1|Page Organizational Behaviour-II Table of Contents 1. 2. 3. 4. 5. 6. 7. 8. 10. 11. 12. 13. An Overview of the Company ............................................................................................ 3 The Dilemma ...................................................................................................................... 3 Need for Innovation ............................................................................................................ 4 Organizational Innovation .................................................................................................. 4 Technological Changes....................................................................................................... 5 Products & Services...

Words: 2762 - Pages: 12

Premium Essay

Healthinfo Technology

...Weekly Overview Week 1 Overview It is important to understand what a health record is and the different components that comprise a health record. There are many different types and purposes of healthcare records. No matter what type of health record it is, the healthcare record will assist the healthcare provider with patient care. An electronic health record (EHR) is a health record that is stored electronically on a healthcare information system. Electronic health records make it easier for healthcare providers to access and search for patient information quickly, by using a computer network to access the EHR and find specific information. This week, you will identify the purpose and main components of an electronic health record database. A database allows you to store and search data. Knowing the different components of a database and how the database stores, searches, and presents data will help you understand how information systems store and use health information within the healthcare industry. What you will cover 1. Fundamentals of information systems and databases Information systems are used in healthcare to manage and organize patient information. The different information systems used within the healthcare facility must be linked to share information between departments. The structure that holds the collection of data is referred to as the database. a. Explain the difference between computer hardware and software. 1) Hardware is what can be...

Words: 556 - Pages: 3

Premium Essay

Policing

...officers work. Police agencies benefit tremendously from computers in accessing criminal and fingerprint databases, reporting offenses electronically, using GPS systems to track calls and speeding up forensics work. 1. Police Databases o Police use two main types of databases. Fingerprint databases allow forensics teams to run fingerprints found at a crime scene against prints in the system. These prints may be on file because of a person's criminal history or because of that person's job or licensing requirements. Though the database is not immediate, the process is faster than a lab worker comparing one-by-one. Police officers also use criminal databases, which show people arrested, indicted and convicted of various crimes. These databases allow for easier tracking of serial crimes and for identification of potential suspects. Offense Reports o Inputting offense reports is a time-consuming part of an officer's job. Much of the information is repetitive but must be completed. By having software programs for filing incident or offense reports, officers can cut out the time they spend on administrative tasks and focus on field work instead. GPS Tracking o GPS units in patrol cars allow officers to input addresses when calls come in. Rather than searching in the dark or trying to memorize an entire precinct, the officers can get the directions from the GPS unit. These units make police response times faster, which in turn keeps the streets safer. Forensics Work o Forensics...

Words: 1449 - Pages: 6

Premium Essay

Sql Lab 4

...MET CS 669 Database Design and Implementation for Business SQL Lab 4 Instructions: Procedural SQL Objective  The objective of this lab is to teach you how to develop and use basic stored  procedures and triggers the procedural language of your chosen DBMS.  Prerequisites  Before attempting this lab, it is best to read the textbook and lecture material  covering the objectives listed above. While this lab shows you how to create and use  these constructs in SQL, the lab does not explain in full the theory behind the  constructs, as does the lecture and textbook.    The second section in this lab builds on Lab 3. It is best to complete Lab 3 first before  completing the second section in this lab.  Required Software  The examples in this lab will execute in modern versions of Oracle and Microsoft SQL  Server as is. Note that the first section in this lab has syntax specific to each DBMS,  and you will need to complete the version for the DBMS you are using. If you are  using a different RDBMS, you may need to modify the SQL for successful execution.  Saving Your Data  If you choose to perform portions of the assignment in different sittings, it is  important to commit your data at the end of each session. This way, you will be sure  to make permanent any data changes you have made in your curent session, so that  you can resume working without issue in your next session. To do so, simply issue  this command:    COMMIT; Data changes in one session will only be visible only in that session...

Words: 6758 - Pages: 28

Free Essay

The Paper

...OPERATIONS ORDER | primary client NAVISION #: 100725 | |CLIENT: Albert Einstein College of Medicine |CONTACT: Melanie Brown | |1300 Morris Park Ave |Assistant Administrator | |Bronx, NY 10461 |718-430-4152 | | |Email: Melanie.brown@einstein.yu.edu | |SECONDARY CLIENT #: (Location & Contact) | |NAVISION #: 151776 | |1300 Morris Park Ave | |Bronx, NY 10461 | | ...

Words: 4459 - Pages: 18

Free Essay

Text to Speech

...Running head: Text to Speech Text to Speech Technology Professor: ABSTRACT Text to speech approaches towards adding expressivity to machines is an important field being researched and worked on these days. This paper presents an overview of speech synthesis approach, its applications and advancements towards modern technology. It begins with a description of how such systems work, examines the use of text-to-speech software and try to apply this technology to the DMCS project for evidence of benefits of text to speech applications for people engaged in different fields and the level of accuracy that can be expected. Applications of speech synthesis technology in various fields are then explored. The document concludes with potential uses of speech to text in various fields, likely main uses of the technology in the future. TEXT TO SPEECH – INTRODUCTION A Text-To-Speech (TTS) synthesis is a widely used technology that should be able to read any text aloud, whether it was directly introduced in the computer by an operator or scanned and submitted to an Optical Character Recognition (OCR) system. Let it be more precise, systems that simply concatenate isolated words or parts of sentences, denoted as Voice Response Systems, are only applicable when a limited vocabulary is required (typically a few one hundreds of words), and when the sentences to...

Words: 4138 - Pages: 17