Free Essay

Case Study on Database Management

In: Computers and Technology

Submitted By sujithrao
Words 842
Pages 4
1). Please review the attached data model and answer the following questions.

A. Entity:
Entities are the building blocks of relational database design. An entity can be a real world object which exists actually or hypothetically has certain multiple attributes or properties which may be assigned values. An entity is a person, place, thing, event or conceptual object. An entity that will have many instances in the database. In given example Customer, booking, vehicle, Booking status, Vehicle category, Model, Manufacturer are entities. B. Attributes:
Attribute is the characteristics or properties that an entity possesses. Attribute often corresponds to field in a table * Simple attribute − Each entity has a single value for the attribute, which cannot be partitioned further. For example customer_Id, booking_id, reg_Vehicle. * Composite attribute − Composite attributes are made of more than one simple attribute. For example, a customer complete name may have first_name, middle_name and last_name. * Derived attribute − Derived attributes are the attributes that do not exist in the physical database, but their values can be computed from other attributes present in the database. For example, age can be derived from date_of_birth. * Single-value attribute − Single-value attributes contain single value. For example –payment_received_yn. * Multi-value attribute − Multi-value attributes may contain more than one values. For example, a customer can have more than one phone number, email_address, etc. C. RELATIONSHIP: A relationship exists between two or more entities. One entity has primary key that refers to another entity foreign key. a. One-to-One: Each entity in the relationship will have exactly one related entity. For example, if each customer in a database is associated with one mailing address. b. One-to-Many: An entity on one side of the relationship can have many related entities, but an entity on the other side will have a maximum of one related entity. For example, a single customer might place an order for multiple products. The customer is associated with multiple entities, but all those entities have a single connection back to the same customer. c. Many-to-Many: Entities on both sides of the relationship can have many related entities on the other side. For example, at a automobile company where all agents work with multiple customers, each agent is associated with multiple customers, and multiple customers might also be associated with multiple agents.

Relations from above diagram: 1. Customer can do zero or more Bookings. 2. Booking Status has zero or more Bookings. 3. Vehicles have zero or more Bookings. 4. Booking contains one and only one Customer. 5. Booking has only one Booking Status. 6. Vehicle has one and only one Vehicle Category. 7. Vehicle Category has zero or more Vehicles. 8. Vehicle has unique(one and only one) Model. 9. Model has zero or more Vehicles. 10. Model is manufactured by only one manufactured. 11. Manufacturer will manufacture one or more Models. D. PRIMARY KEY: Primary key is a key of a relational database that is normal attribute that is guaranteed to be unique. It may consist of attribute or blend of attributes. For example customer_id, booking_id, reg_number, model_code. 1. Review data models at the attached website (see resources Select a basic data model from this website. Provide a graphic of the data model and identify the following information: a. Entities b. Attributes c. Relationships d. Primary keys

a. Entities: Person, Vehicles, Persons_in_incidents, Mobile_Data, Address_Types, Incident, Vihecles_in_Incidents, Location, Addresses, Person_Addresses b. Attributes: person_id,gender,first_name, middle_name,last_name, country, other_address_details, date_address_to, date_address_from, location_id. address_id, person_address_id, incident_id, vehicle_reg_nr, address_type_code etc,. c. Relationships 1. Person may have zero or more Person_Addresses. 2. Address_Types will have zero or more Person_Addresses. 3. Person_Addresses may belong to one and only one Person. 4. Person_Addresses may have one and only one Address_Types. 5. Addresses will have zero or more Person_Addresses 6. Person_Addresses has unique Addresses. 7. Incident may have zero or many Vihecles_in_Incidents. 8. Vihecles_in_Incidents occurred in one and one Incident. 9. In one Location zero or many Incidents occurs. 10. Incidents occurs at one and only one Location. 11. Vihecles_in_Incidents contains in one and one vehicle. 12. Vihecles are damaged zero or more at Vihecles_in_Incidents. 13. Incident may have zero or more Persons_in_Incidents 14. Persons_in_Incidents are injured in one Incident. 15. Persons injured zero are more in Persons_in_Incidents. 16. Persons_in_Incidents injures one person. e. Primary keys: person_id, location_id. address_id, person_address_id, incident_id, vehicle_reg_nr, address_type_code.

3.Provide three advantages/reasons to develop a data model.
Data model are communication tools. There advantages are
a. Structural independence is promoted by the use of independent tables. Changes in a tables structure do not affect data access or application programs.
b. Tabular view generously enhances conceptual simplicity, thereby promoting easier database design, implementation, management and use.
c. To avoid redundancy through which we improve quality of accuracy.

Data Structures And Algorithms. (n.d.). Retrieved January 20, 2016, from Entity is something that has certain attributes of properties which may be assigned values.&source=bl&ots=Cuw3S1XEOP&sig=L7XyLhRelLYzaTLlCHabZtnb-58&hl=en&sa=X&ved=0ahUKEwjQoPiDtLfKAhWD

Similar Documents

Premium Essay

Database Management System Case Study

...Question 1 1.1 A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. A DBMS generally manipulates the data itself, the data format, field names, record structure and file structure. It also defines rules to validate and manipulate this data. A DBMS relieves users of framing programs for data maintenance. Fourth-generation query languages, such as SQL, are used along with the DBMS package to interact with a database. Examples of Database Applications The following are examples of database applications: • Computerized library systems • Automated teller machines • Flight reservation systems • Computerized parts inventory systems 1.2 Advantage Disadvantage Controlling...

Words: 1326 - Pages: 6

Premium Essay

Database Management And Information Retrieval System Case Study

...Differentiate between database management system and information retrieval system by focusing on their functionalities. (30 marks). Database management system Information retrieval system Main software in computer system Obtain resources to the information relevant Offer Data modelling Facility Restricted to classify of object Structured data format Unstructured data format Provide precise semantics Provide imprecise semantics Complete of query specification Incomplete of query specification Data dictionary system management Item normalization Data transformation and presentation Document database search Backup and recovery management Index database search Data store management Selective dissemination of information...

Words: 1137 - Pages: 5

Premium Essay

Management Information System Case Study on Terrorists Watch List Database

...From this case study we have found out that combined efforts towards counter terrorism are being made by various agencies by creating a terrorist watch list. Terrorist Screening center or TSC is the organization created to organize and standardize information about suspected terrorist from various government agencies such into a single list. Records there only contain sensitive but unclassified information about the suspects. The database is daily updated with new nominations, modification and deletion. Various agencies that provide the valuable information to TSC are FBI, CIA, National Security Agency, Transportation security administration, Department of Homeland Security, State Department, Customs and Border Protection, secret service, U.S. Marshall Service, and the Whitehouse airlines. The unification of various terrorism databases has been a huge step towards combating terrorists, the project has been quite slow in implementing itself to its full potential as information from 12 different agencies provides them with large amount of data and the TSC has not been able to process it all. Besides the huge database the modification made daily also makes it hard for them in the integration process. Even though this step makes great difference in countering terrorism, it still has many drawbacks that affect the innocent public too.   Reports from both the government accountability office and the office of the inspector general assert that the watch list contains several......

Words: 288 - Pages: 2

Premium Essay


...BCO1102 Information Systems for Business 2014 Semester 1 Prepared by Paul Darbyshire Prepared by Paul Darbyshire Welcome Welcome to BCO1102 Information Systems for Business for Semester 1, 2014. For the vast majority of you it will be a compulsory unit of study as it is part of the Business Core in all undergraduate Bachelor of Business degrees. The major focus of this unit is on how computer- based information systems can support decision making in organizations and businesses. Those decisions often need to be made by professionals who come from discipline areas you are studying such as accounting, management, information systems or marketing. One of the most important elements of an information system is people, so all of us need to know what role we can play and what role information and communication technologies (ICT) can play in supporting decisions. This unit will look at the theoretical side of information systems as well as personal productivity tools such as spread sheets and databases. In addition we will look at global trends in information systems and in particular the emerging use of Cloud Computing and Social Networking, which is sometimes called Web 2.0. The unit of study requires the textbook Introduction to Information Systems by Rainer, Prince and Cegielski 5th Edition. The textbook is used for the theory and some of the practical work in tutorials. All reading for this subject during the semester is assigned from this textbook. Feedback from......

Words: 3033 - Pages: 13

Premium Essay


...Portada Management information systems managing the digital firm Part One. Organizations, Management, and the Networked Enterprise ....1 Chapter 1. Managing the Digital Firm ....2 Opening Case: DaimlerChrysler's Agile Supply Chain ....3 1.1 Why Information Systems? ....4 Why Information Systems Matter 4 • How Much Does IT Matter? 6 • Why IT Now? Digital Convergence and the Changing Business Environment ....7 1.2 Perspectives on Information Systems ....13 What Is an Information System? ....13 Windows on Organizations: Cemex: A Digital Firm in the Making ....14 Window on Technology: UPS Competes Globally with Information Technology ....17 It Isn't Just Technology: A Business Perspective on Information Systems 18 • Dimensions of Information Systems ....20 1.3 Contemporary Approaches to Information Systems ....25 Technical Approach 26 • Behavioral Approach 26 • Approach of This Text: Sociotechnical Systems ....27 1.4 Learning to Use Information Systems: New Opportunities with Technology ....27 The Challenge of Information Systems: Key Management Issues 28 • Integrating Text with Technology: New Opportunities for Learning ....30 Make IT Your Business ....31 Summary, 31 • Key Terms, 32 • Review Questions, 32 • Discussion Questions, 33 • Application Software Exercise: Database Exercise: Adding Value to Information for Management Decision Making, 33 • Dirt Bikes USA: Preparing a Management Overview of the Company, 33 • Electronic Commerce Project:......

Words: 3823 - Pages: 16

Premium Essay

Laudon Ch5

...Management Information Systems MANAGING THE DIGITAL FIRM Kenneth C. Laudon New York University f Jane P. Laudon Azimuth Information Systems PEARSON feerttifie tall Pearson Education International Brief Contents Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Part One Project Organizations, Management, and the Networked Enterprise 1 Information Systems in Global Business Today 2 Global E-Business: How Businesses Use Information Systems 38 Information Systems, Organizations, and Strategy 80 Ethical and Social Issues in Information Systems 124 Analyzing Business Processes for an Enterprise System 165 Part Two Chapter 5 Chapter 6 Chapter 7 Chapter 8 Part Two Project Information Technology Infrastructure 167 IT Infrastructure and Emerging Technologies 168 Foundations of Business Intelligence: Databases and Information Management 222 Telecommunications, the Internet, and Wireless Technology 260 Securing Information Systems 312 Creating a New Internet Business 351 Part Three Chapter 9 Chapter 10 Chapter 11 Chapter 12 Part Three Project Key System Applications for the Digital Age 353 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 354 E-Commerce: Digital Markets, Digital Goods 388 Managing Knowledge 428 Enhancing Decision Making 470 Designing an Enterprise Information Portal 508 Part Four Chapter 13 Chapter 14 Chapter 15 Part Four Project Building and Managing Systems 509 Building Systems 510 Project......

Words: 3508 - Pages: 15

Premium Essay

Mis 301

...MIS 301 Introduction to Information Technology Management FALL 2010 - Unique Numbers: 03905, 03910, 03915 Instructor tructorBin Gu – Dr. Information, Risk, & Operations Management (IROM) Dept. Office CBA 5.228 Office Hours MW 4:00-5:00 pm or by appointment Qian Tang - Teaching Assistant CBA 1.308B Office TBD Office Hours Course Description Information technology (IT) has transformed all aspects of 21st century business and everyday life. New IT investments continue to be staggering. Worldwide, over $2.5 trillion is invested in IT. In the U.S., over 50% of capital expenditures are related to IT. Information systems influence business processes, organizational structures, and the ways people do business, work, and communicate. Emerging technologies have triggered new forms of organization and business process innovation; they have also impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a...

Words: 3229 - Pages: 13

Premium Essay

Paroll and It

...International Journal of Computer Science and Business Informatics IJCSBI.ORG An Efficient Connection between Statistical Software and Database Management System Sunghae Jun Department of Statistics, Cheongju University Chungbuk 360-764 Korea ABSTRACT In big data era, we need to manipulate and analyze the big data. For the first step of big data manipulation, we can consider traditional database management system. To discover novel knowledge from the big data environment, we should analyze the big data. Many statistical methods have been applied to big data analysis, and most works of statistical analysis are dependent on diverse statistical software such as SAS, SPSS, or R project. In addition, a considerable portion of big data is stored in diverse database systems. But, the data types of general statistical software are different from the database systems such as Oracle, or MySQL. So, many approaches to connect statistical software to database management system (DBMS) were introduced. In this paper, we study on an efficient connection between the statistical software and DBMS. To show our performance, we carry out a case study using real application. Keywords Statistical software, Database management system, Big data analysis, Database connection, MySQL, R project. 1. INTRODUCTION Every day, huge data are created from diverse fields, and stored in computer systems. These big data are extremely large and complex [1]. So, it is......

Words: 2685 - Pages: 11

Premium Essay

Data Warehousing in Universities

...of Nairobi within the Context of Relational Online Analytical Processing (Data Analysis) PRESENTED BY: 1.  JORAM KIPLIMO D61/68960/2013 0724431978 . PRESENTED TO: Dr. Muranga Njihia Word count: 2752 ABSTRACT Data ware housing is a booming industry with many interesting research problem. The data warehouse is concentrated on only few aspects. The discussion here is about the data warehouse design and usage in the case of the University of Nairobi Environment. Data warehouse can be built using a top-down approach, bottom – down approach or a combination of both. In this research paper we are discussing about the data warehouse design process. Data Warehouse (DWH) systems are used by decision makers for performance measurement and decision support. Currently the main focus of the DWH research field is not as much on the interaction of the DWH with the organization, its context and the way it supports the organization’s strategic goals, as on database issues. The aim of the study is to emphasize and describe the relationship between the DWH and the organization with conceptual models, and to use this knowledge to support data interpretation with business metadata. KEYWORDS Data Warehouse (DWH) Data Mart Extraction, Transformation and Loading (ETL); Software that is used to extract data from a data source like a operational system or data warehouse, modify the data and then load it into a data mart, data warehouse or......

Words: 2816 - Pages: 12

Premium Essay

Case Analysis

...Sources of Information for Case Writing and Analysis The primary sources for case study research are the University Library and the Worldwide Web. A summary of their resources is listed below. I. The University Library The typical University library provides a valuable collection of databases useful for both primary and secondary data collection on a company or industry. Some of the leading information databases are as follows: 1. Macro-Level Industry Information - Standard and Poor’s Industry Surveys Quarterly - U.S. Industrial Outlook - Value Line Industry Survey - Corporate and Industry Research Reports - Guide to the Economic Censuses and Related Statistics - Market Share Reporter 2. Company-level information - Moody’s manuals for financial information - Standard and Poor’s Corporation Records Current Issues - Hoover’s Guides and Handbooks on companies - Dow Jones News Retrieval - Annual Reports and other Corporate Documents - SEC File - EDGAR PLUS - Stock Brokerage Reports (Investex, Corporate and Industry Research Reports) Besides the above sources of information, the library commonly provides an online database on industry and company related information. The ALADIN software, for example, provides a guided menu to explore these databases. Two prominent sources on ALADIN are: ABI/Information on Business & Management and the Business and Industry database. These databases provide search driven abstracts and articles. II. The Worldwide Web While the library......

Words: 650 - Pages: 3

Premium Essay


...usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner,, – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case Study: • What information systems we are talking about… • Stake holders for this system • Involvement of stakeholders in SDLC • Systems Design activities • Design decisions • What are the alternatives for H/W, O/S, Database, PL decisions • Outputs of each Design phase • Project Management activities in SDLC/ Systems design •...

Words: 1598 - Pages: 7

Premium Essay


...DATABASE DESIGN Research Paper You are to write a research paper about an approved topic in the field of Information Technology (IT) Management, preferably in the area of Database Systems. The topic must be of current interest to the IT professionals. The deadline for the topic approval is September 20. You must turn into me one page (single-spaced) ‘Abstract’ of your paper by that date. A partial list of journals which publish articles pertaining to the IT area is attached. These publications are some of the source for your research work. Your paper must be between 12 and 15 pages of typed, doubled-spaced text, not including your references and any appendices or attachment. Plagiarism will result in a grade of zero. Your research paper is due on November 29. It will be graded according to the criteria on the attached page Suggested Structure of Research Paper Abstract: Half-page (single spaced) summary of the paper I. Introduction: - Problem Background -Problem Importance - Purpose and contents of this paper i. Target audience of the paper ii. Overall objective iii. Within the overall objective, the specific issues or question addressed in the paper iv. A precise statement of the content of the paper v. Scope and limitation of the paper vi. Usefulness of the paper - How would the target......

Words: 1103 - Pages: 5

Premium Essay

On the Development of Comprehensive Information Security Policies for Organizations

...information that will support my future research and provide experience in garnering and explaining the salient tenants of research material. NOTE: This paper will not include proper APA formatting as citations have been bolded to ensure the professor can discern where citations begin and end. Curtis, S. K. (2012). Commitment to cybersecurity and information technology governance: A case study and leadership model. (Doctoral dissertation). Retrieved from the ProQuest dissertation and thesis database. (UMI No. 3569139) The problem as described by the author in this quantitative study is senior managers are not using web analytic technology (WAT) and there is a lack of literature describing why this is the case. The purpose of this study is to “examine how management consultants perceive WAT” (p. 22). This study has seven hypotheses. Unified theory of acceptance use of technology (UTAUT) is the conceptual framework utilized by the author. The author utilized UTAUT with independent variables of social norm, performance expectancy and effort expectancy, facilitating condition and management consultants’ behavioral intention to accept WAT and the moderators of gender, age and experience to capture behaviors related to the intention to use information technology. There...

Words: 3359 - Pages: 14

Premium Essay

Integrated Case Study: Bandon Group Inc

...Integrated Case Study: Bandon Group Inc. Monique Davis Strayer University Dr. Stephen Huber 1-20-13 The Bandon Group Inc. is a family own company that is a distributor of copiers, electronic printers, faxes and other equipment. The company’s competition includes IBM and Xerox. Bandon Inc. has four divisions located in the western parts of the United States in states such as Salt Lake City, Arizona, Denver and Portland, where their corporate head quarters is located in Arizona (Sumner, 2005). After the company was split into four division each division has tried different ways to determine how Information Technology can improve the overall needs of the company. Each division attempted many different ways to implement its own Information Technology systems but was unsuccessful and cause errors with duplication, migration, data migration, technical support and training for four sales prospects and CRM solutions. Because of this it put the company at a disadvantage not allowing them to compete with the competition (Sumner, 2005). Step 1: Purpose and Scope of Study The purpose and scope of the case study, Bandon Group Inc. is to figure out a way that Information Technology can overall support the companies mission, goal, objectives, and opportunities. Changes need to be made to both the internal and external factors of the company. The company needs to find a ERP system that will be able to improve the...

Words: 1324 - Pages: 6

Premium Essay

Integrated Case Study 1

...Integrated Case Study: Bandon Group Inc. John Wilson Dr. Ashley Johnson 7/31/13 The Bandon Group was founded in 1953, and is still a family own company that is a distributor of copiers, electronic printers, faxes and other equipment for mid market companies. The company’s has effectively competed with IBM and Xerox by offering mid tier equipment at competitive prices. Bandon Inc. has four divisions located in the western parts of the United States in states such as Salt Lake City, Arizona, Denver and Portland, where their corporate head quarters is located in Arizona (Sumner, 2005). Over time the Bandon Company’s sales became successful which allowed growth. Since splitting into four divisions, each division has tried different attempts to determine how a new Information Technology can improve the overall needs of the company. Each division attempted many different ways to implement its own Information Technology systems that the whole company could benefit from. The attempts were unsuccessful and caused errors with duplication, migration, data migration, technical support and training for four sales prospects and CRM solutions. Because of this it put the company at a disadvantage not allowing them to compete with the competition (Sumner, 2005). Step 1: Purpose and Scope of Study The purpose and scope of the Bandon Group Inc. case study is to identify a way that...

Words: 1358 - Pages: 6