Premium Essay

Database Design Final Review

In: Computers and Technology

Submitted By ms2854
Words 2014
Pages 9
Database Final Exam review 1. What is data? Data are values of qualitative or quantitative variables, belonging to a set of items 2. What is information? Data becomes information after it has been processed to add context, relevance and purpose. 3. Role of data and information – Data and information allow users to make better decisions based on good information and data 4. Field – a column in a table which is a property of an entity (attribute) 5. Record – A row or tuple in a table 6. Tuple – A record or row in a table 7. ACID - ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity means if one part of the transaction fails, all of the transaction fails, leaving the database unchanged.
Consistency means the data written must be valid according to all the rules and the rules are applied from state to state.
Isolation means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. It is executed as if it were being executed serially.
Durability ensures that once transaction changes are done, they are permanent and cannot be undone or lost, even in the event of a system failure.

8. What is data redundancy and which characteristics of the file system can lead to it? Data redundancy exists when unnecessarily duplicated data are found in the database. It is the result of poorly designed databases which allow the data to be stored in different locations. 9. What is a DBMS and what are its functions? A database management system (DBMS) is a software package with computer programs that controls the creation, maintenance, and use of a database. It allows organizations to conveniently develop databases for various applications. 10. What is a business rule and what is its purpose in data modeling? A business rule is a brief, precise, and...

Similar Documents

Premium Essay

Computers

...[pic] Quality Assurance Plan For WAN Solutions Date: 5/26/2012 Revision Sheet |Release No. |Date |Revision Description | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |[pic] | | | ...

Words: 5473 - Pages: 22

Premium Essay

Database

... Database Management Systems Theory and Practice COURSE EXPECTATION FORM Course Description: The implementation of technology such as bar codes and scanners enable organizations to accumulate large volumes of data. Further, as the technology to collect data gets cheaper and more simplified, business organizations gather and process a huge amount of data and information. Thus, data management has become a key function for many organizations. Managers need high-quality information to manage change in a turbulent, global environment. Business organizations use information systems to store and retrieve data, the raw material in knowledge-based economies. This repository of data is organizational memory. Databases are an important component of the organizational memory. Thus, information systems professionals should develop a comprehensive understanding of data management principles to fully utilize the organizational role of information technology. This course provides core skills of data management for the relational database management systems. This course will review the theoretical concepts and applications of a modern relational database management system. In addition to a basic theoretical presentation of the database design concepts, students will be required to design and develop a database application using a modern fourth generation language system. This course teaches students data modeling and design......

Words: 1374 - Pages: 6

Premium Essay

Intranet Facility Project Wbs

...Intranet Facility Project 1. Design 1. Web User Interface 1. Functional Specifications 1. Create User Interface Mock-ups 2. Conduct Design Review 3. Deliver Final Functional Specs 4. Obtain User Signoff 2. Technical Specifications 1. Develop Tech Specs 2. Review Tech Specs with Project Team 3. Obtain Team Signoff 2. SQL Database 1. Technical Specifications 1. Develop Tech Specs 2. Review Tech Specs with Project Team 3. Obtain Team Signoff 3. Interfaces 1. Technical Specifications 1. Determine data import/export elements 1. Define User needs 2. Define IT needs 2. Design interfaces 3. Obtain Team Signoff 4. Reports 1. Functional Specifications 1. Collect User Requirements 1. Define Data elements 2. Define Frequency 3. Define Audience 2. Design Reports 3. Review Report Design with Project Team 4. Deliver Final Functional Specs 5. Obtain User Signoff 2. Development 1. Web Front End 1. Code Web Pages 2. Conduct Unit Test 3. Review Web Page design/functionality ......

Words: 551 - Pages: 3

Premium Essay

Retail Store Database

...Fundamentals of Database Systems Individual Project: Retail Store Database Table of Contents Section 1: Project Outline 3 Project Overview 3 Section 2: Description of the Database Design Life Cycle 4 Database Design Life Cycle 4 Database Creation 7 Section 3: The Entity Relationship Diagram 9 TBD 9 Section 4: The Logical Model and Normalization 10 TBD 10 Section 5: The Microsoft Access Database 11 TBD 11 Section 6: The Microsoft Access Database Application 12 TBD 12 References 13 Section 1: Project Outline Project Overview This project will go over the process of designing a database. The database that will be designed will be a database for a typical retail store. The purpose of this database will be to manage and store the data produced or collected during normal day to day operations. Throughout the rest of this project the information and processes will be aimed toward the creation of this retail store database. This is to help provide an example of what is needed to create a database and how each process or step corresponds to each other. Section 2: Description of the Database Design Life Cycle Database Design Life Cycle In order to create a database you must understand that there are certain steps that are contained within the Database Design Life Cycle (DBLC). These seven steps help you design the database and they give a step by step process to guide you through the phases of development. These steps are listed as follows: ...

Words: 1683 - Pages: 7

Premium Essay

Software Project Management Plan

......................11-12 Communication management plan......................................................13-14 Scope Statement Project Name: IT Management System Project Manager: Luvianka Olivares Project Objectives: To design and install a computer network for a small business. Deliverables: Software package will manage: * Running of all computers in the business * Training and extensive end-user documentation * Technical support self-service website * Full backup process * Security of IT development tools * Project Management- Project charter, project scope statement, status reports, final project report, lessons-learned report, and any other document required to manage this project Milestones: Training digital video files Preliminary database Technical support website Full backup of software Software installation Testing of installation Technical requirements: Management requirements End-user selection Software design: Screen/menu/dialog/user interaction design Report layout and formats Limits and exclusions: Software to run on computers older than 3 years Review with customers:...

Words: 1828 - Pages: 8

Premium Essay

Pt2520

... 15. 16. 17. data entry forms The _____ data model is a tool for constructing data models. entityrelationship A _____ is a self-describing collection of integrated records. database 21. _____ is an example of a personal DBMS. access 22. _____ is the process of converting a data model into tables, relationships, and data constraints. database design 23. The _____ problem is unique to a multiuser database environment. lost-update _____ show data in a structured context. reports A ______ is a collection of forms, reports, queries, and programs that process a database. database application ______ is a popular enterprise DBMS. DB2 ______ is the most popular diagramming tool for database applications. E-R 27. ______ is the process of converting a poorly structured table into two or more well-structured tables. normalization 28. ______ process logic that is specific to a given business record. application programs ______ softwares assist in creating, maintaining, and manipulating databases. DBMS A(n) _____ DBMS is designed to process large organizational and workgroup databases. enterprise A(n) _____ is a column or group of columns that identifies a unique row in a table. key All the following steps involved in transforming a data model into a relational database design except _____. each attribute of the entity becomes a row of the table Applications use DBMS for all of the following operations except _____ data. exchange 20. 24. 25. 26. ...

Words: 1054 - Pages: 5

Premium Essay

Database - Sql

...Final Exam Review Below are the review questions for your final exam. You MUST complete this as it is a part of your final exam equaling total of 10 points. Each question must be answered with at least 3 sentences, clearly demonstrating an understanding of the question asked. This is due on the final day in class prior to the final exam. Questions 1. What is a database? Describe the 3 main types discussed in the book. * Is a collection of related data. * Doesn’t have to be electronic; example : card catalog’s in libraries ; spiral notebook ; phone or address book * Usually mean electronic database that run on computers 2. Why is the relational database model most commonly used today? What impact does it have on data integrity? * The idea came from Edgar F Codd in 1970 he worked for IBM at the time * Advantage is the tables define the relationships among themselves by mean of repeating an attribute or column from one table in another table “called Keys” * One of the problems was data redundancy; means to store the same data in more than place in the database * Codd’s theoretical design minimized redundancy * The impact is; the complexity of the design, its easy to create a hard to use database, or hard to fine the data you entered into the database. So a well-designed database = data integrity and flexibility. 3. Distinguish between data integrity and redundancy. * Data integrity = to the accuracy and quality of the...

Words: 2656 - Pages: 11

Premium Essay

Syllabus

...a PDF for offline viewing. MET CS669 Database Design and Implementation for Business This course uses the latest database tools and techniques for persistent data and object-modeling and management. Students gain extensive hands-on experience with exercises and a term project using Oracle, SQL Server, and other leading database management systems. Students learn to model persistent data using the standard Entity-Relationship model (ERM) and how to diagram those models using EntityRelationship Diagrams (ERDs), Extended Entity-Relationship Diagrams (EERDs), and UML diagrams. Students learn the standards-based Structured Query Language (SQL) and the extensions to the SQL standards implemented in Oracle and SQL Server. Students learn the basics of database programming, and write simple stored procedures and triggers. The Role of this Course in the MSCIS Online Curriculum This is a core course in the MSCIS online curriculum. It provides students with an understanding and experience with database technology, database design, SQL, and the roles of databases in enterprises. This course is a prerequisite for the three additional database courses in the MSCIS online curriculum, which are CS674 Database Security, CS699 Data Mining and Business Intelligence and CS779 Advanced Database Management. By taking these three courses you can obtain the Concentration in Database Management and Business Intelligence. CS674 Database Security also satisfies an elective......

Words: 10777 - Pages: 44

Free Essay

Oracle Business Process Redesign Project

...Software Documentation Process Improvement ISMG 6040 Spring 2011 Dr. Judy Scott Margaret Irene Wallace May 5, 2011 Contents 1. Executive Summary 3 2. Organizational Overview 3 3. Competitive Environment & Strategy 3 4. Oracle’s Fusion Middleware Department 4 5. Business Process Problem Discussion 5 5.1 Project Roadmap 6 6. Results & Findings 8 6.1 Understanding the Current Process 9 6.2 Redesign – Requirements and Design 12 6.3 Oracle 11g – BPM Criteria and ROI & Success Criteria 15 6.4 Develop, Test, Implement, Train 18 6.5 Coping with Cultural Resistance 19 Appendix A: Modeling Experience 20 Appendix B: Process Description 23 Appendix C: Inputs and Outputs 24 Appendix D: Governing Rules for Process Steps 25 References 26 1. Executive Summary The process for creating and publishing software documentation at Oracle is lengthy and involves several roles and departments. The software documentation departments and the number of products they are responsible for have grown tremendously over the years due to acquisitions. However, the documentation process and its tools have not scaled well. There is no overall set of tools for the entire process. Email is the primary communication method, and is the basis for routing work from one step and role to the next. These steps are not automated, and the steps which are automated use out of date, non-integrated tools. The process is overdue for a comprehensive analysis and......

Words: 6563 - Pages: 27

Premium Essay

Pm 584 Qualitative Risk Assessment

...risk matrix, and prioritized risk register. Revised Project Background The basic project is the design of a monthly newsletter with coupons for promotional items using the current customer demographic database. The project timeline is 9 months with a budget of $75,000. The majority of the budget will be spent on securing a design agency, and printing and mailing of the newsletter. Some will be allocated to the maintenance and updating of the current database information. First Month: • As Kudler Fine Foods does not have the talent in house required to design the newsletter an external design agency will have to be utilized. This will require the publication of a Request for Proposals (RFPs) to be forwarded to design agencies. Once the RFP’s have been received a review by management and the project team will be required for the selection process, this should be accomplished within the first month of the project timeline. Second/Third Months • Once the design agency has been selected the design of the newsletter will begin and should be completed for the first review by the management and project team at the end of the second month. • Concurrently with the design of newsletter management will have to decide which promotional items will be offered using coupons so the information can be added to the newsletter design. Fourth/Fifth Months: • All...

Words: 1060 - Pages: 5

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3.......

Words: 3868 - Pages: 16

Premium Essay

Generic Mc Settings

...GenRays Matrix Template Project Management Knowledge Areas Project Integration Management Recommended Tool(s)   Expert Judgment Interviews Justification for Tool These particular tools were chosen give shape to the HRIS project for GenRays. From studying the interviews of key stakeholders and their expert opinions, a collection of functions can be identified so that the HRIS deliverable’s function/purpose is defined. This initial planning will help to develop the Project Charter and set the stage for all the work that need to be performed. GenRays has subject matter experts on staff whose input it vital to produce an HRIS that meets the particular needs of the GenRays staff. We need to make sure that all of the work required to produce a HRIS product for GenRays is done. We also want to ensure extraneous work is avoided to keep GenRays costs low. We will use the interviews here to determine how the project’s scope will be defined, validated, and controlled. GenRays had reached the ROI point very early with the last on the project and defining scope well here will allow for a similar success. Decomposition of the work that needs to be done is a tool that will help aid in identifying the exact work that needs to be done and help to create the WBS. To further, ensure that the project runs smoothly and stays on track. We will use tools to track and manage the project’s completion. We can use the process of Decomposition that we have used to break down the projects’......

Words: 7374 - Pages: 30

Premium Essay

Outline

...information issued to them by the University via Ryerson online systems on a frequent and consistent basis. Ryerson requires that any official or formal electronic communications from students be sent from their official Ryerson Email account. As such emails from other addresses may not be responded to. 3.0 CALENDAR COURSE DESCRIPTION This course provides the students with an introduction to the core concepts in data and information management. It is centered around conceptual data modeling techniques, converting the conceptual data models into relational data models and verifying its structural characteristics with normalization techniques. The course will include coverage of basic database administration tasks and key concepts of data quality and data security. Building on the transactional database understanding, the course 1 of 4 provides an introduction to data and information management technologies that provide decision support...

Words: 1132 - Pages: 5

Premium Essay

Devry Nr 439 All Week Discussions – Latest 2016

...practice based on evidence? Remember to use references. Devry NR439N Week 2 Discussion DQ 1 & DQ 2 Latest 2016 Jan. DQ 1 Describe a Significant Nursing Clinical Issue (graded) Reflect on your practice and identify a significant nursing clinical issue that you would like to search for evidence in online sources. This issue will be the basis for the Research Database Assignment that you will submit in Week 3. Formulate searchable, clinical questions in the PICO(T) format for your nursing clinical issue. Remember to integrate references. DQ 2 Share a Research Database Description (graded) Review the guidelines and grading rubric for the Research Database Assignment due in Week 3. Search for ONE research database that is relevant to your nursing clinical issue, briefly describe the issue you are investigating, and use the instructions on the form provided in Doc Sharing to write your review. Briefly describe your process for locating databases that contain relevant research studies. Did you have any difficulties or face any challenges? Devry NR439N Week 3 Discussion DQ 1 & DQ 2 Latest 2016 Jan. DQ 1 Research Problems and Designs (graded) The...

Words: 940 - Pages: 4

Premium Essay

Systems Design, Implementation and Operatio

...SYSTEMS DESIGN, IMPLEMENTATION AND OPERATION In chapter 18 we focused on the first phase of the Systems Development Life Cycle – Systems Analysis. Chapter 20 deals with the remaining four phases: - conceptual systems design - physical systems design - systems implementation and conversion - operation and maintenance CONCEPTUAL SYSTEMS DESIGN In the conceptual systems design phase, the developer creates a general framework for implementing user requirements and solving problems identified in the analysis phase. As shown in Figure 20-1 on page 747 HC (page 637 SC), there are three main steps in conceptual design: 1. evaluating design alternatives, 2. preparing design specifications, and 3. preparing the conceptual systems design report. [pic] Evaluate Design Alternatives There are many ways to design an AIS, so accountants and others involved in systems design must continually make design decisions. [pic] The design team should identify a variety of design alternatives and evaluate each with respect to the following standards: 1) how well it meets organizational and system objectives, 2) how well it meets user needs, 3) whether it is economically feasible, and 4) what its advantages and disadvantages are. The steering committee evaluates the alternatives. Table 20-1 on page 748 HC (page 638 SC) presents examples of conceptual and physical design considerations and their corresponding design......

Words: 3220 - Pages: 13