Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Data and Information Management - Data model development and implementation

Purpose of the assessment (with ULO Mapping)

The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data model development. Then implement the data model using a commercially available database management system development tool.

On completion of this assignment students will be able to:
a. Understand the fundamental principles of the networking and data requirements of a network.
b. Identify organisational information requirements.
c. Model organisational information requirements using conceptual data modelling techniques.
d. Convert the conceptual data models into relational data models and verify their structural characteristics with normalisation techniques.
e. Implement and utilise a relational database using a database system.

Description of this assignment: This assignment is to develop a data models, map and implement a Database System in a standard development environment to gain understanding of data model development and implementation.

Assignment Description

1. The organisers of the GreenID2018 international multi-conference need to keep track of a large collection of workshops associated with the event. Initial requirements analysis brings out the following User view requirements / business rules about what needs to be recorded.Assume that you are given a task to model the database by using these business rules.

Complete the information-level design of the database that satisfies the following constraints and user view requirements. In order to complete this information-level design you are required to answer questions 1(a) to1(f).

User view 1 requirement / business rule
• There are several participants, each of which may sign up to one or more workshops.

User view 2 requirement / business rule
• Each workshop has a name, ID and an identified organizer .
• Some workshops happen on a particular date and some workshops last more than one day. You may need separate entity to store days.

User view 3 requirement / business rule
• For each participant, it is important to record their name, email address, state (VIC, QLD,..) and the workshopswhich they wish to attend.
• Every participant must register for at least one workshop.

User view 4 requirement / business rule
• There are a number of meeting rooms at the conference venue, each of a fixed capacity. Meetingsrooms are identified by a floor and room number.
• Every workshop needs an allocated meeting room; where a workshop lasts for two days, it willuse the same room on both days

Questions:

a. Analyse the all user requirements given above, identify and list all entities described in each user requirement.

b. Add attributes to these entities and representthese entities (or Tables) and attributesas a collection of Tables and attributes/ database schema. You are required to arrange them as given in the example below.
Note:Select suitable primary key for each table and underlineit.
Eg.Participant(Participant_ID, P_name, email, W_name.)

c. Outline all business rules that describe relationships between entities.
Note: You can make assumptions to create certain relationships, if it is not specifically mentioned in the given business rules.
Eg. Every workshop needs an allocated meeting room

d. Determine the functional dependences.

Eg.Participant_ID → name, address, ......

e. Then normalise these tables. Make the normalization to 3NF. State for every step in the normalization, which functional dependency causes it.

f. Represent the structure of your database visually by using the entity-relationship (E-R) diagram. If you make any assumptions about data that doesn't show from the problem, they must be described.

Note: Youare required to use Visio or any other software tool to create the ER diagram.

2. Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

3. Write SQL queries for the following questions and execute themon the database you created in Question 4.

Include screen shots of the outputs and all SQL statements you used to answer following questions this model using MS Accessby creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

a. List details of all workshops.

b. The management is interested in knowing names and email addressesof participantsoutside of Victoria who have already registered for the workshops.

c. Explain how to formulate a query to print details of workshop name, room number, floor number and room capacity

Hint : You need to join tables using a suitable query.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92827008
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As