Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Data and Information Management - Data model development and implementation

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data model development. Then implement the data model using a commercially available database management system development tool.

On completion of this assignment students will be able to:
a. Understand the fundamental principles of the networking and data requirements of a network.
b. Identify organisational information requirements.
c. Model organisational information requirements using conceptual data modelling techniques.
d. Convert the conceptual data models into relational data models and verify their structural characteristics with normalisation techniques.
e. Implement and utilise a relational database using a database system.

Assignment Description

1. The organisers of the GreenID2018 international multi-conference need to keep track of a large collection of workshops associated with the event. Initial requirements analysis brings out the following User view requirements / business rules about what needs to be recorded.Assume that you are given a task to model the database by using these business rules.

Complete the information-level design of the database that satisfies the following constraints and user view requirements. In order to complete this information-level design you are required to answer questions 1(a) to1(f).

User view 1 requirement / business rule

There are several participants, each of which may sign up to one or more workshops.

User view 2 requirement / business rule
- Each workshop has a name, ID and an identified organizer .
- Some workshops happen on a particular date and some workshops last more than one day. You may need separate entity to store days.

User view 3 requirement / business rule
- For each participant, it is important to record their name, email address, state (VIC, QLD,..) and the workshopswhich they wish to attend.
- Every participant must register for at least one workshop.

User view 4 requirement / business rule
- There are a number of meeting rooms at the conference venue, each of a fixed capacity. Meetingsrooms are identified by a floor and room number.
- Every workshop needs an allocated meeting room; where a workshop lasts for two days, it willuse the same room on both days

Questions:

a. Analyse the all user requirements given above, identify and list all entities described in each user requirement.

b. Add attributes to these entities and representthese entities (or Tables) and attributesas a collection of Tables and attributes/ database schema. You are required to arrange them as given in the example below.

Note:Select suitable primary key for each table and underlineit.

Eg. Participant(Participant_ID, P_name, email, W_name.)

c. Outline all business rules that describe relationships between entities.

Note: You can make assumptions to create certain relationships, if it is not specifically mentioned in the given business rules.
Eg. Every workshop needs an allocated meeting room

d. Determine the functional dependences.

Eg. Participant_ID → name, address, ......

e. Then normalise these tables. Make the normalization to 3NF. State for every step in the normalization, which functional dependency causes it.

f. Represent the structure of your database visually by using the entity-relationship (E-R) diagram. If you make any assumptions about data that doesn't show from the problem, they must be described.

Note: Youare required to use Visio or any other software tool to create the ER diagram.

2. Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

3. Write SQL queries for the following questions and execute themon the database you created in Question 4.

Include screen shots of the outputs and all SQL statements you used to answer following questions this model using MS Accessby creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

a. List details of all workshops.

b. The management is interested in knowing names and email addresses of participants outside of Victoria who have already registered for the workshops.

c. Explain how to formulate a query to print details of workshop name, room number, floor number and room capacity

Hint : You need to join tables using a suitable query.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92829787
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Since quotas do not raise revenues but have the same trade

Since quotas do not raise revenues but have the same trade effects as do tariffs, why not just have tariffs? Why would the government impose quotas when tariffs not only would reduce imports but also bring in new revenue ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As