Ask Computer Network & Security Expert

Data and Information Management Assessment - Data model development and implementation

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data model development. Then implement the data model using a commercially available database management system development tool.

On completion of this assignment students will be able to:

a. Understand the fundamental principles of the networking and data requirements of a network.

b. Identify organisational information requirements.

c. Model organisational information requirements using conceptual data modelling techniques.

d. Convert the conceptual data models into relational data models and verify their structural characteristics with normalisation techniques.

e. Implement and utilise a relational database using a database system.

Description of this assignment: This assignment is to develop a data models, map and implement a Database System in a standard development environment to gain understanding of data model development and implementation.

Assignment Description -

1. The organisers of the GreenID2018 international multi-conference need to keep track of a large collection of workshops associated with the event. Initial requirements analysis brings out the following User view requirements / business rules about what needs to be recorded. Assume that you are given a task to model the database by using these business rules.

Complete the information-level design of the database that satisfies the following constraints and user view requirements. In order to complete this information-level design you are required to answer questions 1(a) to 1(f).

User view 1 requirement / business rule

  • There are several participants, each of which may sign up to one or more workshops.

User view 2 requirement / business rule

  • Each workshop has a name, ID and an identified organizer.
  • Some workshops happen on a particular date and some workshops last more than one day. You may need separate entity to store days.

User view 3 requirement / business rule

  • For each participant, it is important to record their name, email address, state (VIC, QLD,..) and the workshops which they wish to attend.
  • Every participant must register for at least one workshop.

User view 4 requirement / business rule

  • There are a number of meeting rooms at the conference venue, each of a fixed capacity. Meetings rooms are identified by a floor and room number.
  • Every workshop needs an allocated meeting room; where a workshop lasts for two days, it will use the same room on both days

Questions:

a. Analyse the all user requirements given above, identify and list all entities described in each user requirement.

b. Add attributes to these entities and represent these entities (or Tables) and attributes as a collection of Tables and attributes/ database schema. You are required to arrange them as given in the example below. Note: Select suitable primary key for each table and underline it. Eg. Participant (Participant_ID, P_name, email, W_name.)

c. Outline all business rules that describe relationships between entities. Note: You can make assumptions to create certain relationships, if it is not specifically mentioned in the given business rules. Eg. Every workshop needs an allocated meeting room.

d. Determine the functional dependences. Eg. Participant_ID - name, address, ......

e. Then normalise these tables. Make the normalization to 3NF. State for every step in the normalization, which functional dependency causes it.

f. Represent the structure of your database visually by using the entity-relationship (E-R) diagram. If you make any assumptions about data that doesn't show from the problem, they must be described. Note: You are required to use Visio or any other software tool to create the ER diagram.

2. Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

3. Write SQL queries for the following questions and execute them on the database you created in Question 4.

Include screen shots of the outputs and all SQL statements you used to answer following questions this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

a. List details of all workshops.

b. The management is interested in knowing names and email addresses of participants outside of Victoria who have already registered for the workshops.

c. Explain how to formulate a query to print details of workshop name, room number, floor number and room capacity. Hint : You need to join tables using a suitable query.

Section to be included in the report -

1. a. identify all entities - Identify entities in all user requirements.

b. User Views as Tables - Represent the User Views as a collection of Tables.

c. Relationships - Determine the relationships between entities.

d. Functional dependences - Determine Functional dependences.

e. Normalise tables - Analyse above tables and normalize.

f.  ER Diagram - Represent the structure of your database visually by using the ER diagram. Evaluate your proposed solutions.

2. Model building - Model building on MS Access Server.

3. Implement and utilise a relational database using a database system.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92840621
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As