Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Data and Information Management Assessment - Data model development and implementation

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data model development. Then implement the data model using a commercially available database management system development tool.

On completion of this assignment students will be able to:

a. Understand the fundamental principles of the networking and data requirements of a network.

b. Identify organisational information requirements.

c. Model organisational information requirements using conceptual data modelling techniques.

d. Convert the conceptual data models into relational data models and verify their structural characteristics with normalisation techniques.

e. Implement and utilise a relational database using a database system.

Description of this assignment: This assignment is to develop a data models, map and implement a Database System in a standard development environment to gain understanding of data model development and implementation.

Assignment Description -

1. The organisers of the GreenID2018 international multi-conference need to keep track of a large collection of workshops associated with the event. Initial requirements analysis brings out the following User view requirements / business rules about what needs to be recorded. Assume that you are given a task to model the database by using these business rules.

Complete the information-level design of the database that satisfies the following constraints and user view requirements. In order to complete this information-level design you are required to answer questions 1(a) to 1(f).

User view 1 requirement / business rule

  • There are several participants, each of which may sign up to one or more workshops.

User view 2 requirement / business rule

  • Each workshop has a name, ID and an identified organizer.
  • Some workshops happen on a particular date and some workshops last more than one day. You may need separate entity to store days.

User view 3 requirement / business rule

  • For each participant, it is important to record their name, email address, state (VIC, QLD,..) and the workshops which they wish to attend.
  • Every participant must register for at least one workshop.

User view 4 requirement / business rule

  • There are a number of meeting rooms at the conference venue, each of a fixed capacity. Meetings rooms are identified by a floor and room number.
  • Every workshop needs an allocated meeting room; where a workshop lasts for two days, it will use the same room on both days

Questions:

a. Analyse the all user requirements given above, identify and list all entities described in each user requirement.

b. Add attributes to these entities and represent these entities (or Tables) and attributes as a collection of Tables and attributes/ database schema. You are required to arrange them as given in the example below. Note: Select suitable primary key for each table and underline it. Eg. Participant (Participant_ID, P_name, email, W_name.)

c. Outline all business rules that describe relationships between entities. Note: You can make assumptions to create certain relationships, if it is not specifically mentioned in the given business rules. Eg. Every workshop needs an allocated meeting room.

d. Determine the functional dependences. Eg. Participant_ID - name, address, ......

e. Then normalise these tables. Make the normalization to 3NF. State for every step in the normalization, which functional dependency causes it.

f. Represent the structure of your database visually by using the entity-relationship (E-R) diagram. If you make any assumptions about data that doesn't show from the problem, they must be described. Note: You are required to use Visio or any other software tool to create the ER diagram.

2. Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

3. Write SQL queries for the following questions and execute them on the database you created in Question 4.

Include screen shots of the outputs and all SQL statements you used to answer following questions this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data, at least 3 records in each table.

a. List details of all workshops.

b. The management is interested in knowing names and email addresses of participants outside of Victoria who have already registered for the workshops.

c. Explain how to formulate a query to print details of workshop name, room number, floor number and room capacity. Hint : You need to join tables using a suitable query.

Section to be included in the report -

1. a. identify all entities - Identify entities in all user requirements.

b. User Views as Tables - Represent the User Views as a collection of Tables.

c. Relationships - Determine the relationships between entities.

d. Functional dependences - Determine Functional dependences.

e. Normalise tables - Analyse above tables and normalize.

f.  ER Diagram - Represent the structure of your database visually by using the ER diagram. Evaluate your proposed solutions.

2. Model building - Model building on MS Access Server.

3. Implement and utilise a relational database using a database system.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92840621
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

Income effects depend on the income elasticity of demand

Income effects depend on the income elasticity of demand for each good that you buy. If one of the goods you buy has a negative income elasticity, that is, it is an inferior good, what must be true of the income elastici ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As