...Database Design – Final Exam Study Guide Name ________________________________________________ Date ___________________ Part I Directions: Answer each question. 1. What are the benefits the Oracle 10g Database Environment provides for business? Oracle's 10g database management system gives businesses the ability to coordinate and share computing, application, data, storage, or network resources across dynamic and geographically dispersed organizations and in turn save time, resources and money. 2. What services and products does Oracle provide? Information Technology services and products. 3. What is a relational database? A relational database is a group of data stored in tables that are related by means of a common field. 4. What is the difference between application and system software? Provide an example. Systems software consists of low-level programs designed to interact with the computer hardware. Application Software is the code that allows end users to interact with computers, like for instance Firefox for browsing the internet, Microsoft Word for writing documents, Application Express for developing applications and also for accessing and manipulating data in an Oracle Database. 5. How is data extracted from the database? Data is extracted from the database by the SELECT statement. 6. Name two benefits of a career portfolio? • To organize the many details of one's experiences • To help with goal setting 7. What is the difference between a projection, a selection,...
Words: 2537 - Pages: 11
...Systems Design What is a System? Give examples. A set of components working together for a common objective Information Systems (Web-based) H/w, S/W, people, Data, Procedures, Web-portals What is SDLC? Systems Planning, Systems analysis, systems design, systems development, implementation, maintenance IS alignment IS Success IS usage User satisfaction Information waste IS enabled Competitive advantage Orgl change Orgl learning TAM Easy to use Perceived personal usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner, Amazon.com, Dell.com – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case...
Words: 1598 - Pages: 7
...systems approach can be applied to the solution of many types of problems. When this involves the development of information system solutions to business problems, it is called information systems development or application development. Most computer-based information systems are conceived, designed, and implemented using some form of systematic development process. In this process, end users and information specialists design information systems based on an analysis of the information requirements of an organization. Thus, a major part of this process is known as systems analysis and design. When the systems approach is applied to the development of information system solutions, a multistep process or cycle emerges. This is frequently called the information systems development cycle, also known as the systems development life cycle (SDLC). Steps involved and products produced in the traditional information systems development cycle: 1. Systems investigation - Product: Feasibility Study 2. Systems analysis - Product: Functional Requirements 3. Systems design - Product: Systems Specifications 4. Systems implementation - Product: Operational System 5. Systems maintenance - Product: Improved System 1. All the activities involved are highly related and interdependent. 2. Several developmental activities can occur at the same time. 3. Different parts of a development project can be at different stages of the development cycle. 4. Analysts may recycle back at any time...
Words: 2490 - Pages: 10
...THE UNIVERSITY OF NAIROBI SCHOOL OF BUSINESS DEPARTMENT OF BUSINESS ADMNISTRATION MBA PROGRAMME SEPT- DEC 2014 SEMESTER Design and Implementation of a Data Warehouse Prototype for the University of Nairobi within the Context of Relational Online Analytical Processing (Data Analysis) PRESENTED BY: 1. JORAM KIPLIMO D61/68960/2013 0724431978 . PRESENTED TO: Dr. Muranga Njihia Word count: 2752 ABSTRACT Data ware housing is a booming industry with many interesting research problem. The data warehouse is concentrated on only few aspects. The discussion here is about the data warehouse design and usage in the case of the University of Nairobi Environment. Data warehouse can be built using a top-down approach, bottom – down approach or a combination of both. In this research paper we are discussing about the data warehouse design process. Data Warehouse (DWH) systems are used by decision makers for performance measurement and decision support. Currently the main focus of the DWH research field is not as much on the interaction of the DWH with the organization, its context and the way it supports the organization’s strategic goals, as on database issues. The aim of the study is to emphasize and describe the relationship between the DWH and the organization with conceptual models, and to use this knowledge to support data interpretation with business metadata. KEYWORDS Data Warehouse (DWH) Data Mart Extraction, Transformation...
Words: 2816 - Pages: 12
...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...
Words: 3868 - Pages: 16
...INTRODUCTION 1. INTRODUCTION Telecom Connections is a web based application through which user can effectively use the benefits of Telephone Provider. We have analyzed the needs of the users, and thus developed a web based application, for providing telephone connections and associated services online. Because now a days people became so busy with their work and they don’t want to waste their time by going and waiting for long time or waiting in a queue for applying for new connections or to get their bills or to give the complaints regarding the service. Also they are not sure whether waiting for that much time , they will get their turn or not. If so they will get out with frustration .By considering all this issues associated with the manual process we have developed a web application for the telecom users , where in the user can apply for new connections online , can view the bill status online , can send the feedback and do complaints regarding the service provided by the telecom company. 1. PURPOSE OF THE PROJECT: We are going to build an automated system where user can online apply for phone connections and they can view their telephone bills and they can also post the complaints details. EXISTING SYSTEM AND PROPOSED SYSTEM 2. EXISTING SYSTEM AND PROPOSED SYSTEM 2.1 PROBLEMS EXISTING IN SYSTEM: In existing system user has no option of online. He has to go to telecom office...
Words: 2792 - Pages: 12
...and Conflict Research Methods Assignment In the field of political and international relations studies, there are two broad types of research methods, which include and combine various research methods, based on its designs and core principles, and they are quantitative and qualitative research methods. Also, there is the third one, called experimental research method, which does not fit into qualitative and quantitative methods, but rather constitutes separate research design, although it might be based on qualitative and quantitative methods’ tools and theories. Quantitative research methods include many particular techniques and in general could be described as methods, which works with numbers and applies statistical analysis by using various mathematical operations with formulas and computer software. The usage of surveys and various types of databases are examples of quantitative methods. Scientists conduct surveys either in person, or through telephones, mail or internet to collect data concerning people’s opinion and attitudes about particular events in politics and international relations (Box-Steffensmeier, 2008, p. 9-10). Then, gathered information could be analyzed through the coding of data into numbers and application of tools of statistical analysis on them. Surveys allowed scientists to form databases from the collected data that made it possible to share databases with other scientists, especially with the emergence of internet, test theories or do further research...
Words: 1069 - Pages: 5
...project report comprises of the background of the study, statement of the problem, general and specific objectives of the research, scope of the study and significance of a computerized records management system. 1.1 Background information. I have much concentration on one of primary school known as kyegera parents primary school. It is one of the many privately owned primary schools in kampala district. This primary school was constructed and started operating in 2006 to offer good education to the young generation in the district and perhaps competite with the rest of the country’s schools. The manual based granding system is the current system used by this education institute as I analyze this system I found that the system was costly in terms of purchasing papers, calculator and minimising error. A computerized granding management system for an education institution is all about simpling stundents granding, securing reports, managing and quick retrieval of data and storage of large volume of data with the help of hard drive and can be kept for long period of time. It also allows deletion and editing of data which cannot be done on paper. 1.2 Problem statement. The institutions current system is mainly manual based granding system which are costly in terms of granding using calculator , storage and securing records from intruder to access them. 1.2.1 General objective. The purpose of this project is to design a computerized records management system that will...
Words: 8272 - Pages: 34
...I ~ i APPLIED SOCIAL RESEARCH METHODS SERIES CASE Series Editors LEONARD BICKMAN, Peabody College, Vandelbilt University. Nashvine DEBRA J. ROO. Vanderbilt UnillelSity. Washington. DC I. SURVEY RESEARCH METHODS (ThIrd Edition) by FlOYD J. FOWLER, Jr. 2. SYNTHESIZING RESEARCH (ThIrd edition) by HARRIS COOPER 3. METHODS FOR POUCY RESEARCH by ANN MAJCHRZAK 4. SECONDARY RESEARCH (Second Edition) by DAVID W. STEWART and MICHAEL A. KAMINS 5. CASE sruDY RESEARCH (ThIrd edition) by ROBERT K. YIN 6. META-ANALY11C PROCEDURES FOR SOCIAL RESEARCH (Revl'" Edition) by ROBERT ROSENTHAL 7. TELEPHONE SURVEY METHODS (Second Edition) by PAUL J. LAVRAKAS 8. DIAGNOSING ORGANlZAnoNS (s.cond Edition) by MICHAEL I. HARRISON 9. GROUP TECHNIQUES FOR IDEA BUILDING (Second Edition, by CARL M. MOORE 10. NEED ANALYSI9 by JACK McKilliP II. UNKING AUDmNG AND META EVALUAnON by THOMAS A. SCHWANDT and EOINARD S. HALPERN 12. ETHICS AND VALUES IN APPUED SOCIAL RESEARCH by ALLAN J. KIMMEL 13. ON nME AND METHOD by JANICE R. KEllY and JOSEPH E. McGRATH 14. RESEARCH IN HEALTH CARE SEmNGS by KATHLEEN E. GRADY and BARBARA STRUDLER WALlSTON 15. PARnCIPANT OBSERVAnON by DANNY JORGENSEN 16. INTERPREnVE INTERACllONISM (Second Edition) by NORMAN K. DENZIN 17. ETHNOGRAPHY (Second Edition) by DAVID M. FETTERMAN 18. STANDARDIZED...
Words: 15482 - Pages: 62
...Phoenix BSA/375 July 15, 2010 Riordan Manufacturing HRIS Analysis The ability to analyze and study the needs of an organization is an essential skill for a systems analyst. A systems analyst uses the concept of analysis and design to maintain and improve their information systems. The main goal of systems analysis and design is to improve organizational systems, typically through applying software that can help employees accomplish key business tasks more easily and efficiently (citation). The first steps that need to be taken in systems improvement are research and analyzing the scope and feasibility of a new project. Systems Analysis Approach The information-gathering technique and design method proposed for this project is the Rapid Application Development method, acronym RAD. The RAD methodology is a process in which research of user requirements is compiled before producing any detailed system design documents. Using this approach decreases the time needed to design and implement new systems. Factors of Successful Analysis The Rapid Application Development method incorporates using three different approaches of systems analysis. These sub-approaches are Prototyping, Computer-Assisted Software Engineering Tools, and Joint Application Design. By using the three different perspectives, RAD streamlines the entire systems analysis and design process. Prototyping Prototyping is the building of a raw and small-scaled working model. This...
Words: 1003 - Pages: 5
...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...
Words: 17307 - Pages: 70
...BUGANDA ROYAL INSTITUTE OF BUSINESS AND TECHINICAL EDUCATION - MENGO AUTOMATED IMMUNISATION RECORDS MANAGEMENT SYSTEM A CASE STUDY OF NSANGI HEALTN CENTER III A RESEARCH REPORT BY NAMATOVU ANGELLA BR/DCS/8045/11 A RESEARCH REPORT SUBMITTED TO THE DEPARTMENT OF COMMUNICATION AND EDUCATION IN PARTIAL FULFILMENT FOR THE AWARD OF DIPLOMA IN COMPUTER SCIENCE OF BUGANDA ROYAL INSTITUTE OF BUSINESS AND TECHNICAL EDUCATION JULY 2013 DECLARATION I hereby declare that this research which submitted to the department of communication and education of Buganda Royal institute is my original work and it is and it has never been submitted to any other degree/diploma award institute. Students Name: NAMATOVU ANGELLA Reg No:BR/DCS/8045/11 Date:___________________________ Approval I approve that this research report has been under my supervision and it is ready for Submission to the academic council of Buganda Royal Institute. Supervisor’s Name: Mr. SSekuwanda Henry Signature: ____________________________ Date: ___/07/2013 DEDICATION I dedicate this research report firstly my mother who has sacrificed whatever My siblings and my friends at Buganda Royal Institute for both moral and financial support they have provided. May the almighty God Reward them accordingly. ACKNOWLEDGEMENT I would like to acknowledge this piece of work most especially...
Words: 7325 - Pages: 30
...Examiner ______________ Head of the Department Submitted on: ______________ PRIYESH KUMAR, DCA, CUSAT, Kochi-22 2 ONLINE HOTEL MANAGEMENT CONTENTS ACKNOWLEDGEMENT SYNOPSIS 1. INTRODUCTION 1.1. OBJECTIVE 1.2.PROBLEM DEFINITION 1.3. SYSTEM ENVIRONMENT 2. SOFTWARE QUALITY ASSURANCE PLAN 2.1. PURPOSE 2.2. SCOPE 2.3. DOCUMENT OVERVIEW 2.4. TASKS 2.5. IMPLEMENTATION 2.6. DOCUMENTATION 2.7. AUDIT 2.8. SOFTWARE DEVELOPMENT PROCESS 2.9. DOCUMENT REVIEW 2.10 TESTING 3. SYSTEM ANALYSIS 3.1 SYSTEM STUDY 3.2FEASIBILITY STUDY 2010 PRIYESH KUMAR, DCA, CUSAT, Kochi-22 3 ONLINE HOTEL MANAGEMENT 4. SOFTWARE REQUIREMENTS SPECIFICATION 2010 4.1User Interface Requirements 4.2Database Requirements 4.3Functional Requirements 4.4Non-Functional Requirements 4.5Other Requirements and Constraints 5. SYSTEM DESIGN 5.1 ARCHITECTURAL DESIGN 5.2 PROCESS DESIGN 5.3 ER-DIAGRAMS 6. DATA DESIGN 6.1.DATA FLOW DIAGRAMS 6.2ACTIVITY DIAGRAMS 6.3DATABASE DESIGN 7. SYSTEM TESTING 7.1. LEVELS OF TESTING AND TEST CASES 7.2VALIDATION CHECKS 8. SYSTEM IMPLEMENTATION 9. SYSTEM MAINTENANCE 10.SCREEN SHOTS 11.CONCLUSION APPENDIX BIBLIOGRAPHY PRIYESH KUMAR, DCA, CUSAT, Kochi-22 4 ONLINE HOTEL MANAGEMENT 2010 ACKNOWLEDGEMENTS I have a great pleasure in acknowledging the help given...
Words: 7751 - Pages: 32
...Riordan Business-to-Business Web Site Use Case Scenarios Analysis In deciding which way to take Riordan Manufacturing’s business-to-business web site use case studies were performed and the top two scenarios were chosen for further analysis. Both scenarios present a way for Riordan to improve raw material ordering through different means. In order to decide which path to take the two scenarios will be discussed in greater detail including a brief synopsis on the technological role involving systems analysis and design, database design, programming, networking, and the web. Use Case 1 As described before, in use case scenario 1, a Riordan employee would log into a business-to-business web site and place an order with one of our partnered vendors as Figure 1 depicts. The employee logs into the secure website, chooses a vendor from a list, selects from the common list of products purchased from the vendor, chooses a quantity and enters a required by date, the vendor receives notification of an order, verifies credit status or requests credit card information, fills the order, generates an invoice, and ships the order to our warehouse. Use Case 2 In use case scenario 2, as shown in Figure 2, the approach to replenishing key inventory levels resides with the vendor. Triggers in the database alert the vendor via email that the level is at its threshold and then the supplier logs into the secure business-to-business web site, issues an order to ship replenishment supplies...
Words: 795 - Pages: 4
...Why Normalization Failed to Become the Ultimate Guide for Database Designers? Marin Fotache Alexandru Ioan Cuza University of Iasi, Romania Faculty of Economics and Business Administration Dept. of Business Information Systems Blvd. Carol I, nr. 22, Iasi, 700505, Romania Tel: + 40 744 497 654, Fax: + 40 232 217 000 fotache@uaic.ro ABSTRACT With an impressive theoretical foundation, normalization was supposed to bring rigor and relevance into such a slippery domain as database design is. Almost every database textbook treats normalization in a certain extent, usually suggesting that the topic is so clear and consolidated that it does not deserve deeper discussions. But the reality is completely different. After more than three decades, normalization not only has lost much of its interest in the research papers, but also is still looking for practitioners to apply it effectively. Despite the vast amount of database literature, comprehensive books illustrating the application of normalization to effective real-world applications are still waited. This paper reflects the point of 1 view of an Information Systems academic who incidentally has been for almost twenty years a practitioner in developing database applications. It outlines the main weaknesses of normalization and offers some explanations about the failure of a generous framework in becoming the so much needed universal guide for database designers. Practitioners might be interested in finding out (or confirming)...
Words: 12110 - Pages: 49