Free Essay

Database Hw2

In:

Submitted By andaskarlek
Words 778
Pages 4
2.1 Define the following terms:
Data Model – a collection of concepts that can be used to describe the structure of a database i.e. the types, relationships and the constraints that should hold good on the data contained in the database.
Database Schema – The description of a database is called its database schema.
Database State – The data in the database at a particular moment in time is called a database state. It is also called the current set of occurrences or instances in the database.
Internal Schema – Internal Schema is one of the major parts of the Three Schema Architecture of a Database. It describes the physical storage structure of the database.
Conceptual Schema –is a map of concepts and their relationships used for databases. The conceptual schema hides the details of physical storage structures and concentrates on describing entities, data types, relationships, user operations, and constraints.
External Schema -- External Schema describes the part of the database that a particular user group is interested in and hides the rest of the database from that user group.
Data Independence – the capacity to change the schema at one level of a database system without having to change the schema at the next higher level.
DDL – DDL or Data Definition Language is used to specify conceptual and internal schemas for the database and mappings.
DML – DML or Data Manipulation Language as the name suggests is used for typical manipulations include retrieval, insertion, deletion, and modification of the data.
SDL –The storage structures and access methods used by database system are specified by a set of definition in a special type of DDL called data storage-definition language.
VDL – VDL or View Definition Language is used to specify user views and their mappings to the conceptual schema.
Query Language -- a high-level DML used in a stand-alone interactive manner.
Host Language -- Whenever DML commands, whether high-level or low-level, are embedded in a general-purpose programming language that language is called the host language and the DML is called the data sub language.
Database Utility -- help the DBA in managing the database system.
Catalog – which contains information such as the structure of each file, the type and storage format of each data item, and various constraints on the data. The information stored in the catalog is called meta-data, and it describes the structure of the primary database.
Client /Server Architecture – The client/server architecture was developed to deal with computing environments in which a large number of PC’s workstations, file servers, database servers, Web Servers and other equipments are connected via a network.
Three Tier Architecture – Three Tier Architecture consists of 3 layers namely – Client, Application Server and Database Server. The Application Server layer accepts requests from the Client, processes them and issues the appropriate command to the Database Server for getting the results.
N Tier Architecture – If the layers of the three tier architecture are further divided into layers of Application Server and Database Server it is called an n- tier architecture.

2.10 Discuss some types of database utilities and tools and their functions.
1. Loading: A loading utility is used to load existing data files into the database. Usually, the current format of the data file and the desired database file structure are specified to the utility, which then automatically reformats the data and stores it in the database.
2. Backup: A backup utility creates a backup copy of the database, usually by dumping the entire database onto tape. The backup copy can be used to restore the database in case of catastrophic failure.
3. File reorganization: This utility can be used to reorganize a database file into a different file organization to improve performance.
4. Performance monitoring: Such a utility monitors database usage and provides statistics to the DBA. The DBA uses the statistics in making decisions such as whether or not to reorganize files to improve performance.

2.11 Think of different users for the database shown in figure 1.2. what types of applications would each user need? To which category would each belong, and what type of interface would each need?

Different users can be: * The registrar office which would basically need to have all the information about the student enrolled in a particular program. It would probably make use of the Student, Course and Section table. * The department in which the student is currently enrolled in. The department need not have the information about the student’s enrolment in the college as a whole. It would basically require its program information related to the students. As a result, the department would probably make use the GRADE_REPORT and the PREREQUISITE table.

Similar Documents

Premium Essay

Mis Project

...Applied Research Project Topic Selection: Review the list of possible topics and consider which you would like to research. Identify a company or which the topic would apply. You can use the Week 1 Q&A thread to pose any questions you may have about the research project. Post your chosen topic for my approval in the (required but ungraded) Discussion topic entitled "Applied Research Project" in Week2. You will be given feedback to make sure that you're on the right track for this assignment. If there are still questions regarding the project, the Q&A discussion in Week 3 will accommodate our continued discussion about the project. Applied Research Project Submission: Submit your assignment to the Week 6 Research Paper Dropbox located on the silver tab at the top of this page. (200 points) Dropbox | For instructions on how to use the Dropbox, please click here.See Syllabus/"Due Dates for Assignments & Exams" for due date information. | | | Topic Selection | | Week 1 Applied Research Paper Assignment: Topic Review  Read the following description and possible topic choices. Week 2 Applied Research Paper Assignment: Topic Selection (ungraded but required) Choose your research project topic and prepare a brief description of your proposed topic. Post your proposed title and brief description in the Week 2 Applied Research Project discussion topic. Your description will be reviewed, and you will then receive feedback and approval of your topic choice...

Words: 2482 - Pages: 10

Premium Essay

Access Control

...system will be developed. In this stage, any development requirements will be completed. This may involve the development of a database system or modification of a commercial off the shelf system. During the integration phase, the physical installation of the system will occur. This is followed by testing. Once testing has been completed, the major project scope ends and the project enters into a maintenance phase. Major Tasks There will be five major tasks in this project, including: 1. Analysis and Design a. Design Documentation i. With this task, documentation is written up to describe the work that needs to be completed. This documentation is reviewed by all stake holders to ensure that the requirements are have been accurately conveyed and understood. b. Design Models i. With this task, flow charts and/or use case are created to describe the functionality. These documents are of particular importance to members of the project team, as they provide a model for the actual system 2. Development a. Database i. Depending on the results of the analysis and design task, either a custom or a commercial off the shelf system will be used. This system will require development or customizations to meet specific needs. b. Interface i. An interface is required to view access records. This is the front-end of the database. This is either included in a pre-packaged system or custom developed. 3. Integration a. Install radio-frequency card...

Words: 479 - Pages: 2

Free Essay

Wk 3 Reflection

...course we begin to think about how what we have learned the previous week can apply to our personal and professional lives. We begin to think of ways we use these tools in our daily lives and how we can apply them in the future since we have learned about them. In week two of this class, we began to understand how databases are used in the world. The databases range on use and size but are used by millions without the realization of them. Many of us use them in our workplace and never gave a second thought to how life would be more difficult without them. The databases used in a work environment can hold the information inputted into them for a very long time. This allows us to go back and use the information with a stroke of the keys and click of the mouse. Without the databases that are utilized we would have to hope the hard copy of this information is filed correctly and easy to access. The databases can be used in our personal lives through organizing personal information. For example, keeping a record of one’s family genealogy could be contained in a database that many members of the family can access and add information to. A budget can be maintained in database to allow the information to be maintained and updated daily, allowing the family to stay on top of the finances without tons of paper work. We also examined how social networking can be relevant in the workplace. Each person has a different view of whether it is a positive or negative tool. It comes down to maintaining...

Words: 402 - Pages: 2

Free Essay

Apple

...Apple Operating System and Software Applications Lejon Starks, Ryan Sherrett, Melody Sheline, Phillip Mings, Mahsa Zeyghami | BIS 320 | | | | September 05, 2013 | | | Sherry Clarkson Apple Operating System and Software Applications Think of a specific organization (APPLE is our choice for this assignment) with which one of your group members is familiar and determine the main operating system, software applications used, and a one of a kind software application. Create a table like the example located on the student website for your specific organization. Introduction – (I will take this part) Operating System and Applications  Describe how the operating system and applications help the company reach their objectives – Ryan please take this section – (At least 400 words) Functions of Computer Hardware Describe the functions of computer hardware components used in the organization. Provide at least one example of input hardware, output hardware, and storage hardware and describe how they are used in the organization. – Phillip take this section – (At least...

Words: 274 - Pages: 2

Premium Essay

Cis111

...The Advantages of a relational Model According to ACME Global’s website the mission of ACME Global is to “Help clients achieve profitable growth by aligning and improving customer facing processes and by continually seeking ways to improve operational performance"(“ACME Global,”2014) Because of your consultants over 100 clients maintain successful business with financially and operationally sound strategies. To continue this success and expand on that success a relational model would be easy to use. The revision of any information as tables consisting of rows and columns is much easier to understand. This would play a vital role in organization of not just your consultants but when you stop and look at your clients and the data you are responsible to managing along with the common data and information you want to know. An E-R Model provides Flexibility: Different tables from which information has to be linked and extracted can be easily manipulated by operators such as project and join to give information in the form in which it is desired. This would be most beneficial to you when you look at your areas of Strategic Development and Business planning, marketing & Sales Strategy and your Operations and Organization Management. In all of these are areas are key data and resources of ACME Global that would be enhanced by using a relational model. Purpose of an E-R Model Specific to ACME Global Consulting ACME Global along with your partner Deegit, Inc. deliver innovative...

Words: 672 - Pages: 3

Free Essay

Gdfdggd

...QUESTION YOUR ANSWER (MAX 300 WORDS TO ANSWER EACH QUESTION) MARKS 1. Describe how knowledge about online resources or database searching will help in your future studies and career? To begin with, online resources or data base searching has been a tremendous and effective contributing factor towards the fast and easy researching method my colleagues, myself and other learning colleagues are using widely in the twenty-first century. Fortunately, online resources have created essential communication skills between me and my colleagues, tutors and other acquaintances around the universe. This method has enabled me interact via online through discussing and exchanging learning information. However, the effect has not only made it easy for the general public and myself to access accurate and non-accurate information, but has also contributed in developing and improving social development/network. Most importantly, it has given me the privilege to search more than one database to enable obtaining a successful research project. Furthermore, the aspect of locating the right source is an enormous issue. Example is researching using Google and Google scholar. The difference is that, Google scholar is peer-reviewed but Google is not. Based on this evidence, not all information is academically evaluated or peer-reviewed before it is made public on the internet. Database searching enable me learn different techniques in acquiring successful research. Examples are: I get the privilege to...

Words: 353 - Pages: 2

Premium Essay

Database

...Software Requirements Specification October 28, 2013 Window App for Sending SMS to mobiles via internet from your computer Submitted by: Muhammad Gulfam Submitted to: Engr. Natasha Nigar Software Engineering Table of Contents Table of contents……………………………………………………………………. List of figures……………………………………………………………………….. 1. Introduction………………………………………………………………….3 1. Purpose……………………………………………………………...3 2. Scope of project……………………………………………………...3 3. Glossary……………………………………………………………...3 4. Overview of document……………………………………………….4 2. Overall Description……..…………………………………………………......5 2.1. System Environment...……………………………………………….5 2.2. Functional Requirement Specification ……………...……………….6 2.2.1. User use cases………………………………………………...6 2.3. User characteristics …………………………………………………….11 2.4. Non Functional Requirements ……………………………….…………11 3. Requirement Specification …………………………………………………..12 3.1 Functional Requirements ……………………………………………12 List of diagrams Fig.1 System Environment ………………………………………………………….3 1.0. Introduction 1.1. Purpose The purpose of this document is to present a detailed description of the Window App for Sending SMS to mobiles via internet from your computer. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must...

Words: 2905 - Pages: 12

Free Essay

Ibm Db2

...IBM DB2 Express – C Introduction The intent of this paper is to describe the installation process of the Microsoft Windows version of the IBM DB2 Express-C database. This is a light-weight version of the more fully featured configuration of IBM’s best-selling DB2 database and includes core DB2 capabilities, free administration, development, autonomic, XML support and access to the online communities and forums. The version downloaded and running is configured for dual core processors and supports up to 2GB of system memory. Insights gained from working with the database after installed are also shared. Installation Process for DB2 Express-C Downloading and installing DB2 Express-C is easily accomplished over an Internet connection. The version installed is 389MB and took approximately 10 minutes to download over a cable modem running at fractional T1 speeds. Installation screens from the steps completed to get DB2 Express-C up and running are shown in the Appendix of this document. After installing the Control Center was invoked at the command line using the command db2cc which is specifically defined in the chapter assigned on DB2 Express-C. Using the command db2sampl -xml –sql to create the sample data worked, and there is the secondary option of using graphical interface commands to accomplish the same. The use of the DB2 Command Line tools show how quickly a multidimensional table can be viewed, edited and batch programming tasks completed using shell scripts...

Words: 728 - Pages: 3

Free Essay

Cover Letter

...WORK EXPERIENCE Data Processing Company – Coventry DATA ENTRY CLERK June 2008 - Present Working as part of a team in a busy office environment processing, cleaning and then imputing data. Accurately entering the business names , addresses and financial details of on businesses and individuals. Duties: Ensuring report tables and listings accurately reflect data within a database. Entering data accurately onto computerised databases & Excel spreadsheets. Locate and correct data entry errors. Lifting of files and boxes containing paper records. Maintain logs of activities and completed work. Ensuring documents meet required quality standards. Compiling, coding, categorizing, calculating, tabulating and auditing data. Handling inbound telephone queries from colleagues / clients regarding data . Data manipulation in Excel spreadsheets. Occasionally carrying out various administration tasks like, photocopying, filing. Reviewing validation output and performing specified manual checks on the data to ensure consistency and completeness. KEY SKILLS AND COMPETENCIES Excellent knowledge of Excel & other specialist database tools & software. Computer literate with extensive IT knowledge. Experience of using a scanner and working with TIFF image files. Experience working with Sage systems. Enthusiastic, flexible and capable of working on own initiative. Comprehensive understanding of the Data Protection Act. An ability to work to deadlines whilst ensuring accuracy and efficiency. Capable of...

Words: 267 - Pages: 2

Free Essay

Unit 3 It255 Access Control

...1. RAS server provides the most secure method for remote access to the network if it is reburied. 2. Never allow client computers on the network to answer remote access connections. 3. Organize all remote access servers in a centrally controlled location. 4. Servers have no need to originate dial-out connections (Except when using telephone lines as low cost WAN connections, but these connections should be relatively permanent). 5. To simplify security administration, allow only one method of remote access into the network. 6. Remote access control procedures must provide adequate safeguards through robust identification, authentication and encryption techniques. 7. Carefully consider the wisdom of providing cellular telephones and modems for use with laptop computers. This technology isn’t usually justified considering the relatively modest increase in productivity compared to the cost and the security risk of a lost laptop. 8. Consider using only the NetBEUI protocol for remote access to limit the extent of intrusions on the network. 9. Control the distribution of remote access software on the network. Never allow client computers to run remote control software. If remote control software is necessary, run the software from centrally controlled computers or thin-client servers. 10. Disable dial-in networking, except in the cases of trusted individuals or to special computers,because dial-in networking can bypass regular network security. ...

Words: 609 - Pages: 3

Premium Essay

Events Management

...Computer Science department of Afe Babalola University Ado-Ekiti Ekiti state, intend to explore the discuss of Events Management and implement my foregained knowledge in my field of study, Computer Science, in the development of an application software which may be used in the planning and management of events. This application software would be able to ensure the supervision of planned out events be it of a corporate nature such as product launches, press conferences, corporate anniversary parties, meetings, conferences e.t.c. or private/ personal events such as birthdays, weddings, anniversaries e.t.c.. The software would provide an easy means for event managers to store information and data about proposed and organised events from a database, retrieve such data when necessary...

Words: 589 - Pages: 3

Premium Essay

Database

...Jackie Tau PT2520/Database March 23, 2013 Lab 1.2 –Define Major Topics for a Database Nouns | Major Topic | Hospitals | Conducting a double blind test of a new depression drug | Doctors | Need to be able to see their own patient’s information and be able to enter blood pressures, blood results, depressions indicators, notes, etc. | Patients | Should be able to see their own medical profile, doctor notes | Drugs | A new drug will be dispersed in generic bottles, given to half of the patients for depression & to test the side effects. | Lab1.3- Create a Statement of Work Grandfield College: There is a law that requires businesses’ including schools, track their software. It is important to know what software the school owns, the versions, & license agreement. They’re a several licensing schemes. The least restrictive is a site that allows am institution to have a copy of the software in any machine in the school property. It is also important for the school to know which software is installed on the machine, location & which users have access. The school just wants to track the faculty & staff computers & software. For students it will be separate & treated as a second project later. Lab 1.4 –Challenge Activity 1. Describe a situation in which the database might become inconsistent. * Transaction failure, database system failure, 2. How could a relational database ensure data consistency? * Data integrity 3. What...

Words: 262 - Pages: 2

Free Essay

Sddedwe3E3Ee12We3W23E3E

...eLibrary Project Proposal Project Name: Online Library Management System - eLibrary. Project Members: This project is done in a group of two people. Project members are. 1. Atanu Maity 2. Problem Statement: Today most of the library is using either manual system for tracking the day to day activity or they are using desktop, stand-alone system to manage the day to day activity. In this proposed online eLibrary Management System it will run in internet or intranet and user can online check the book availability, they can search the books, library staff can issue, receive book, management can check the report from different location via internet. It can be used multi location also as it can be hosted in central location. Why eLibrary? The online eLibarary Management System is used to overcome the entire problem which they are facing currently, and making complete atomization of manual or semi automatic process of library management system. • Improve the search facility and members and library staff should get all the information in a second. • Should capable to use bar code reader for easy way to do book issue and receive process. • Library member should have limited and read-only access to the system via internet. • Library member should able to view member profile and transaction data pertinent only to them. • The supervisor should be able to enter or update master information like publisher’s details, authors and book details in one...

Words: 563 - Pages: 3

Premium Essay

Database Paper

...Database Dictionary.com defines database as “a systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated”. In today’s business, organizations run on data that have been processed into information and knowledge. That information is used by managers to apply to business problems and opportunities. Furthermore the data is transformed into knowledge and solutions in many different ways after detail analysis. Because data and information are processed in several stages and often in several places, they are frequently subject to problems and difficulties. Managing data in organizations is difficult for many reasons, so organizations in the effort to manage all of the data, developed databases to organize all of the collection. These databases are managed using database management systems, and by utilizing different applications. In our organization, we do have a database that we use for our data collection and analysis and storage of all the data we collect. We also use several applications in the daily operations of our business which I will explain further in this paper. Our organization is currently using several applications to make our processes more precise, effective and efficient. Currently, our organization is using a Sybase SQL database as the main database for all of our business functions. This database delivers extreme transaction processing and access to mission critical information...

Words: 732 - Pages: 3

Premium Essay

Database Systems

...Database Systems name 3-12-2012 Web-407 Advanced Web Development instructor's name Introduction Most companies need some type of database. A company may be small or extremely large but they all share one thing in common, if they make any type of product, sell anything, keep contacts, balance the books, pretty much anything a business can any will do, they need some type of database or multiple databases to store and later retrieve the data a typical business generates. Choosing the right database is even more important in the age of the Internet, products and services can be sold around the world now and the data from shopping carts and other payment and shipping needs a database too. This article will go into a bit more detail on some of the types of databases that are available and how to pick the right one for your company. Open Source vs. Proprietary This is the big question on a lot of businesses minds these days. Rather to try and cut costs by integrating an Open Source database or a proprietary one. First off let us go over what open source means. Open source software, in this case a database, is software that generally has a limited license for free using. The software is developed and maintained by developers and coders around the world that continuously work at improving the software but providing security upgrades and bug fixes. Proprietary software on the other hand is generally developed, upgraded and patched by a company that sells or licenses the software...

Words: 1313 - Pages: 6