...NWUUser North-West University [Company address] [Document title] NWUUser North-West University [Company address] [Document title] CONTENT PAGE Database Initial Study 1. Analysis of the company situation 2. Define problems and constraints Problems Constraints * Each value in a column must not be null * Values in specified columns must be unique for each row in a table e.g. pens can be distinguished by their respective I.DS. * Primary Key- These are unique and are used to identify individual records e.g. patient_id will return records about a specific patient only. * Foreign Key – Values in specified columns must reference an existing record in another table (via its primary key) e.g. treatment_num from the table treatments can appear as a foreign key value in the pet treatment table 3. Define the system Objectives * Develop a system that cost effective * Understand the way the current system works, and enhance its future performance * Ensure the delivery of a high quality system * External entities must be able to comprehend and manoeuvre the system * Incorporate changes easily and quickly * Share data amongst users * Improve accuracy & consistency * Reduce data redundancy as much as possible * Provide data security from unauthorised access * To always ensure the validity of data 4. Define Scope & Boundaries Scope * The database should be able to generate reports ...
Words: 273 - Pages: 2
...Relational Database Management Systems Object Oriented Databases The database world is in a constant change! New techniques for concurrency control, cloud platforms, object databases, and service platforms are all being changed and talked about in the industrial and academic world. OODB has been around since the seventies when object oriented programming was first being developed. That being said; companies have only started using object oriented databases in the last ten to fifteen years. In the early 1980’s a Microelectronics and Computer Technology Corporation employee begins ORION. ORION is able to handle schema evolution and complex object looking. During the late 1980’s the first wave of commercial OODMS hits. In this time period we get the beginning of Graphael, which later becomes Matisse. Designed to benefit all perspectives of object oriented databases, Matisse combines native support for SQL, Object and XML all in a single database. Next we get the GemStone Systems, the earliest OODB that supports object identity, inheritance and encapsulation. On into the late 1980’s France starts the development of O2. It is C++ compatible and supports multiple inheritances. Later on Vbase was produced, which use the language COP. COP is changed into a C++ based system that supports encapsulation, ability to construct complex objects, and inheritance. (“Short History”, 2005) Once we get into the 1990’s the first standard is released, ODMG 1.0. During this time frame a common query...
Words: 837 - Pages: 4
...1. What is a transaction? What are its properties? Why are transactions important units of operation in a DBMS? As defines by the Elmasri and Navathe, Transaction is a sequence of operations that performs logical unit of operations on a database which include one or more operations as insert, delete, update and modification, Transaction is a executing program, the boundaries of a transaction is define as the explicit begin of transaction and end of transaction. Read-only transaction performs only retrieve data from the database and the Read- write operation includes both retrieving and updating transactions. (Elmasri and Navathe 2010 p.745) The properties of a transaction is define as ACID properties as below, Atomicity, Consistency, Isolation and Durability Transaction is the executing program that executes the operations on the database as read(x), write (x) ,so the transactions plays a vital role among database operations. 2. Draw a state diagram and discuss the typical states that a transaction goes through during execution. Figure1. State Diagram of a Transaction Source: Author Begin transaction: This indicates the beginning of a transaction Active phase: in this phase the running of the database operations or write sql queries for perform the tasks is done Partially committed: After performs the needed operations the transaction indicates end state and come to the phase partially committed and store in the buffer but not permanently. Committed: If the transaction was...
Words: 5571 - Pages: 23
...1. Data is raw facts that have not been processed to reveal their meaning to the end user. Field is a character or group of characters that has a specific meaning and is also used to define and store data. Record is a logically connected set of one or more fields that describes a person, place, or thing. File is a collection of related records. 3. Date independence exists when you can change the data storage characteristics without affecting the program’s ability to access the data. Data independence lacks in file systems because any program that accesses a file system's file must tell the computer not only what to do, but how to do it. Each program must contain lines that specify the opening of a specific type of file, its record specification, and its field definitions. Data dependence makes the file system very difficult from the point of view of a programmer and database manager. 5. Structural independence is exists when you can change the file structure without affecting the application's ability to access the data. Structural independence is important because it would be very difficult to make changes to an existing file structure, resulting in going through a number of steps and producing errors. 7. The role of a DBMS is to serve as the intermediary between the user and the database. The DBMS receives all application requests and translates them into complex operations required to fulfill those request. The advantages of a DBMS are the following: *...
Words: 424 - Pages: 2
...Art Museum Database What is Needed and What Can Go Wrong Craig Hill University of Phoenix Analysis- A database needed to accomidate an art museum would be vary simple an very complicated at the same time. The database would need to have the names of the artists, name of the art and where it is located. Along with the entities stated above, there would also be the details that are unseen in the database. When the art was purchased or donated, the estimated value, the year it was painted, what kind of media was used, ect. In order to have a full database of information you would need the afformentioned data, and that is where you come into trouble and constraints. Problems- The amount of data that could be entered would be endless when it comes to art, so when the database is being created it needs to be taken into account that memory limits are in place. So choosing what query criteria should be used is vital. Obviously you want to be able to search for art by name, easy enough. What if someone at the museum wanted some deeper information such as what art is the oldest, what is the most expensive art and what art was done with a specific type of media. You would need to think critically so that these questions could actually be answered upon request. There are plenty of problems that can stem from database creation. 1. “Poor design/planning 2. Ignoring normalization 3. Poor naming standards 4. Lack of documentation 5. One table to hold...
Words: 671 - Pages: 3
...struktur file database. • Database merupakan kumpulan data yang terkait satu sama lain. Atau sekumpulan data yang terintegrasi yang diorganisasi untuk memenuhi kebutuhan pemakai untuk keperluan organisasi. • Dalam database pastinya mengenal istilah DBMS (Databse Management System) yang mana merupakan suatu koleksi dari program yang mana pengguna bisa mengcreate dan memaintain suatu database. Dalam DBMS terdiri atas proses-proses yang harus dilakuka nyaitu defining, constructing, manipulating dan sharing. Komponen-komponen DBMS yaitu terdiri atas hardware, software, data, prosedur, people. Fungsi dari defining yaitu DBMS harus dapat mengolah pendefinisian data. Fungsi dari manipulating DBMS harus dapat menangani permintaan-permintaan dari pemakai untuk mengakses data. Fungsi dari constructing yaitu DBMS harus mengontrol proses pengiriman data ke penyimpanan medium. Fungsi dari sharing yaitu database memperbolehkan banyak orang dan program untuk mengakses database. • Meta data: informasi terstruktur yang bertujuan untuk mendeskripsikan, menjelaskan, menemukan atau menjadikan informasi mudah ditemukan atau lebih singkatnya seperti dictionary / database catalog. • Database catalog : terdiri atas meta data yang mana definisi dari databse objects seperti table, visual table. • Database system : bersatunya database dan DBMS software. • Program data independence : suatu struktur dari data files yang dikirim di DBMS catalog secara terpisah...
Words: 1618 - Pages: 7
...Assignment #1: Give a short definition for each of the following terms: * Database management system (DBMS): A software package that controls. * Entity: Idea for which you want to store or process data, it can also be a person, place, object, and event. * Attribute: A single data item related to a database object. * Column: Vertical line of characters going from the top to the bottom of the screen. * Field: Single piece of information * Integrity: Data that’s that entered are valid and accurate. * Integrity Constraints: In the database rules that the data must follow. * Redundancy: When unnecessary duplicate of data is in the database. * Data Independence: The form of databse management that keeps the data separate from programs that use the data. Answer the following: 1. What is the relationship between an entity and an attribute? The data related to person, object, or event. 2. What is a database? A structure that can store information about multiple types of entities. 3. What are the advantages and disadvantages of a database (provide 3 each)? Advantages are controlling redundancy, sharing data, and expanding security. Disadvantages are larger file size, increased complexity. 4. What is relational algebra? Identify four different commands and their purpose. A formal system for manipulating relations. Four different commands are Selection whose purpose is to pick rows according to a certain criteria. Projection’s purpose is to pick...
Words: 253 - Pages: 2
...DATABASE ASSIGNEMENT ONLINE STORE DATABSE TABLE NAME * STUDENT/CUSTOMER * ENROLLMENT * COURSES * CATEGORY * ORDERS * ORDER DETAILS * PAYMENT * PRODUCT * SHIPPERS * SUPPLIER/COMPANY TABLES ATTRIBUTES STUDENT/CUSTOMER STUDENT table contain attribute such as: * STUDENT ID-PRIMARY KEY * FIRST NAME * LAST NAME * ADDRESS * POSTAL CODE * CITY * STATE * COUNTRY * PHONE * EMAIL * PASSWORD * CREDIT CARD * CREDIT CARD TYPE ID * BILLING ADDRESS * SHIP ADDRESS * DATE ENTERED ENROLLMENT ENROLLMENT table contain attribute such as: * STU ID-PRIMARY KEY * COURSE ID-PRIMARY KEY * SEMESTER-PRIMARY KEY * INTAKE COURSES COURSE table contain attribute such as: * COURSE ID-PRIMARY KEY * COURSE NAME * FACULTY CATEGORY CATEGORY table contain attribute such as: * CATEGORY ID-PRIMARY KEY * CATEGORY NAME * DESCRIPTION * PICTURE * ACTIVE ORDERS ORDERS table contain attribute such as: * ORDER ID * STUDENT ID * PAYMENT ID * SHIPPER ID * ORDER NUMBER * ORDER DATE * SHIPDATE * REQUIRED DATE * SALE TAX * TIME STAMP * TRANSACTION STATUS * FULFILED * DELETED * PAID * PAYMENT DATE ORDER DETAILS ORDERDATAILS table contain attribute such as: * ORDER IDs-PRIMARY KEY * PRODUCT IDs * ORDER NUMBER * PRICE * QUANTITY * DISCOUNT * TOTAL * IDSKU *...
Words: 289 - Pages: 2
...Year Milestone or Event Impact on Human Services 1996 Amber Alerts • Provides an online integrated national database for missing children • Initiates a widespread alert when a child goes missing 2000 Family Watchdog Provides an online databse of sex offenders This lets citizens to find the lastest information on all sex offenders in there area and other areas. 1992 First smartphone It included a calculator, note pad, and could send and receive faxes, e-mail. This made it easy for them to get information when they are away from their office. 1994 Online banking I made it easy to be able to view your balances, pay bills, make transfers, and deposit checks. You could elect to receive an e-statement this reduces the risk of identity theft. 2013 Emergency Weather Text Alerts It delivers emergency alerts to any cell phone of severe weather. These alerts can be sent out anytimes there are bad weather in the area.These alerts are sent out to enhance public safety. and even a National emergencies like a terrorist attacks of 9/11. This helps to make a game plain to no where all your clients will be. 1995 Online shopping This allows customers to shop for merchandise or services from the comfort of their own home. They could use there credit or debit cards. This helps if you have to get suppys for a client and they are sold out in the store and it can be shipped right to there door. 1993 New information technology for human service workers Success of the new human services...
Words: 478 - Pages: 2
...phones with their ratings and compare between phones features. There are six features from which user can get the data. Feature comparison 1. Battery 2. RAM 3. Operating system 4. Processor 5. Camera 6. Memory The comparison is so designed that user gets to select the price range in which he/she wants to view the mobiles. Excel Features used: 1. Dynamic Charts 2. Slicer 3. Tabs for all other pages. The slicer is a tool that lets the use filter the results according to his / her choice. The price of the mobile is the feature we have used in the slicer. The price range is as follows 1. Below 10K 2. 10K to 18K 3. 18K to 25K 4. 25K to 35K 5. More than 35K All the phones in the databse have been classified into one of these ranges and when the user selects a particular range of price all the mobile phones that belong to that range are selected and a chart is drawn for each of the above mentioned feature. These charts provide the user with...
Words: 631 - Pages: 3
...RUNNING HEAD: Nursing Profession Nursing Profession Nursing Profession A profession is defined as an occupation requiring special education (especially in the liberal arts or sciences). There are many characteristics that make up a profession, for example professionals are considered experts having a higher degree of knowledge and autonomous. Professionals are governed by a code of ethics such as value, quality of service, honor and integrity. A hallmark that is also acknowledged is accountability. There is typically a system in place to test out the competence of professionals. The nursing profession as a whole, through its professional and regulatory organizations, promotes advancement of nursing practice, identifies standard of practice and promotes professional development (Bassendowski & Petrucka 2009). Historically, nursing has been understood as a calling or a vocation, but modern, secular nursing has essentially understood itself as a profession and, more recently, as a practice (Liaschenko, & Peter, 2004). Although it is considered to be a profession by those in nursing, it has not been categorized as a true occupation in the sociology of professions’ literature, one of the key issues is related to the formal knowledge of nursing and the power associated with it (Yam, 2004). It has been argued that nursing does meet the professional criteria and it is a clear it does not now and never did have...
Words: 794 - Pages: 4
...Research in Sustainable Energy Economics Shuddhasattwa Rafiq Greenpeace Video on Sustainable Energy.mp4 Presentation Plan • Motivation • Research areas • Papers and proposals in different research areas Motivations To undertake meaningful academic and professional research in the field of energy economics which would ultimately lead to delivering key sustainability principles in regional, national and international levels. Pure data driven analytical studies based on recent quantitative research underpinnings strengthen sustainable energy planning to ensure community involvement, inter-generational equity, biological diversity, ecological integrity, and precautionary social and environmental investment. Research Areas • • • • Energy Conservation Renewable Energy Sustainable Mining Community Oil Price Volatility Energy Conservation (a) Rafiq, S. and Salim, Ruhul A. 2010, ‘The Linkage between energy consumption and income: A multivariate cointegration analysis in developing economies,’ International Journal of Emerging Markets, forthcoming. (b) Rafiq, S. and Salim, Ruhul A. 2009. ‘Temporal causality between energy consumption and income in six Asian emerging countries,’ Applied Economics Quarterly, Vol. 55, no. 4, 335-350. Objective: • Identifying energy conservation possibilities in emerging economies by implementing a multivariate demand side time series econometric analysis. (c) Rafiq, S., Salim, Ruhul A. and Bloch, H. 2010, ‘Relationship between oil consumption...
Words: 704 - Pages: 3
...“ Spanner : Google’s Globally – Distributed Database “ Spanner is a NewSQL created by google. It is a distributed relational database that can distribute and store data in google’s big table storage system in multiple data centers. Spanner is Google’s scalable, multi-version, globally distributed, and synchronously-replicated database. It is the first system to distribute data at global scale and support externally-consistent distributed transactions. Spanner provides the scalability that enables you to store a few trillion database rows in millions of nodes distributed to hundreds of data centers. When you read data, spanner connects you to data center that is geographically closest and similarly when we write the data, it distributes and stores it to multiple data centers. If in case the data center we try to access has a failure we can read the data from another data center that has a replica of the data. Replication is used for global availability and geographic locality clients automatically failover between replicas. Applications can use spanner for high availability even in the face of wide-area natural disasters, by replicating their data within or even across continents. Spanner’s main focus is managing cross-datacenter. Many applications at google have chosen to use Megastore because of its data model and support for synchronous replication despite poor throughput. Applications can specify con-straints to control which datacenters contain which data, how...
Words: 2222 - Pages: 9
...1. What is different between TRUNCATE and DELETE? The Delete command will log the data changes in the log file where as the truncate will simply remove the data without it. Hence Data removed by Delete command can be rolled back but not the data removed by TRUNCATE. Truncate is a DDL statement whereas DELETE is a DML statement. 2. What are ORACLE PRECOMPILERS? A precompiler is a tool that allows programmers to embed SQL statements in high-level source programs like C, C++, COBOL, etc. The precompiler accepts the source program as input, translates the embedded SQL statements into standard Oracle runtime library calls, and generates a modified source program that one can compile, link, and execute in the usual way. Examples are the Pro*C Precompiler for C, Pro*Cobol for Cobol, SQLJ for Java etc. 3. What is difference between procedure and function. A function always returns a value, while a procedure does not. When you call a function you must always assign its value to a variable. 4. What are things you do to reduce patch timing ? You can take advantage of following - # Merging patches via admrgpch # Use various adpatch options like nocompiledb or nocompilejsp # Use defaults file # Staged APPL_TOP during upgrades # Increase batch size (Might result into negative ) 5. What is the purpose of a cluster? A cluster provides an optional method of storing table data. A cluster is comprised of a group of tables that share the same data blocks, which...
Words: 3117 - Pages: 13
...SECURITY WEAKNESSES FOR QUALITY WEB DESIGN Contents Course........................................................................................................ Error! Bookmark not defined. Introduction ............................................................................................................................................ 3 Abstract .................................................................................................................................................. 4 Company Background.............................................................................................................................. 4 Software Weaknesses and Recommendations......................................................................................... 5 Hardware Weaknesses and Recommendations........................................................................................ 6 Network Security flaws and Recommendations ....................................................................................... 7 REFERENCES:........................................................................................................................................... 7 Introduction A company that deals with making web site and web business solutions is known as Quality web design. The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting...
Words: 1406 - Pages: 6