...Kudler Fine Foods goals are to increase loyalty of consumers and profitability. To be able to achieve these goals Kudler Fine Foods needs to expanding the services, implementing the frequent shopper program and to reduce costs through better bargaining with the suppliers and improved inventory management system. Kudler Fine Foods steps of collaboration should take place in the area of forecasting. Kudler Fine Foods should be coming up with ways to that will attract the most customers into the store. They can do this by setting up in-store cooking class special and promoting their new frequent shopper, Kudler Fine Foods also needs to forecast how they will handle the inventory levels so nothing is either overly or underlie stocked. Kudler Fine Foods second step is to coordinate the function of merchandise selection and pricing. This is to make sure that the right so that the right merchandise is available to the customers while they are in the implementation of frequent shopper program. Also during this stage Kudler Fine Foods has good products available for their customers from their suppliers. In the third step, the function of inventory management should fine tuned with the expansion of services campaign and implementation of frequent shopper program of Kudler Fine Foods to introduce Just In Time technique. The introduction of JIT will help reduce the costs for Kudler Fine Foods. In the fourth step there should be close coordination with the accounting function. This is...
Words: 519 - Pages: 3
...setup c drive, 8000, set d drive for rest in windows setup Mandatory prerequisites Only use the support programs included our 'AIO Software Pak'! Fresh install of Windows 2000/XP/2003 All Service Packs and Patches applied Hard Drive Partition 'C:/' (System) - Min 5 Gigabytes Hard Drive Partition 'D:/' (System) - Min 60 Gigabytes Make SURE the sensor has a Static TCP/IP settings and can get to the Internet Deactivate any Firewall application on the Windows Intrusion Detection System (WinIDS)! The new WinIDS sensor MUST be allowed to see ALL the network traffic. We would strongly suggest that the Microsoft Baseline Security Analyzer (MBSA) is used to identify and correct common security miss configurations and resolve each issue prior to starting this install. Pre-installation Tasks -Make SURE that 'Internet Information Services' has been removed prior to starting this guide. If your unsure, go into the add/remove programs, select 'add/remove windows components', make SURE the 'Internet Information Services' radio box is unselected, if selected, unselect 'Internet Information Services', and remove the application, and all associated components. -Edit hosts file 127.0.0.1 winids Download the 'WinIDS - All In One Software Pak' and extract the contents into the d:\temp folder. Installing the Basic Windows Intrusion Detection System (WinIDS) Install WinPcap Navigate to the d:\temp folder, double left-click on the 'WinPcap...' file, left-click...
Words: 4494 - Pages: 18
...2010-04-13[11:16:39]: Logging started mode 01570 ---- LOG ROW INFO [0000010] ---- ---- LOG TABLE INFO [0000020] ---- ---- LOG DB INFO [0000040] ---- ---- LOG DBMS INFO [0000100] ---- ---- LOG SQL INFO [0000400] ---- ---- LOG DEBUG INFO [0001000] ---- Portingset mode 6.1c >>msql_attach_server -------------------------------------------------------------------------------- EFFECTIVE MSQL DRIVER SETTINGS -------------------------------------------------------------------------------- Common ~~~~~~ Level : 1 msql_dsn : msql_serverhost : (local) msql_init : 003000 000001:MSQL_ARRAY_FETCH : 0 000002:MSQL_ARRAY_INSERT : 0 000004:MSQL_EXPLAIN : 0 001000:not MSQL_USE_VARCHAR : 1 002000:MSQL_LEVEL1 : 1 004000:MSQL_PRINT_ERROR : 0 010000:not MSQL_LEVEL1 : 0 msql_use_cc : OFF msql_use_sp : ON msql_max_open_handles : 190 msql_max_ret_rows : 0 msql_max_arrsz : 1 msql_array_fetch : 0 msql_array_insert : 0 msql_log_warnings : 0 msql_lock_timeout : 10 (timeout after N seconds) msql_max_sql_buffer : 8000 msql_use_ffo : 1 msql_65_schema : 0 msql_odbc_prof_all : 0 msql_odbc_perf_stat : 0 msql_odbc_long_queries : 0 msql_odbc_query_timeout : 3000 -------------------------------------------------------------------------------- msql_alloc_henv id 8393960 Done. allocate_sql_buffer_area size 8000. msql_attach_server done... tbase_refresh D -1 ...
Words: 92865 - Pages: 372
...not in the First Normal Form • Convert an unnormalized table into the First Normal Form • Take a table that is in the First Normal Form and convert it to the Second Normal Form. • Take a table that is in the Second Normal Form and convert it to the Third Normal Form. • Identify table keys. ASSIGNMENT Below are a series of two exercises along with a list of requirements for completing each. In the first activity, you will be required to read through each of the steps and convert an unnormalized table into a normalized table as you create an E-R diagram. In the second activity, you will be required to take an existing E-R diagram and create a database schema. EXERCISE 1. Normalization of the ORDERS Table The purpose of this exercise is for you to demonstrate your ability to take an unnormalized table and convert it up through the third normal form. Upon completion of this exercise you will have: • Discussed why the step one table is not normalized • Converted the table in step one to the First Normal Form • Converted the table created in step two into the Second Normal Form • Converted the table created in step three into the Third Normal Form • Identified all of the names, attributes, and keys associated with each of the tables EXERCISE 1 DIRECTIONS To complete exercise one, you should do the following: 1. Read and complete each of the four steps identified under exercise one 2. Create a response for each step listed under exercise one 3. Create your response in MS Word 4...
Words: 1441 - Pages: 6
...NextScheduledMaintenanceID Type Varchar(20) Int Int Int Key Type PK FK FK FK Allows Nulls MakeModel Cols ID Year MakeID ModelID Type Int Int(4) Int Int Key Type PK FK FK Allows Nulls Makes Cols ID Make Type Int Text Key Type PK Allows Nulls Models Cols ID Model Type Int Text Key Type PK Allows Nulls TruckMaintenanceHistroy Cols ID PerformedOn PerformedBy MaintenanceSheetID Type Int DateTime Int Int Key Type PK FK FK Allows Nulls TruckMaintenanceSheets Cols ID Status Type Int Int Key Type PK FK Allows Nulls TractorUnitPerformed EngineCompartmentPerformed CabinPerformed AirDamPerformed AirTanksPerformed FuleTanksPerformed WheelsPerformed BrakesPerformed AxelPerformed Bool Bool Bool Bool Bool Bool Bool Bool Bool Trailers Cols VIN TypeID LastMaintenanceID NextScheduledMaintenance Type Varchar(20) Int Int Int Key Type PK FK FK FK Allows Nulls Yes Yes TrailerTypes Cols ID Name TypeSpecID Type Int Text Int Key Type PK FK Allows Nulls TypeSpecs Cols ID Dimension_L Dimension_W Dimension_H LoadCapacity Weight Type Int Varchar(6) Varchar(6) Varchar(6) Varchar(6) Varchar(6) Key Type PK Allows Nulls TrailerMaintenanceHistroy Cols ID PerformedOn Type Int DateTime Key Type PK Allows Nulls PerformedBy MaintenanceSheetID Int Int FK FK TrailerMaintenanceSheets Cols ID Status FifthWheelCouplingPerformed CargoSpacePerformed LoadingDoorPerformed LandingGearPerformed WheelsPerformed BrakesPerformed AxelPerformed Type Int Int Bool Bool Bool Bool...
Words: 360 - Pages: 2
...routine maintenance, track parts inventory which helps prevent slowdowns in production. Parts Inventory Purchases Transaction ID Auto Number Primary Key Purchase Date Date/Time Purchase Price Currency Quantity Numeric Value Rationale of primary key – The Transaction ID should be a unique number which can be tracked back to the parts inventory purchase table and will make a perfect Primary Key. Rationale for foreign key 1 – There will be no foreign keys in this table as no other table for the Fleet Truck Maintenance will be using one of the values as a Primary Key. Rationale for foreign key 2 – There will be no foreign keys in this table as no other table for the Fleet Truck Maintenance will be using one of the values as a Primary Key Parts Inventory Issues Transaction ID Auto Number Foreign Key 1 Issue Date Date/Time Purchase Price Currency Quantity Numeric Value Parts Inventory ID Auto Number Primary Key Rationale of primary key – The parts inventory ID will be used as the primary key for the Parts inventory issues as it will be an auto number. The transaction ID can’t be used as it is already a Primary Key for another Table. Rationale for foreign key 1 – The Transaction ID will be Foreign Key 1 as it is being used as a Primary Key for the parts inventory table. Rationale for foreign key 2 – There will be no foreign key2 in this table as no other table for the Fleet Truck Maintenance...
Words: 1514 - Pages: 7
...primary key occurs when you define more than one column as your primary key. A char string can be up to 8,000 characters long. By definition, a primary key must be unique and must have a value (which is not null). How can you prevent the accidental loss of an entire table? Referential integrity How many bytes does a single character take up if it is a varchar that supports English and most European languages? 1 byte How many bytes does the int data type take up? 4 bytes How many bytes does the money data type take up? 8 bytes How many clustered indexes can you have for a table? 1 How many non-clustered indexes can you have? 999 If you define a primary key, what level have you reached? 1NF What are previously written SQL statements that have been stored within a database? Stored procedures What are the two types of indexes? Clustered and non-clustered What clause is used to combine related data from multiple table sources? JOIN What clause would you use with the SELECT command that would pull records based on a range? BETWEEN What command do you use to perform a query in SQL? SELECT What command is used to execute a stored procedure? exec What command would you use to delete a table while leaving the table structure in place for future use? TRUNCATE TABLE What common data type is used to store decimal numbers such as 3.14 and 7.07? Float What common data type would be used to count objects? integer What data type should you...
Words: 909 - Pages: 4
...3.1 Discuss the role of a high-level data model in the database design process? High-level data models assist in conceptual design and helps express data requirements of the users and includes detailed descriptions of the entity types, relationships, and constraints. The high-level data model is also used as a reference to ensure that all users’ data requirements are met and that the requirements do not include conflicts. 3.2 List the various cases where use of a null value would be appropriate? Null value would be appropriate when a particular entity does not have an applicable value for an attribute. There are two cases for such situations. The first case arises when it is known that the attribute value exists but is missing. An example for cases like such would be if the Height attribute of a person is listed as null. The second case arises when it is not known whether the attribute value exists. An example would be is the HomePhone attribute of a person is null. 3.3 Define the following terms: entity, attribute, attribute value, relationship instance, composite attribute, multivalued attribute, derived attribute, complex attribute, key attribute, value set (domain)? Entity Entity is a “thing” in the real world with an independent existence. It can also be an object with physical existence (i.e. person, car) or conceptual existence (i.e. company, job). Attribute An attribute is a particular property that describes entity (i.e. person name company...
Words: 1644 - Pages: 7
...Fwpg;G • Every key button on the tamil keyboard has TWO type of tamil alphabet. jkpo; jl;lr;rpy; xt;nthU fP gl;lDf;Fk; ,uz;L tpjkhd vOj;J mikg;Gfs; cz;L • The tamil alphabet that is in purple colour, can only be typed if “SHIFT” key button is pressed. mjpy; cj tHzk; vOj;Jf;fs; mikg;G “rpg;l;” gl;ld; mOj;jpdhy; fpilf;Fk; • The tamil alphabet that is in red colour, can be typed normally without “SHIFT” key or “CAPS LOCK” key buttons. rpfg;G tHzk; vOj;Jf;fs; mikg;G “rpg;l;” gl;ld; my;yJ “fhg;]; yhf;” gl;ld; gad;gLj;j njit ,y;iy. • Example / cjhuzkhf: If press key “a” (No shift key button) “a” tamil alphabet will form If press key “A” (With shift key button) “A” tamil alphabet will form “a” vd;w vOj;jpw;F (rpg;l; gl;ld; jl;l Ntz;lk;) “a” Tk; “A” vd;w vOj;jpw;F (rpg;l; gl;ld; jl;lTk;) “A" Tk; cs;sJ Please try to type other tamil alphabet as directed above. Ntw jkpo; vOj;ij ilg; nra;a Nky; cs;s topia gpd;gw;wNthk;. • Other example / Ntw cjhuzk;: To type “fp” first press key button “f”(No shift key button) then press key button “p” (No shift key button). “fp” vd;w vOj;ij ilg; nra;a Kjy; “f” vd;w Mq;fpy vOj;ij; (rpg;l; gl;ld; jl;l Ntz;lk;) gad;gLj;jTk; gpwF “p” vd;w Mq;fpy vOj;ij (rpg;l; gl;ld; jl;l Ntz;lk;) gad;gLj;jTk;. To type “fP” first press key button “f”(No shift key button) then press key button “P” (With shift key button). “fP” vd;w...
Words: 602 - Pages: 3
...different shifts, the library also has popularity among all sectors of population Purpose: The purpose of this project is to update the existing library system to a fully automated search system enabled library, thereby making the library functionality fast and easy, this database will also support users to gather their required information without depending on any one, the library usage data will also act as a great resource to develop efficient strategies for further development of the library. Business goals and rules: The requirement of this project is to create a database to a library, and enable automated searching system, where a user can easily find the location of a particular book based on the author, publisher or book type etc. Every user in the library can access the location and availability of a book through his \her account, the administrator of the library has access to his and all the user accounts, and can track the details of books, the administrator must also get notifications of users who fails to return a book back in time, every user must get a reminder notification about the due date of a book return User Requirements: Every user who is supposed to have access to this library must have unique user id and password; user must be capable of reading and understanding English Data requirements: The library must provide all the information that is relevant to all the entities and their attributes listed below, the book availability must also be...
Words: 2249 - Pages: 9
...Management System - DBMS - A collection of components that supports: 1. creation, user, and maintenance of databases 2. data acquisition, dissemination, retrieval, and formatting Table – a named, two-dimensional arrangement of data. A table consists of two parts: Slide 5 1. heading defining a) table name b) column names 2. body containing rows of data Structured Query Language - SQL – an industry standard database language that includes statements for database definition, database manipulation, and database control. Nonprocedural Database Language - a language such as SQL that allows you to specify the parts of a database to access rather than to code a complex procedure and also does not include looping statements Three Types of SQL Statements Data Definition Language – DDL – SQL statements for database definition Examples: CREATE TABLE, CREATE VIEW, etc. Data Manipulation Language – DML – SQL statements for manipulation of data. Examples: SELECT, INSERT, UPDATE, DELETE, etc. Data Control Language – DCL – SQL statements for database control Examples: GRANT, REVOKE, etc. Procedural Language Interface – a method to combine a nonprocedural language such as SQL with a programming language such as Java or Visual Basic Examples: JDBC, ODBC, OCI, etc. Transaction Processing - Reliable and efficient processing of large volumes of repetitive work (DBMSs ensure that simultaneous users do not interfere with each other and that...
Words: 1567 - Pages: 7
...text in a cell Formatting text in a cell Using the series fill handle 1. Click in the first cell. This is called cell A1 (because it is in row 1 and column A) 2. Type your first name. See how your name shows up in the cell and in the Formula bar. This is the formula bar This is cell A1 3. Press the ENTER key. This will move the cursor down a row to cell A2. 4. Click on cell A1 again to select it. 5. Click in the formula bar. Click after your first name. Now, Enter a space and Type your last name. You should always make changes in the formula bar. If you try to make changes in the cell you will type over what is already there. 6. Press the ENTER key. Now you are in cell A2 again. 7. Type the words ―Happy Birthday” in cell A2. See that the words may not fit in the box. Don’t worry about it. See that the text is also in the Formula bar. 8. Press the ENTER key. The cursor will move to the cell below it. What is the name of that cell? ____________. Some of the text might be hidden, but it is not gone. Modified SPLC Document for use at Neighborhood House Rev 1.1.2010 9. Click in cell A2 again, your text will return. Check the formula bar to be sure. 10. Now, click in cell B2. 11. Type the words ―dear Andrew”. Press the ENTER key. 12. Click in cell B2. Click in the formula bar and change Andrew to ―Andrea”. 13. Move the cursor to the line between columns A and B. It should look like this: ...
Words: 5104 - Pages: 21
...to: * Discuss why a table is not in the First Normal Form * Convert an unnormalized table into the First Normal Form * Take a table that is in the First Normal Form and convert it to the Second Normal Form. * Take a table that is in the Second Normal Form and convert it to the Third Normal Form. * Identify table keys. Assignment Below are a series of two exercises along with a list of requirements for completing each. In the following activities, you will be required to read through each of the steps and convert an unnormalized table into a normalized table. Exercise I. Normalization of the ORDERS Table The purpose of this exercise is for you to demonstrate your ability to take an unnormalized table and convert it up through the third normal form. Upon completion of this exercise you will have: * Discussed why the step one table is not normalized * Converted the table in step one to the First Normal Form * Converted the table created in step two into the Second Normal Form * Converted the table created in step three into the Third Normal Form * Identified all of the names, attributes, and keys associated with each of the tables Exercise 1 Directions To complete exercise one, you should do the following: 1. Read and complete each of the four steps identified under exercise one 2. Create a response for each step listed under exercise one 3. Create your response in MS Word 4. When appropriate, use the...
Words: 1428 - Pages: 6
...Technological University of the Philippines Ayala Blvd., Ermita Manila A Rental Record System for “Petilla Dormitory” Sampaloc, Manila A Case Study in Database Design Partial Fulfillment of the Requirements in Database Lecture Bachelor of Science in Information System Submitted by: FRANCIA, Jan Diether GISALA, Aaron MORALES, Shiela May C. NOARIN, Jenny M. October 2015 Table of Contents Title page ------------------------------------------------------------------------ I I. Overview A. Company Profile ------------------------------------------------------------- 1 B. Sample Forms --------------------------------------------------------------- 2 II. Database Planning A. Mission Statement ----------------------------------------------------------- 3 B. Mission Objectives ----------------------------------------------------------- 3 C. Project Team and Responsibility Assignment ------------------------------ 4 III. Database Boundary A. System Boundary ------------------------------------------------------------ 5 B. Database User --------------------------------------------------------------- 6 C. Data Dictionary -------------------------------------------------------------- 7 IV. Requirements Collection and Analysis A. Database Normalization ---------------------------------------------------- 14 V. System Specification A. System Specification ------------------------------------------------------- 15 VI. Physical...
Words: 2260 - Pages: 10
...1. What is an entity super type, and why is it used? It is an entity with 1 or more subtypes. It contains common characteristics. It is used to take advantage of inheritance, constraints, discriminators, and reduce the number of nulls. 2. What kinds of data would you store in an entity subtype? Entity subtypes contain more unique characteristics. A subtype will contain that data that is specific to the entity. Ex. A super type entity named Student contains a field for degrees studying but there could be multiple subtype entities for each different degrees and they would contain that which pertains to that certain degree. 3. What is a specialization hierarchy? It is an arrangement that has a super type entity that branches into one or more subtype or child entity. 4. What is a subtype discriminator? Give an example of its use. Attribute in the super type entity that determines to which subtype each super type occurrence is related. Subtype discriminator may be based on other comparison condition Flight Hours (>1,500 or <=1,500) 5. What is an overlapping subtype? Give an example. It is a subtype that contains non-unique subsets of the super type entity set. E.g. an employee can be both an Administrator and a teacher. 6. What is the difference between partial completeness and total completeness? Partial completeness is when a super-type does not need to use one of the subtypes, whereas total completeness must use at least one. Partial example: an...
Words: 1326 - Pages: 6