Premium Essay

Using a Database

In:

Submitted By jeezrufus
Words 314
Pages 2
Then thinking about what to write for this paper, I keep coming back to the Redbox kiosks, website and smartphone or tablet apps. Searching for a DVD or Blu-ray disc has become amazingly simple thanks to their use of databases. Now rather than calling or driving around to various video stores to attempt to find the movie you desire, it’s as simple as logging on to the website or app.
Once logged on you have a choice of searching your favorite kiosk or searching them all within a particular mile radius of where you are that you specify and find the movie of your choice. This involves the use of multiple bases, one for usernames and passwords, one that has listings of movies where they are located and if they are available as well as keeping your credit card information in a database and charging it when you decide to checkout. The applications use of these databases makes it easier on the user to find what they are looking for and checkout in just a few easy steps. Now if driving to the kiosk could be as simple.
One way that I would improve on what Redbox already uses is to add these same features to the kiosk itself. For example if I happen to walk up to a Redbox kiosk without having a reservation, that kiosk my not have the movie I’m looking for and cannot suggest a kiosk nearby like the website or apps can. I would like to see a kiosk that can tell me they do not have the video that I am looking for available but one nearby does and that I can choose to reserve it at the kiosk I am at and drive over to the other kiosk to retrieve it. This simple addition to the database would make an already great database even

Similar Documents

Premium Essay

Object-Relational Database Modeling Using Uml

...OBJECT-RELATIONAL DATABASE MODELING USING UML Table of Contents Introduction……………………………………………………………………………………..4 Overview of ER Modeling and UML…………………………………………………………...4 UML Meta-model……………………………………………………………………………… 6 UML Components………………………………………………………………………………7 UML Data Profile……………………………………………………………………………….9 UML Diagrams……………………………………………………………………………….....10 UML Diagram Classification – Static, Dynamic, and Implementation…....................................12 4+1 View of UML Diagrams……………………………………………………………………13 Object-oriented Class Model and Relational Database Model..............................................…...14 Use of UML to develop Ontologies…………………………………………………………..…17 References……………………………………………………………………………………….19 Abstract The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to describe many of the elements found in today's software technology as well as Model Driven Architecture and Service-Oriented Architecture. Many existing software applications involve complex application layer implemented in object-oriented programming languages and at the same time use relational database systems as the back-end data store. Modeling the whole system in a consistent manner will help developers and end users better understand the application. The Unified Modeling Language (UML) is a standard language for modeling software and database systems. Data...

Words: 3708 - Pages: 15

Premium Essay

(Database Design Using Entity-Relationship Diagrams)

...(Database Design Using Entity-Relationship Diagrams) Checkpoint 1.1 1. Briefly describe the steps of the software engineering life-cycle process. a) Requirements – looking out what the user(client) needs and the problems b) Specification – make an analysis of the requirements. Find out the specifics needs c) Design – after you gather enough information, you design to meet the specification d) Developed – you star to write the software e) Tested – software is turned over to the user to be used in the application f) Maintenance – involves correcting hidden software faults as well as improving the functionality of the software. Checkpoint 1.3 1. What are functional dependencies? Give examples. A functional dependency is a relationship of one attribute or field in a record to another. For example, Social Security Number defines a name. This means that if I have a database with SSNs and names, and if I know someone’s SSN, then I can find their name. Another example would be the Employee’s number, if I know the EmpNo, and then I know the name. 2. What does the augmentative rule state? Give examples. Like the book explain, if. It means that you can add more information to the LHS of an FD and still have the FD be true. An example: If X is customer ID and Y is customer name and Z is birth date, then means that if you are given both a customer ID and a birth date, then it is possible to derive customer name and birth date from that. 3...

Words: 1206 - Pages: 5

Premium Essay

Efficient Passanger Service System Using Auto-Sync Database Updates

...Grader: ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Submit to: ------------------------------------------------- Western Governors University ------------------------------------------------- Attn.: Assessment Delivery Department ------------------------------------------------- 4001 South 700 East, Suite 700 ------------------------------------------------- Salt Lake City, Utah 84107-2533 ------------------------------------------------- ------------------------------------------------- wgusubmittals@wgu.edu Capstone Project Cover Sheet Capstone Project Title: Efficient Passenger Services System Using Auto-Sync Database Updates Student Name: Degree Program: Mentor Name: Signature Block Student’s Signature Mentor’s Signature Table of Contents Table of Contents 3 List of Tables 5 List of Figures 5 Capstone Report Summary (Introduction) 6 Problem Statement 6...

Words: 9838 - Pages: 40

Free Essay

Jagat

...experience in Teradata Database Administrator. Initial Level of experience in BIG Data Hadoop. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Expertise in proactively handling Oracle database issues to avoid major incident. Expertise in Root Cause Analysis and trouble shooting skills Expertise in mentoring database specialists and Handling Escalated calls. Expertise in providing solution within given SLA to avoid SLA bridge. Expertise in reviewing plan, risk and impact analysis before change. Expertise in implementing exact solution within given SLA. Expertise in providing exact solution during incident to avoid / reduce problem. Expertise in applying permanent fix to avoid problem. Expertise in providing different types of solution to migrate Non-Exadata into Exadata. Expertise in capacity management of databases according to their growth. More than 10 end to end RAC setup implemented in Oracle 10G and 11G on various platforms like RHEL ,SUN Solaris and AIX. More than 20 Dataguard setup implemented in Oracle 9i,10g and 11G. Extensive experience in identifying cause of high CPU and IO utilization. Extensive experience Database Performance and Query tuning. Extensive experience Oracle Exadata Performance and Query tuning. Expertise in identifying root cause issue of Oracle database and OS level. Expertise in Technical Leadership. Expertise in migrating non-Exadata database into EXADATA. Depth...

Words: 4360 - Pages: 18

Premium Essay

Marketing P5

...customers. In relationship marketing, customer profile, buying patterns, and history of contacts are maintained in a sales database. Kellogg's is using a strategy called "Direct Mail Drive" to communicate with over 1.5 million customers. They are working with agency Leo Burnett using integrated strategies to build up a relationship and database of customers. Relationship Marketing Relationship marketing is an activity that is aimed at developing and managing trusting and long term relationships with larger customers. In relationship marketing, customer profile, buying patterns, and history of contacts are maintained in a sales database. Kellogg's is using a strategy called "Direct Mail Drive" to communicate with over 1.5 million customers. They are working with agency Leo Burnett using integrated strategies to build up a relationship and database of customers. Relationship Marketing Relationship marketing is an activity that is aimed at developing and managing trusting and long term relationships with larger customers. In relationship marketing, customer profile, buying patterns, and history of contacts are maintained in a sales database. Kellogg's is using a strategy called "Direct Mail Drive" to communicate with over 1.5 million customers. They are working with agency Leo Burnett using integrated strategies to build up a relationship and database of customers. Relationship Marketing Relationship marketing is an activity that is aimed at developing and managing trusting...

Words: 676 - Pages: 3

Premium Essay

Exam

...Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Management Information Systems CHAPTER 6: FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Learning Objectives • Describe how the problems of managing data resources in a traditional file environment are solved by a database management system • Describe the capabilities and value of a database management system • Apply important database design principles • Evaluate tools and technologies for accessing information from databases to improve business performance and decision making • Assess the role of information policy, data administration, and data quality assurance in the management of a firm’s data resources 2 © Pearson Education 2012 Management Information Systems CHAPTER 6: FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Organizing Data in a Traditional File Environment • File organization concepts – – – – Database: Group of related files File: Group of records of same type Record: Group of related fields Field: Group of characters as word(s) or number • Describes an entity (person, place, thing on which we store information) • Attribute: Each characteristic, or quality, describing entity – E.g., Attributes Date or Grade belong to entity COURSE 3 © Pearson Education 2012 Management Information Systems CHAPTER 6: FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Organizing Data in...

Words: 2709 - Pages: 11

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Premium Essay

Database System

...Chapter 1 Databases and Database Users Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1 Outline         Types of Databases and Database Applications Basic Definitions Typical DBMS Functionality Example of a Database (UNIVERSITY) Main Characteristics of the Database Approach Types of Database Users Advantages of Using the Database Approach When Not to Use Databases Copyright © 2011 Ramez Elmasri and Shamkant Navathe Types of Database Applications  Traditional Applications:   Numeric and Textual Databases in Business Applications More Recent Applications:      Multimedia Databases (images, videos, voice, etc.) Geographic Information Systems (GIS) Data Warehouses Real-time and Active Databases Many other applications  Initial part of book focuses on traditional applications  A number of recent applications are described later in the book (for example, Chapters 26,27,28,29) Copyright © 2011 Ramez Elmasri and Shamkant Navathe Basic Definitions      Database:  A collection of related data. Data:  Known facts that can be recorded and have an implicit meaning. Mini-world:  Some part of the real world about which data is stored in a database. For example, student registration, grades and transcripts at a university. Database Management System (DBMS):  A software package/system to facilitate the creation and maintenance...

Words: 1892 - Pages: 8

Premium Essay

Fosbap

...YFOSBAPP Database A database is information organized in such a way that a computer program can quickly select pieces of data. You can think of it as an electronic filing system. A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. Data Integration Data integration involves combining data residing in different sources and providing users with a unified view of these data. This process becomes significant in a variety of situations, which include both commercial (when two similar companies need to merge their databases) and scientific (combining research results from different bioinformatics repositories, for example) domains. Data integration appears with increasing frequency as the volume and the need to share existing data explodes. It has become the focus of extensive theoretical work, and numerous open problems remain Existing DBMSs provide various functions that allow management of a database and its data which can be classified into four main functional groups:  Data definition – Creation, modification and removal of definitions that define the organization of the data.  Update – Insertion, modification, and deletion of the actual data.  Retrieval – Providing information in a form directly usable or for further processing by other applications. The retrieved data may be made available in a form basically the same as it is stored in the database or in a new...

Words: 4053 - Pages: 17

Premium Essay

Sql Injection.

...ABSTRACT This term paper discusses the security exposures of a server that occur due to a SQL injection flaw in a web application that communicate with a database. Over ten years have passed since a famous hacker coined the term “SQL injection” and it is still considered one of the major application threats. A lot has been said on this vulnerability, but not all of the aspects and implications have been uncovered, yet. This paper aim is to collate some of the existing knowledge, introduce new techniques and demonstrate how to get complete control over the database management system's underlying operating system, file system and internal network through SQL injection vulnerability in over-looked and theoretically not exploitable scenarios. This paper also discuss about the prevention from the SQL Injection, not only in ORACLE but also in PHP, C#, JAVA and other languages. INDEX ABSTRACT………………………………………………………………………………….....02 INTRODUCTION……………….…………………………….…….………………………….04 BLIND SQL INJECTION…………………………………….………………………………..05 SQL INJECTION OVERVIEW…………………………….………………………………....06 CATEGORIES OF SQL INJECTION ATTACKS…………………………………………..07 WHAT’S VULNERABLE…………………………………………………………..…………08 WHAT’S NOT VULNERABLE…………………………………………………….………….08 SQL INJECTION METHODS……………………………………….……………….……….09 SQL MANIPULATION………………………………………………………..……………….09 CODE INJECTION……………………………………………………….……………………10 FUNCTION CALL INJECTION……………………………………………………………….11 BUFFER OVERFLOWS………………………………………………………………………13 ...

Words: 3449 - Pages: 14

Premium Essay

Federated Searching: a New Era

...Federated Searching: A New Era “Only librarians like to search; everyone else likes to find” (Tennant, 2003). While most librarians teach research strategies including: Boolean logic, accessing carefully chosen databases, and indexing; students are often discouraged and frustrated using these techniques. Most students simply want to Google their requests. For many students a simple keyword search is a convenient, simple process for locating information. Federated searching is providing options that may strike a happy medium for students and librarians alike by providing a keyword option to access the library’s databases. Federated searching is software or a service that allows multiple sources to be searched simultaneously. A library is required to purchase software and/or a service agreement from a vendor that provides access to information in the databases and on the Web. Using a search protocol, like Z39.50, the engine scans various databases, the Web, and library catalogs concurrently and provides an organized result for the searcher’s query. Metasearches are performed across both bibliographic and full-text databases. One major advantage of a federated search is that the query does not have to be repeated with various databases. When federated searching works well, it reduces the amount of time students spend locating data and encourages them to search for more information. “The goal of many federated search tools is to make the interface as simple and streamlined...

Words: 1735 - Pages: 7

Free Essay

Dna Sequence

...or DNA sequence in FASTA format from the NCBI database and analyze the obtained data. 2.For a given protein sequences find the function ,structural relevance and annotation studies by using Uniprot/Uniprot KB. 3.For a given protein, find the protein PDB code ,release date , resolution ,Classification and pub med citation from PDB Structure data base. 4.Find the disease pathway ,drug target enzymes and drug molecules used for a given disease by using KEGG database. 5.For a given protein/enzyme find its EC number ,its location and Km, K cat/Km values by using BRENDA/KEGG database. 6.Find the pair wise sequence alignment for a given protein/DNA sequence by using Dot matrix method Dot helix and comment on the results inverted repeats ,palindromes. 7.For a given Protein sequence find the homolog sequences and Study the obtained output critical statistical parameters, the % identity, %similarity ,p ,E-value by using BLAST. 8.For a given Protein/DNA sequence find the pblast ,nblast ,psi blast ,phi blast ,blast, tbalstn and analyze the obtained results obtained results for each blast method. 9.For a given Protein sequence find the pair wise sequence alignment by using the FASTA algorithm and compare the results obtained with those from other methods. 10.Find the optimal alignment for the given protein sequence by using Dynamic programming –LALIGN method. 11.For a given FASTA sequence find the multiple sequence alignment by using the Clustal W/T-coffee and find the conserved...

Words: 2349 - Pages: 10

Premium Essay

Microsoft Access or Microsoft Sql Server: What's Right in Your Organization

...Microsoft Access or Microsoft SQL Server: What's Right in Your Organization? SQL Server Technical Article Writers: Luke Chung Technical Reviewer: Matt Nunn Published: December 2004, revised July 2006. Applies To: SQL Server 2005 Summary: This paper explains how Microsoft® Access is used within an organization. It also explains when to use Access and when to use Microsoft SQL Server™. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering...

Words: 6412 - Pages: 26

Premium Essay

Database Paper

...Week 1: Database Paper Carmen Lozano DBM/381 John Italiano April16, 2013 When it comes to the health care database systems is a special data processing system, or part of a data processing system, which aids in the storage, manipulation, reporting, management, and control of data. When it comes to a database management system is a collection of software packages designed to store, access and manage databases. Databases are used across the health care industry to able to store patient’s files because the databases are used to store data over a long period of time. In addition it helps organizations have file access to patients file and being able to check the status or enter patients information and sure it with different organizations. When it comes to health care database systems there are four different structural types of database management systems and they are hierarchical databases, network databases, relational databases, and object-oriented databases. Hierarchical database is commonly used on the mainframe computers; this is also the oldest method being used by organizing and storing data, by organizations. This structure follows the pyramid fashion. This means that related fields are grouped together which includes higher-level records and lower-level records. When using this structure there are advantages and disadvantages that go along with this method. The advantages are files can be accessed and...

Words: 775 - Pages: 4

Premium Essay

Bsa 375

... | | |College of Information Systems & Technology | | |DBM/380 Version 9 | | |Database Concepts | | |July 16, 2012 to August 13, 2012 | | |Group KM11BIT13 | Copyright © 2012, 2010, 2008, 2007, 2006, 2005, 2003 by University of Phoenix. All rights reserved. Course Description This course covers database concepts. Topics include data analysis, the principal data models with emphasis on the relational model, entity-relationship diagrams, database design, normalization, and database administration. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be...

Words: 3236 - Pages: 13