The document discusses conceptual, logical, and physical database design. It outlines the steps in the database design methodology, including building a conceptual data model, logical data model, and physical database design. The conceptual design phase involves identifying entities, relationships, attributes, and validating the model. The logical design phase maps the conceptual model to a logical model and validates relations. The physical design phase implements the logical structure in the target DBMS by designing base relations, file organizations, indexes, and user views.
Database Development Process: A core aspect of software engineering is the subdivision of the development process into a series of phases, or steps, each of which focuses on one part of the development.
Journal of Physics Conference SeriesPAPER • OPEN ACCESS.docxLaticiaGrissomzz
Journal of Physics: Conference Series
PAPER • OPEN ACCESS
The methodology of database design in
organization management systems
To cite this article: I L Chudinov et al 2017 J. Phys.: Conf. Ser. 803 012030
View the article online for updates and enhancements.
You may also like
The Construction of Group Financial
Management Information System
Yuan Ma
-
Identification of E-Maintenance Elements
and Indicators that Affect Maintenance
Performance of High Rise Building: A
Literature Review
Nurul Inayah Wardahni, Leni Sagita
Riantini, Yusuf Latief et al.
-
Web-Based Project Management
Information System in Construction
Projects
M R Fachrizal, J C Wibawa and Z Afifah
-
This content was downloaded from IP address 75.44.16.235 on 09/10/2022 at 19:18
https://doi.org/10.1088/1742-6596/803/1/012030
https://iopscience.iop.org/article/10.1088/1757-899X/750/1/012025
https://iopscience.iop.org/article/10.1088/1757-899X/750/1/012025
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/879/1/012064
https://iopscience.iop.org/article/10.1088/1757-899X/879/1/012064
https://iopscience.iop.org/article/10.1088/1757-899X/879/1/012064
The methodology of database design in organization
management systems
I L Chudinov, V V Osipova, Y V Bobrova
Tomsk Polytechnic University, 30, Lenina ave., Tomsk, 634050, Russia
E-mail: [email protected]
Abstract. The paper describes the unified methodology of database design for management
information systems. Designing the conceptual information model for the domain area is the
most important and labor-intensive stage in database design. Basing on the proposed integrated
approach to design, the conceptual information model, the main principles of developing the
relation databases are provided and user’s information needs are considered. According to the
methodology, the process of designing the conceptual information model includes three basic
stages, which are defined in detail. Finally, the article describes the process of performing the
results of analyzing user’s information needs and the rationale for use of classifiers.
1. Introduction
Management information systems are among the most important components of information
technologies (IT), used in a company. They are usually classified by the functions into the following
systems: Manufacturing Execution Systems (MES), Human Resource Management (HRM), Enterprise
Content Management (ECM), Customer Relationship Management (CRM), etc. [1]. Such systems are
used a special structured database and are required for reengineering of the whole enterprise
management system, while the integration makes it difficult to use them. These systems are expensive
enough and particularly devel.
ME/R model: A New approach of Data Warehouse Schema Designidescitation
In this paper we pursue schema design for data
warehouses in the spirit of classical database design, organized
as a sequence of requirement analysis and specification to
collect user requirements, conceptual design to model the
data warehouse as a multidimensional database independently
from implementation issues, logical design to transform the
conceptual data warehouse schema into the target data model,
and physical design to maximize performance with respect to
a target database system.
Project PlanFor our Project Plan, we are going to develop.docxwkyra78
Project Plan
For our Project Plan, we are going to develop a new information system for a mid-size organization that will automate the payroll transactions. Since we already have all the information that the new system needed, we propose to use the Waterfall Development Methodology because we are going from one phase to the next.
Planning
System
Implementation
Design
Analysis
Estimated Projected Time Frame:
For Estimating the Project Time Frame, the project manager will develop a preliminary estimation of how long it will take to build the new system. There are several sources that the project manager uses to estimate the time frame. First is they can take it from projects that had similar tasks and technologies, an experienced developers can provided the estimation, or the type of methodology that is being used. It is a good practice to keep track of actual time and effort values during the SDLC so the data can be redefine and are used as a guide for future projects. For now, I will use the Industry standard to estimate the project time frame. Within the Industry standard for a typical business application system, they will spends 15% of effort in the planning phase, 20% in the analysis phase, 35% in the design phase, and 30% in the implementation phase. With the planning phase take 5 month to complete, then for the total project time is 33.3 person-month to complete the project.
Project time line
Planning
Analysis
Design
Implementation
15%
20%
35%
30%
5 person-month
6.66 person-month
11.66 person-month
10 person-month
Developing the Work Plan:
Once the project schedule has been established, the project manager can start creating a work plan for the project. The work plan is a schedule that he projects manager use to keep record and keep track of all the tasks that need to be accomplished over the entire project. The project manager will need to identify the entire task that are needed and determine how long each of the tasks will take. Then the task will be organized within the work breakdown structure. For the main task to be complete, the subtask has to be completed first.
Staffing the Project:
The project manager needs to figure out how many staff is needed for the project. The amount of staff is needed depend on how fast they want to finish the project. Increase in staff does not mean increases in productivity. If more staff is needed, make sure to have some kind of reporting structure. The project manager needs to know the staff capabilities and assign task according to their skills. Project manager needs to know how to motivate the staff for a project success.
Coordinating Project Activities:
The project manager needs to have activities put in place during the entire SDLC. Activities are tools that is use to ensure that he project stays on track and that the chance of failure is kept to a minimum. Case Tools (computer-aided software engineering), Standards, and Documentation are all activi ...
Database Development Process: A core aspect of software engineering is the subdivision of the development process into a series of phases, or steps, each of which focuses on one part of the development.
Journal of Physics Conference SeriesPAPER • OPEN ACCESS.docxLaticiaGrissomzz
Journal of Physics: Conference Series
PAPER • OPEN ACCESS
The methodology of database design in
organization management systems
To cite this article: I L Chudinov et al 2017 J. Phys.: Conf. Ser. 803 012030
View the article online for updates and enhancements.
You may also like
The Construction of Group Financial
Management Information System
Yuan Ma
-
Identification of E-Maintenance Elements
and Indicators that Affect Maintenance
Performance of High Rise Building: A
Literature Review
Nurul Inayah Wardahni, Leni Sagita
Riantini, Yusuf Latief et al.
-
Web-Based Project Management
Information System in Construction
Projects
M R Fachrizal, J C Wibawa and Z Afifah
-
This content was downloaded from IP address 75.44.16.235 on 09/10/2022 at 19:18
https://doi.org/10.1088/1742-6596/803/1/012030
https://iopscience.iop.org/article/10.1088/1757-899X/750/1/012025
https://iopscience.iop.org/article/10.1088/1757-899X/750/1/012025
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/1007/1/012021
https://iopscience.iop.org/article/10.1088/1757-899X/879/1/012064
https://iopscience.iop.org/article/10.1088/1757-899X/879/1/012064
https://iopscience.iop.org/article/10.1088/1757-899X/879/1/012064
The methodology of database design in organization
management systems
I L Chudinov, V V Osipova, Y V Bobrova
Tomsk Polytechnic University, 30, Lenina ave., Tomsk, 634050, Russia
E-mail: [email protected]
Abstract. The paper describes the unified methodology of database design for management
information systems. Designing the conceptual information model for the domain area is the
most important and labor-intensive stage in database design. Basing on the proposed integrated
approach to design, the conceptual information model, the main principles of developing the
relation databases are provided and user’s information needs are considered. According to the
methodology, the process of designing the conceptual information model includes three basic
stages, which are defined in detail. Finally, the article describes the process of performing the
results of analyzing user’s information needs and the rationale for use of classifiers.
1. Introduction
Management information systems are among the most important components of information
technologies (IT), used in a company. They are usually classified by the functions into the following
systems: Manufacturing Execution Systems (MES), Human Resource Management (HRM), Enterprise
Content Management (ECM), Customer Relationship Management (CRM), etc. [1]. Such systems are
used a special structured database and are required for reengineering of the whole enterprise
management system, while the integration makes it difficult to use them. These systems are expensive
enough and particularly devel.
ME/R model: A New approach of Data Warehouse Schema Designidescitation
In this paper we pursue schema design for data
warehouses in the spirit of classical database design, organized
as a sequence of requirement analysis and specification to
collect user requirements, conceptual design to model the
data warehouse as a multidimensional database independently
from implementation issues, logical design to transform the
conceptual data warehouse schema into the target data model,
and physical design to maximize performance with respect to
a target database system.
Project PlanFor our Project Plan, we are going to develop.docxwkyra78
Project Plan
For our Project Plan, we are going to develop a new information system for a mid-size organization that will automate the payroll transactions. Since we already have all the information that the new system needed, we propose to use the Waterfall Development Methodology because we are going from one phase to the next.
Planning
System
Implementation
Design
Analysis
Estimated Projected Time Frame:
For Estimating the Project Time Frame, the project manager will develop a preliminary estimation of how long it will take to build the new system. There are several sources that the project manager uses to estimate the time frame. First is they can take it from projects that had similar tasks and technologies, an experienced developers can provided the estimation, or the type of methodology that is being used. It is a good practice to keep track of actual time and effort values during the SDLC so the data can be redefine and are used as a guide for future projects. For now, I will use the Industry standard to estimate the project time frame. Within the Industry standard for a typical business application system, they will spends 15% of effort in the planning phase, 20% in the analysis phase, 35% in the design phase, and 30% in the implementation phase. With the planning phase take 5 month to complete, then for the total project time is 33.3 person-month to complete the project.
Project time line
Planning
Analysis
Design
Implementation
15%
20%
35%
30%
5 person-month
6.66 person-month
11.66 person-month
10 person-month
Developing the Work Plan:
Once the project schedule has been established, the project manager can start creating a work plan for the project. The work plan is a schedule that he projects manager use to keep record and keep track of all the tasks that need to be accomplished over the entire project. The project manager will need to identify the entire task that are needed and determine how long each of the tasks will take. Then the task will be organized within the work breakdown structure. For the main task to be complete, the subtask has to be completed first.
Staffing the Project:
The project manager needs to figure out how many staff is needed for the project. The amount of staff is needed depend on how fast they want to finish the project. Increase in staff does not mean increases in productivity. If more staff is needed, make sure to have some kind of reporting structure. The project manager needs to know the staff capabilities and assign task according to their skills. Project manager needs to know how to motivate the staff for a project success.
Coordinating Project Activities:
The project manager needs to have activities put in place during the entire SDLC. Activities are tools that is use to ensure that he project stays on track and that the chance of failure is kept to a minimum. Case Tools (computer-aided software engineering), Standards, and Documentation are all activi ...
● Data Modeling and Data Models.
● Business Rules (Translating Business Rules into Data Model Components).
● Emerging Data Models: Big Data and NoSQL.
● Degrees of Data Abstraction (External, Conceptual, Internal and Physical model).
-This lecture about the Details explanation about the Database Development life Cycle. This lecture show about the Software development Cycle in term of DB. This lecture Explain the architecture of the Database. This lecture explain about the Three-Level ANSI-SPARC Architecture.
Traditional operational views of capacity planning is not the same as BI Capacity planning. I created this presentation to help establish a BI Infrastructure Capacity planning process.
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Usman Tariq
In this PPT, you will learn:
• About data modeling and why data models are important
• About the basic data-modeling building blocks
• What business rules are and how they influence database design
• How the major data models evolved
• About emerging alternative data models and the needs they fulfill
• How data models can be classified by their level of abstraction
Author: Carlos Coronel | Steven Morris
Modern Database Management 12th Global Edition by Hoffer solution manual.docxssuserf63bd7
https://qidiantiku.com/solution-manual-for-modern-database-management-12th-global-edition-by-hoffer.shtml
name:Solution manual for Modern Database Management 12th Global Edition by Hoffer
Edition:12th Global Edition
author:by Hoffer
ISBN:ISBN 10: 0133544613 / ISBN 13: 9780133544619
type:solution manual
format:word/zip
All chapter include
Focusing on what leading database practitioners say are the most important aspects to database development, Modern Database Management presents sound pedagogy, and topics that are critical for the practical success of database professionals. The 12th Edition further facilitates learning with illustrations that clarify important concepts and new media resources that make some of the more challenging material more engaging. Also included are general updates and expanded material in the areas undergoing rapid change due to improved managerial practices, database design tools and methodologies, and database technology.
Assignment User FrustrationThe quality of the user experience i.docxlynettearnold46882
Assignment: User Frustration
The quality of the user experience is very important to the success of an application. In the early days of computing, users often experienced long delays since computing power was poor and networks had comparatively slow throughput. Modern systems have largely eliminated these delays due to increased network and computing power, yet users still report a high level of frustration.
Write a four to five (4-5) page paper in which you:
Describe three (3) reasons users are still frustrated with modern applications.
Suggest one (1) method for reducing the frustrations for each of the reasons you supplied in Question one (1).
Describe methods for determining if user frustration is caused by poor system design or from the natural frustration associated with learning a new software product.
Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
Describe the inherent design issues across HCI environments.
Explain the use of interaction devices.
Use technology and information resources to research issues in human-computer interaction.
Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.
.
Assignment Upstream Approaches to Canadian Population HealthAlt.docxlynettearnold46882
Assignment: Upstream Approaches to Canadian Population Health
Although Canada is contiguous to the United States and has some cultural and historical similarities, Canada’s population enjoys a vastly superior health status. Reasons are many, can be traced historically, and are related to a different view of the role of government. The experience of Canada demonstrates that neither a heterogeneous population, nor a health system that has waiting lines for services, are reasons for poor health. By looking critically at what produces good health in Canada, much can be learned about steps the U.S. might need to take if population health is its goal.
The Canadian Best Practices Portal challenges Canadian public health practitioners and researchers to create upstream interventions aimed at the source of a population health problem or benefit. What is being done to address the influences on population health in Canada?
To prepare
for this Assignment, review your Learning Resources. Search the Internet and scholarly research for examples of Canadian “upstream interventions” that can be put forth as examples of either effective or ineffective efforts to improve population health.
The Assignment (2–4 pages):
Provide a description of an existing intervention in Canada, intended to improve health inequities. Include an explanation of the inequity and how the intervention targets upstream determinants of health.
Describe the organizations involved and/or social policies enacted in the implementation of the intervention.
Explain whether or not the intervention was/is successful and what lessons public health practitioners can learn from that experience that might improve population health in the United States.
Expand on your insights utilizing the Learning Resources.
Use APA formatting for your Assignment and to cite your resources.
.
More Related Content
Similar to Discuss the concept of strategic business–IT alignment and how it .docx
● Data Modeling and Data Models.
● Business Rules (Translating Business Rules into Data Model Components).
● Emerging Data Models: Big Data and NoSQL.
● Degrees of Data Abstraction (External, Conceptual, Internal and Physical model).
-This lecture about the Details explanation about the Database Development life Cycle. This lecture show about the Software development Cycle in term of DB. This lecture Explain the architecture of the Database. This lecture explain about the Three-Level ANSI-SPARC Architecture.
Traditional operational views of capacity planning is not the same as BI Capacity planning. I created this presentation to help establish a BI Infrastructure Capacity planning process.
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Usman Tariq
In this PPT, you will learn:
• About data modeling and why data models are important
• About the basic data-modeling building blocks
• What business rules are and how they influence database design
• How the major data models evolved
• About emerging alternative data models and the needs they fulfill
• How data models can be classified by their level of abstraction
Author: Carlos Coronel | Steven Morris
Modern Database Management 12th Global Edition by Hoffer solution manual.docxssuserf63bd7
https://qidiantiku.com/solution-manual-for-modern-database-management-12th-global-edition-by-hoffer.shtml
name:Solution manual for Modern Database Management 12th Global Edition by Hoffer
Edition:12th Global Edition
author:by Hoffer
ISBN:ISBN 10: 0133544613 / ISBN 13: 9780133544619
type:solution manual
format:word/zip
All chapter include
Focusing on what leading database practitioners say are the most important aspects to database development, Modern Database Management presents sound pedagogy, and topics that are critical for the practical success of database professionals. The 12th Edition further facilitates learning with illustrations that clarify important concepts and new media resources that make some of the more challenging material more engaging. Also included are general updates and expanded material in the areas undergoing rapid change due to improved managerial practices, database design tools and methodologies, and database technology.
Assignment User FrustrationThe quality of the user experience i.docxlynettearnold46882
Assignment: User Frustration
The quality of the user experience is very important to the success of an application. In the early days of computing, users often experienced long delays since computing power was poor and networks had comparatively slow throughput. Modern systems have largely eliminated these delays due to increased network and computing power, yet users still report a high level of frustration.
Write a four to five (4-5) page paper in which you:
Describe three (3) reasons users are still frustrated with modern applications.
Suggest one (1) method for reducing the frustrations for each of the reasons you supplied in Question one (1).
Describe methods for determining if user frustration is caused by poor system design or from the natural frustration associated with learning a new software product.
Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
Describe the inherent design issues across HCI environments.
Explain the use of interaction devices.
Use technology and information resources to research issues in human-computer interaction.
Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.
.
Assignment Upstream Approaches to Canadian Population HealthAlt.docxlynettearnold46882
Assignment: Upstream Approaches to Canadian Population Health
Although Canada is contiguous to the United States and has some cultural and historical similarities, Canada’s population enjoys a vastly superior health status. Reasons are many, can be traced historically, and are related to a different view of the role of government. The experience of Canada demonstrates that neither a heterogeneous population, nor a health system that has waiting lines for services, are reasons for poor health. By looking critically at what produces good health in Canada, much can be learned about steps the U.S. might need to take if population health is its goal.
The Canadian Best Practices Portal challenges Canadian public health practitioners and researchers to create upstream interventions aimed at the source of a population health problem or benefit. What is being done to address the influences on population health in Canada?
To prepare
for this Assignment, review your Learning Resources. Search the Internet and scholarly research for examples of Canadian “upstream interventions” that can be put forth as examples of either effective or ineffective efforts to improve population health.
The Assignment (2–4 pages):
Provide a description of an existing intervention in Canada, intended to improve health inequities. Include an explanation of the inequity and how the intervention targets upstream determinants of health.
Describe the organizations involved and/or social policies enacted in the implementation of the intervention.
Explain whether or not the intervention was/is successful and what lessons public health practitioners can learn from that experience that might improve population health in the United States.
Expand on your insights utilizing the Learning Resources.
Use APA formatting for your Assignment and to cite your resources.
.
Assignment Type up an essay on one of two prompts and submit the .docxlynettearnold46882
Assignment:
Type up an essay on one of two prompts and submit the final draft online.
Choose
only
one
topic:
1.
Symbols are important in Fahrenheit 451. Identify 3 symbols and analyze their references and meanings throughout the novel.
2.
Illustrate how each of Montag's three mentors - a new mentor for each part of the novel - help to spur Montag's ideological progression.
This is the final draft of your individual research paper essay.
1.
Essay must be 7-8 pages typed, not including the works cited page.
2.
Essay must follow MLA format.
3.
Research must include a minimum of 8 sources, 4 of which must be from Library Databases: Proquest, CQ Researcher, Infotrac, Opposing Viewpoints, etc.
4.
Essay must have a complete Works Cited page that cross references correctly to all in-text citations.
Note:
Please submit your document with YOUR last name first. (Example:
Schilf-Research-Paper-Final-Draft.pdf
)
Format:
Follow the BASIC OUTLINE TEMPLATE ( i have already done this part and attached pictures)
A.
Introduction
: Type up an Introduction with an opening strategy (OS) that grabs the readers attention using a story based example (PE, OPE, HYPO, CS, or HYPO/COMBO) that also supports your chosen topic. End the Intro with the Thesis Statement. (Limit 1 to 2 paragraphs)
B.
Body
: Present the analysis position through 3 topic points. Type up the topic sentence and bullet point the evidence (in this case, only quotes from the primary source material). A minimum of 3 quotes for support are needed for each topic point. Ideally, you provide 4 or 5 supporting quotes
C.
Quoting
: Avoid long quotes. Instead, be concise with quoting. You want quotes that are short, dynamic, and memorable. You will still need to set up quotes with a signal phrase that sets up the context of the quote.
D.
Analysis
: Never assume that the quote itself is self-explanatory. You must respond to each quote with your Original Voice (ROV) to illustrate, explain, compare, contrast, identify, analyze, etc. Do not simply restate the quote in your own words. Your response needs to go deeper.
F.
Conclusion
: Type up a Conclusion that revisits the opening strategy story based example. (Limit to 1 paragraph)
G.
Format
: Essay must follow MLA format with a Works Cited page that cross references correctly to all in-text citations.
H.
Length
: Essay should be 3 to 4 pages typed.
Note:
Please submit your document with YOUR last name first. (Example:
Schilf-Fahrenheit-451-Final-Essay.pdf
)
.
Assignment Type:
Individual Project
Deliverable Length:
8–10 slides
Points Possible:
150
Management utilities can be vendor-specific or vendor-neutral. There are many utilities that are
available to provide a proactive approach to monitoring each node of the cluster.
Submit a PowerPoint presentation of 8–10 slides that includes the following:
• Identify 1 vendor-specific server-monitoring utility.
• Identify 1 vendor-neutral monitoring utility.
• In your presentation, list advantages and disadvantages of using one or the other.
Your answer should clearly identify what notification and management interfaces each utility has
available (i.e., e-mail enabled, management console, Web-based)
.
Assignment Type Individual discussion Board; 450 – 550 word.docxlynettearnold46882
Assignment Type
: Individual d
iscussion Board;
450 – 550 words
Leadership varies widely by culture and personality. An international organization with locations in several countries must balance the local customs and cultures with those of the primary culture of the organizations’ headquarters. Using the USA as the headquarters, pick two other countries that might be part of a international internet retail organization and research and discuss the differences that leaders would have to navigate in approach and adapting to different standards of behavior and culture within the countries.
Grading criteria: students are graded on the quality and originality of their posts and responses, not the quantity. Responses should indicate the dilemma that leaders will face in working in cultures where values and leadership styles vary widely from those of the US. Examples may include the use of payments for access, the difficulty that women might experience in dealing with a patriarchal country or other theoretically sound differences in leadership
.
Assignment Two UNIT 2Student Name _______________________.docxlynettearnold46882
Assignment Two UNIT 2
Student Name: ______________________________________________
(Your NAME must be exactly as it is on the roll in e campus and in WEBCOM2)
Your Section Number _____________ (you must enter your section number)
The Unit 2 Assignment 2: Unit Two in the Textbook. ONLINE HUMA 1315send this to professor through WEBCOM 2
DIRECTIONS: The assignment is in WORD. Save the document to your computer and write your answers in the spaces given. You may change the spacing as needed. You are also asked to just write what your thoughts are and what you think such as your own opinion for some answers for some questions.
NOTE: Turn in assignments using WEBCOM2 Internal Messages found under MENU in the top left corner of the site. You may either attach your Word file or copy and paste your entire submission in the message box. Be thorough in your answers. You should use the Textbook, Essential Humanitiesthird edition and/or the Study Guide. The Study Guide is not mandatory; however, it is there for your enrichment. The Study Guide is in WEBCOM 2 in the tab labeled Student Resources. You may also want to use additional information for any assignments from the Internet. If you do, please remember to cite your source at the end of your answer. If you add additional information from the Internet, this is great, but you must cite sources. This applies to photos as well. (Remember that SLO and ULO are for evaluator and for this course to be certified and you do not have to do anything with them. However, they show that the assignments are aligned with the text, WEBCOM 2 and with the test questions.)
When completing your assignment questions, you should use the text for your answers. You may also want to look at the WEBCOM 2 website and the PowerPoints related to the great artists and individuals mentioned in Unit II, and the colored timeline. The timeline shows historical periods. These are available in the Student Resources’ tab. Do not worry about timeline dates being exact. Different sources give different dates depending upon who wrote the timeline. Dates also overlap with time periods, so dates are sometimes given as “approximate dates”. Subject in a question means what it is about. Answer all the following questions:
1. Explain what makes Giotto an important artist and why many historians consider him important in history?
Why is Giotto considered a “transitional” artist? (SLO2: ULO 2.3)
(EXPLAIN WHAT MAKES HIS WORK SIGNIFICANT IN YOUR TWO ANSWERS FOR #1)
2. Distinguish what subject matter the artist, Johannes Vermeer painted during the Baroque Period in Holland? Refer to textbook appendix for visuals.(SLO 1: ULO 1:3; SLO 2, ULO 2.2) You should also write about what you think about his paintings.
EXPLAIN WHAT HIS PAINTING WERE ABOUT SUCH AS WHAT WAS IN HIS PAINTINGS?
3. Pieter Brueghel’s work is unique for his time. Examine the cultural heritage of the people in his paintings. Refer to textbook appendix for visual.
Assignment Two Select a college or university and provide th.docxlynettearnold46882
Assignment Two
Select a college or university and provide the information listed below for the university.
History of the Institution
Mission Statement
Accreditation Status of the Institution
Institutions Goals and Objectives
.
Assignment Two
Objectives
• Understand how the AVL tree works
• Give you further practice with C and data structures
Admin
Marks 10 marks, excluding bonus marks. Marking is based on the correctness and
efficiency of your code. Your code must be well commented.
Group? This assignment is completed individually.
Due Time 23:59:59 pm on Sunday 31 March 2019. 23:59:59 pm on Wed 3 April 2019
Late Submissions Late submissions will not be accepted!
In this assignment, you will implement AVL tree and a set of functions associated with AVL
tree. For simplicity, we make the following assumptions:
1. Each item of an AVL tree contains an integer key and an integer value.
2. No AVL tree contains duplicate items. Two items (k1, v1) and (k2, v2) are duplicates
iff k1=k2 and v1=v2 hold.
3. An AVL tree may contains multiple items with the same key and the number of
duplicate keys is a constant.
A template file named MyAVLTree.c is provided. MyAVLTree.c contains the type definitions of
AVL tree and AVL tree node as well as some basic functions. You can add your own helper
functions and auxiliary data structures for better performance in terms of time complexity.
You need to implement the following functions:
1. AVLTree *CreateAVLTree(const char *filename). This function creates an AVL tree by
reading all the items from a text file or from the standard input (keyboard)
depending on the argument filename. If filename is “stdin”, this function will read all
the items from the standard input. Otherwise, it will read all the items from a text
file with filename as its full path name. (2 marks)
An input text file contains zero or more items where each item is of the form (key,
value). Any characters such as white space between two adjacent items are ignored.
For example, the following sample file contains 10 items:
(2, 50) (4, 30) (9, 30) (10, 400) (-5, -40)
(7, 20) (19, 200) (20, 50) (-18, -200) (-2, 29)
Similarly, when reading from the standard input, each input line may have zero or
more items, separated by one or more white space characters. An empty line
indicates the end of input.
In case of an error in the input, this function will print the error and your program
terminates.
You may assume that the input does not contain duplicate items and thus this
function does not need to check for duplicate items.
The time complexity of this function cannot be higher than O(n logn), where n is the
size of the resulting AVL tree. If your time complexity is higher, you will get 0 mark
for this function. You may assume that each call to a C built-in function takes O(1)
time.
2. AVLTree *CloneAVLTree(AVLTree *T). This function creates an identical copy (clone)
of the input AVL tree T, and returns a pointer to the clone tree. (1 mark)
The time complexity of this function cannot be higher than O(n), where n is the size
of T. If your time complexity is high.
Assignment Topic Exploration and Analysis (Proposal)In Week 6 o.docxlynettearnold46882
Assignment: Topic Exploration and Analysis (Proposal)
In Week 6 of this course, you will submit an 8-page research paper (Final Project) in which you are required to:
Analyze an important social change movement of the
pre-modern era
(pre-1945).
Analyze an important social change movement of the
modern era
(post 1945).
Compare and contrast both movements.
Analyze and explain the leadership structure of both movements. Who led these social change efforts? Was it an individual or a collective effort? What prompted individuals to become leaders of the movements?
Analyze how the movements parallel or complement each other.
Evaluate the success of these movements in promoting social change.
This week, as part of the Final Project writing process, you will complete a Topic Exploration and Analysis (Proposal). In this proposal, you will select your research topics (the two social change movements), create a beginning outline of what you plan to cover in the Final Project, provide a short summary of your initial research findings, and provide an initial bibliography.
In preparation:
Review the Final Project Guidelines document, located in this week’s Learning Resources.
Select and begin to research a social change movement pertinent to the
pre-modern era
(pre-1945). For ideas, look at content contained in Weeks 1–3 of this course. Pay particular attention to the selection of readings in the course text for each of these weeks.
Select and begin to research one of the following social change movements pertinent to the
modern era
(post 1945):
African American civil rights movement
Chicano movement
American Indian or ”Red Power” movement
Women’s rights movement
LGBTQ (lesbian, gay, bisexual, transgender, and queer) rights movement
Disability rights movement
Maintain a listing of scholarly resources that you locate and are using. The Walden Library provides a rich selection of material. Keep in mind that websites are generally not considered sources of scholarly material.
Note:
In your initial research this week, look at the historical background of each issue, the leadership structure in each movement, examples of specific changes that resulted related to each movement, and challenges the movement faced or is still facing. Consider the impact, successes, and failures of each movement.
The Assignment
Write a 1- to 2-page essay that includes:
Identification of the two social movements you will address in your Final Project
A brief outline of what you plan to cover in the paper
A short summary of your initial research findings
A bibliography of resources you used
.
Assignment To consider three sources about the Fall of Rome and w.docxlynettearnold46882
Assignment:
To consider three sources about the Fall of Rome and write an analytical essay.
Purpose:
To demonstrate proficiency in integrating historical sources and producing a well-informed analytical essay.
Part 1:
Research
Examine three sources:
1.
The textbook explanation concerning the decline and fall of Rome (chapter 7).
2.
The class presentation lecture on the Roman Empire.
3.
An article on the subject (“Friends, Romans, Countrymen” – see the Reading & Study link).
Write a 1,000–1,300-word essay concerning the decline and fall of the Roman Empire.
The paper should have a clear thesis statement, located at the end of the introduction.
The paper should cover the following:
1.
The various viewpoints given in the three sources (focus on the viewpoints you agree with)
2.
The variables involved (social, economic, military, etc.).
3.
Lessons the United States (our people and our government) can learn from Rome’s decline and fall.
4.
Similarities between the actions and attitudes of ancient Rome in their decline and fall and our American society today
Be careful that you use only the three sources provided. Use of other sources will be penalized.Textbook:
Perry, M., Chase, M., Jacob, J. R., Jacob, M. C., & Von Laue, T. H. (2013).
Western civilization: Ideas, politics, and society
(10th ed.). Boston: Wadsworth, Cengage Learning. ISBN: 9781111831707.
Williams, S., & Friell, G. (1994). Friends, romans or countrymen? barbarians in the empire.
History Today,
44
(7), 34.
http://bb7.liberty.edu/bbcswebdav/pid-22815357-dt-content-rid-159718173_1/xid-159718173_1
.
Assignment topic Rapid Influenza Testing in Children and Adult.docxlynettearnold46882
Assignment topic : Rapid Influenza Testing in Children and Adults.
When seeking to identify a patient’s health condition, advanced practice nurses can use a diverse selection of diagnostic tests and assessment tools; however, different factors affect the validity and reliability of the results produced by these tests or tools. Nurses must be aware of these factors in order to select the most appropriate test or tool and to accurately interpret the results.
Not only do these diagnostic tests affect adults, body measurements can provide a general picture of whether a child is receiving adequate nutrition or is at risk for health issues. These data, however, are just one aspect to be considered. Lifestyle, family history, and culture—among other factors—are also relevant. That said, gathering and communicating this information can be a delicate process.
For this Assignment, you will consider the
validity
and
reliability
of different assessment tools and diagnostic tests. You will explore issues such as
sensitivity,
specificity,
and
positive
and
negative predictive values
. You will also consider examples of children with various weight issues. You will explore how you could effectively gather information and encourage parents and caregivers to be proactive about their children’s health and weight.
To Prepare
· Review this week’s Learning Resources and consider factors that impact the validity and reliability of various assessment tools and diagnostic tests. You also will review examples of pediatric patients and their families as it relates to BMI.
· Search the Library and credible sources for resources explaining the tool or test you were assigned. What is its purpose, how is it conducted, and what information does it gather?
· Also, as you search the library and credible sources, consider what the literature discusses regarding the validity, reliability, sensitivity, specificity, predictive values, ethical dilemmas, and controversies related to the test or tool.
Assignment
(3–4 pages, not including title and reference pages)
:
For the Adult Assessment Tools or Diagnostic Tests:
Include the following:
· A description of how the assessment tool or diagnostic test you were assigned is used in healthcare.
o What is its purpose?
o How is it conducted?
o What information does it gather?
· Based on your research, evaluate the test or the tool’s validity and reliability, and explain any issues with sensitivity, reliability, and predictive values. Include references in appropriate APA formatting.
For the Child :
Include the following:
· An explanation of the health issues and risks that are relevant to the child you were assigned.
· Describe additional information you would need in order to further assess his or her weight-related health.
· Identify and describe any risks and consider what further information you would need to gain a full understanding of the child’s health. Think about how you could gather this infor.
Assignment Topic 1Choose a contemporary painting, sculpture, o.docxlynettearnold46882
Assignment Topic 1
Choose a contemporary painting, sculpture, or piece of art that captures your interest. This should be a piece created between the end of World War II (about 1945) and today. You may choose one of the illustrations or color inserts in the textbook, or try a virtual museum (check the links in this week's My Humanities Kit).
Before you begin writing your post, view the “Closer Look” art critiques from the unit My Humanities Kit resources. Consider what features are discussed in the piece you select. Aim for an evaluation that notes small details in a work, considers the purpose of various elements, and perhaps investigates the artist’s life.
In the post, begin by introducing the piece of contemporary art created between 1945 and present. What is the title? Who created it and when? What is the style? How would you describe it to someone who had not seen it? Finally, explain why viewing this work is a valuable experience. Connect the Unit 5 reading material in your response; include APA formatting.
Student 1
Hello Class and Professor,
For my piece of Art I have chosen Andy Warhol’s painting “Diamond Dust Shoes 1980”. I not only love the colors that are presented in the piece but the meaning to me signifies how many shoes women fill in our daily lives such as a mother, a friend, a lover, a daughter and etc. I fell a since of gratitude when I look at this colorful piece.
Andy Warhol was born in 1928; he left a huge legacy behind when he passed away in 1987 (Janaro & Altshuler, 2012, p. 142). From drawings, paintings and prints to videography, publishing and performance, he produced more than art -- he was essentially his own brand. From haunting black and white self-portraits to Polaroid snapshots of celebrities, many of the photos in the collection later became the inspiration for Warhol's most well-known Pop Art pieces (Janaro & Altshuler, 2012, p. 142).
Warhol's focus on consumer goods and pop-culture icons, as well as his own taste for money and fame, suggest a life in celebration of the very aspects of American culture that his work criticized (A & E Television Networks, 1996-2013). When looking at this piece of work you have a sense of what life is everyday!
Please look at the link provided below to take a look at this peice of Art. (The last reference below)
Margaret
A & E Television Networks, L. (1996-2013). bio.true story. Retrieved from Andy Warhol Biography: http://www.biography.com/people/andy-warhol-9523875?page=2
Student 2
Hello Class and Professor,
For some reason many of the illustrations in our text I cannot view. So I decided to search for contemporary art photos. There were quite a few interesting images but I found a sculpture or performance piece by Rook Floro that really caught my eye. Oddly, there is no title; at least I have not been able to locate one. Parts of this three-dimensional art look like it has some kind of wiry texture. The piece seems to be an imitation of human emotion. .
Assignment TitleAssessment Item 03 Case Study Analysis – Engagi.docxlynettearnold46882
Assignment Title
Assessment Item 03: Case Study Analysis – Engaging and Motivating staff
Length
3000-3500 wordsLearning outcomes
1. Knowledge - Describe and critically discuss key principles and theories of Human Resource Management.
2. Problem Solving Skills - Critically evaluate and synthesize relevant information to solve real world issues associated with Human Resource Management.
3. Change Management - Analyse the role of Human Resource Management in implementing change within a global context.
4. Global Environment - Identify and critically discuss local, global and international workforce trends and assess the implications for human resource managementLecturer Discretion
Lecturers may, at their discretion, ask students to verbally present their assignment submission or rewrite some selected part/s of their answer in a controlled setting.Task Details
Engaging and motivating employees is at the centre of Strategic Human Resource Management (SHRM) practices. It is therefore important to identify the organisational practices that can be used to foster the cognitive, emotional and behavioural qualities that will positively impact on employees and enhance their motivation.
To understand what motivates people to work is essential to this assignment. The focus of the assignment is to identify the motivational theories, the characteristics of a positive work environment and the HR practices that positively influence affective processes (e.g. motivation, commitment, job satisfaction, wellbeing) and behavioural processes (e.g. effort, reduced turnover and absenteeism).
To complete this assignment successfully students at a minimum should:
· Identify the key motivational theories and discuss which of the theories strongly influences employees’ affective processes and behavioural processes.
· Describe the characteristics of a positive work environment and discuss how HR designs jobs to motivate employees.
· Discuss the synthesis of Hackman and Oldham’s (1976) job characteristics and employees’ psychological states in relation to work outcomes, such as intrinsic work motivation, job satisfaction, and high quality work performance.
International Human Resource Management
· Discuss the possible relationship between Maslow’s general components and job characteristics in view of engaging and motivating employees in organisations.
Your assignment must be formatted with heading.
Harvard referencing style must be used.
References
Gallup Consulting 2010, The state of the global workplace: A worldwide study of employee engagement and wellbeing, viewed 20 February 2015
<http://www.gallup.com/services/176300/state-global-workplace.aspx>
Jackson, S & Schuler, R 1995, Understanding Human Resource Management in the context of organisations and their environments, Annual Review of Psychology, vol. 46, pp. 237-264.
Pfeffer, J & Veiga, F 1999, Putting people first for organisational success, Academy of
Management Executive, vol. 13, no. 2, pp.37-48.
Runni.
Assignment Title Knowledge management cycle process in or.docxlynettearnold46882
Assignment Title:
Knowledge management cycle process in organizations and significance communities of practice
Note:
Each question/concept/ topic must be supported with peer reviewed journal references.
Assignment Structure:
Part A.
1.
Provide brief description about knowledge management processes in organizations. (
1 Mark
)
2. Explain the concept of organizational learning and describe the link between individual and organizational leaning. (
2 Marks
)
3. Describe role of organizational culture in knowledge management. (
2 Marks
)
Part B.
1. Describe the concept of community. Describe its key components. (
1 Mark
)
2. Discuss how communities can be linked to organizational memory in order to foster organizational learning and innovation. (
2 Marks
)
3. Highlight some of the key steps you would need to carry out in order to conduct social network analysis of an organization. What sort of questions could the social network analysis answer? (
2 Marks
)
NO plagiarism/ 700 WORDS
.
Assignment Three Technical Descriptions Due March 2 (1155 PM .docxlynettearnold46882
Assignment Three: Technical Descriptions
Due: March 2 (11:55 PM on Moodle)Peer:Feb 29
For this assignment you will either be creating a technical description or an extended technical definition. Officially, an extended technical definition is a microgenre of a technical description, but there are some differences worth noting. Technical descriptions are “longer explanation[s] . . . of the physical or operational features of an object, mechanism, or process”(Markel 534). While technical descriptions include technical definitions, an extended technical definition is slightly different.
An extended definition includes the three parts of a basic sentence definition, “[1] the term being defined, [2] the category in which the term belongs, and [3] the distinguishing features that differentiate it from its category” (Johnson Sheehan 155). It also expands the definition by adding more details of an object, process, or idea (Markel 534). It is divided by adding some (all) of the following: examples, partition, principle of operation, analogy, negation, and etymology (Markel 538 – 541).
Technical descriptions need a title/indication of the nature/scope of what the description will accomplish; an introduction that answers the questions in table 20.1 on page 545; a body with appropriate detail that discusses each step or section with detail, creativity, and clarity; and a conclusion that usually explains how the steps work together or summarizes the main steps. Look at the guidelines on page 547 for writing tips and additional help.
What you choose to do this on is up to you. You are free to choose any object, place, or process (and the definition of these can be pretty loose—think about my spider example). If you want to choose something that interests you, something you currently work with, something from your future workplace, or something else entirely—go for it. If you want to do something out of the ordinary you can always ask me if it’s okay.
Requirements
· The description/definition should be between 600 to 1000 words.
· It should be typed in a serif font.
· It must focus on clear writing that uses creative and technical writing techniques.
· It should be written for an audience similar to Wikipedia.
· It should follow checklist on page 571 – 572.
Green Hospitality: Green Hospitality:
Saving the EnvironmentSaving the Environment
A student Webzine from the International Council
on Hotel, Restaurant, and Institutional Education
for Future Hospitality & Tourism Professionals
Vol. 17 No. 1 • ISSN: 1095-7898 Spring 2008
HOSTEUR
INTERNATIONAL
CHRIE
The Hospitality &
Tourism Educators
Volume 17, No. 1 | Spring/Summer 2008 Issue2 HOSTEURTM
Sustainability Standards for the Hotel Industry............5
by Andrew Moreo
Destination “Green”land - a Look at the Sustainable
Efforts of the Air Travel Industry......................9
by Katie Fontaine
Green Hotels..................................................
Assignment ThreeUNIT 3 – ON LINE CLASSStudent Name __________.docxlynettearnold46882
Assignment Three
UNIT 3 – ON LINE CLASS
Student Name: ______________________________________________
(Name must be exactly as it is on the e campus roll and the same in WEBCOM 2) Turn in assignment through WEBCOM 2 to Professor on time
Your Section Number _____________ (you must enter your section number)
The Unit 3 Assignment 3: Unit Three in the Textbook.
DIRECTIONS: The assignment is in WORD. Save the document to your computer and write your answers in the spaces given. You may change the spacing as needed.
NOTE: Turn in assignments to me through WEBCOM 2 see the place where you send me the assignment. You may either attach your Word file or copy and paste your entire submission. Be thorough in your answers. You should use the Textbook, Essential Humanitiesthird edition and/or the Study Guide. The Study Guide is not mandatory; however, it is there for your enrichment and it is helpful. The Study Guide is in WEBCOM 2 in the tab labeled Student Resources. You may also want to use additional information for any assignments from the Internet. If you do, please remember to cite your source at the end of your answer. If you add additional information from the Internet, this is great, but then be sure to cite your source at the end of your paragraph. You must cite sources. This applies to photos as well.
DIRECTIONS FOR FULL CREDIT: You will need to show how the architectural structure is significant (importance in history and explain its legacy). You should explain how it fits into the historical period and what it reflects about its time and place. Include names of important individuals connected to the construction and especially the name of the architect, if known. Mention the materials used in the construction and include information about how it was built. Also include location. Use full sentences in your answers and be sure to site your answers if you use photos and the internet if you use google. Do not just write in your site that you used google. You must place exact address. Google is too broad of a site for a reference. Thank you
1. List the major time periods in sequential order. The first period is Prehistoric. Then comes Mesopotamia, and then Egypt etc. Under each period, list the minimum of 3 major accomplishments or achievements of that period. See the WEBCOM 2 Resources tab that has the heading timeline and the Textbook Index in front of the textbook for Unit III which lists the periods of time in order
1. Discuss in written statements at least 2 major differences between the Paleolithic Era (Old Stone Age) and the Neolithic Era (New Stone) found during the Prehistoric Period? (Unit 3, Chapter 3). (SLO 3: ULO 3.4).
EXPLAIN ANSWER FULLY USING THE CHART THAT YOU WILL SEE ON A PAGE IN YOUR TEXT
1. Explain how the Sumerian marble statuettes, sculptures, and Queen Puabi’s Harp that were excavated in modern times help us understand how the Sumerian people’s lived and what their beliefs were during the anc.
Assignment title An Evaluation of the Business Strategy at Mc D.docxlynettearnold46882
Assignment title: An Evaluation of the Business Strategy at Mc Donald’s.
Word count: 4242
Student name: Shane Sunil Mohan
Student number: A001753898
Subject name: 9050PROJ
AQF Level: 9
Discipline: Strategic Management
Theme: Critical Evaluation of a Business Strategy
EXECUTIVE SUMMARY
This paper was fundamentally about conducting a research and analyzing the findings on an evaluation of the business strategy at Mc Donald’s. Mc Donald’s establishment is a centralized, international organization which competes in the fast food industry by supplying hamburgers, french fries, and other consumable items using standardization. Substantial expansion and branding as the main driving force. As mentioned previously, operating in an open market in the food chain sector, one of Mc Donald’s major competition would be Wendy’s. These two establishments offer the exact same service which tends to make it difficult for Mc Donald’s to gain market share. With this being said, this report outlines different strategic strategies in which Mc Donald’s can gain competitive advantage against Wendy’s by providing substantial evidence on Mc Donald’s weaknesses and how it can be improved by using the case study method to help assist presenting its findings.
Table of Contents
1.0 Introduction 4
2.0 Literature Review: 5
2.1 Application of the literature to Mc Donald’s 6
2.2 Analysis with respect to Neoclassical microeconomics: 7
2.3 Analysis with respect to Evolutionary economics: 8
3.0 Research Methodology: 9
3.1 Case study method: 9
3.2 Data Collection: 10
3.3 Presentation of findings: 10
3.4 Analyzing the data: 11
4.0 Data Analysis and Reflections 11
4.1 Presentation of data 11
4.2 Reflection on findings and implications: 12
5.0 Conclusion and Recommendations: 14
5.1 Addressing social changes with differentiation strategy: 15
5.2 Recommendation: Improved Promotional Strategy: 16
5.3 Conclusion 16
References 18
1.0 Introduction
With the increase in the trend of globalization and the increasing competition in global markets, companies work day and night to come with effective strategies. Some of the multinational companies are known for the strategies they use and practice. In this paper, two of the companies operating in the United States of America will be discussed and compared along with the suggestion of a competitive strategy for McDonald’s. One of the companies that was researched in this paper name is McDonald's. This company operates internationally while the opposition organization which is Wendy’s also known as a fast food restaurant operates in the United States of America. As far as McDonald's is concerned, McDonald's was established in the year 1940 by Richard and Maurice McDonald, in San Bernardino, California, United States. The organization's business structure depends on three basic axes: representatives, franchisees, and suppliers. This business structure made by the founder of the organization, Ray Kroc, is known as "the three-legged sto.
ASSIGNMENT The student will submit a research project that compares.docxlynettearnold46882
ASSIGNMENT: The student will submit a research project that compares and contrasts two organizations in the same sector (Career Education Corporation and the Apollo Group Inc. or any other that you prefer), including analysis of the following criteria: legal, social, and economic environments; management structure; operational and financial issues; and impact of potential change factors.
1) Student should analyze the basic legal, social, and economic environments of the organization
2) Student should analyze the managerial, operational and financial issues of the organization
3) Student will analyze the impact of potential change factors as they related to the organization.
4) Student should apply appropriate college level writing standard.
the submission should be in APA Format. LENGTH of Paper: 5 Body Pages
.
Assignment Three Case study report – mixed mediaValue 40 .docxlynettearnold46882
Assignment Three: Case study report – mixed media
Value: 40% of the total marks for the unit
Length: 2000 words, or 5-6 minute video, or audio-narrated powerpoint of 10-15 slides, or photo essay supported with 500 words
Due: Week 12
Task description
Attend the event nominated in Assignment 2.
Briefly describe the event – name, date, location and venue, and attendance numbers and demographics.
Describe and critically analyse the positive and negative impacts of the event utilising the principles of sustainability and the triple bottom line approach.
Describe and discuss how the event’s program elements related to the aims and objectives identified in Assignment Two.
Describe and discuss the marketing of the event and how the promoted experience related to the actualisation and attainment of its aims and objectives (include actual audience details – numbers, demographic composition).
Provide recommendations for future activities which clearly identify issues relevant to event management.
The task is a report on the event nominated in Assignment Two that uses the triple bottom line approach to identify and critically analyse - the attainment of the events aims and objectives; the positive and negative economic, environmental, sociocultural impacts of the event; and recommendations which clearly identify issues relevant to the event management.
The evaluation report should use creativity in the approach to the task style.
The assignment may be presented as a 2000 word essay, or a 5-6 minute video, or an audio-narrated powerpoint of 10-15 slides, or a photo essay supported with 500 words. The process for submission of this assessment will depend upon the format chosen and prior negotiation with the tutor is required.
.
Assignment The Nurse Leader as Knowledge WorkerThe term kn.docxlynettearnold46882
Assignment: The Nurse Leader as Knowledge Worker
The term “knowledge worker” was first coined by management consultant and author Peter Drucker in his book,
The Landmarks of Tomorrow
(1959). Drucker defined knowledge workers as high-level workers who apply theoretical and analytical knowledge, acquired through formal training, to develop products and services. Does this sound familiar?
Nurses are very much knowledge workers. What has changed since Drucker’s time are the ways that knowledge can be acquired. The volume of data that can now be generated and the tools used to access this data have evolved significantly in recent years and helped healthcare professionals (among many others) to assume the role of knowledge worker in new and powerful ways.
In this Assignment, you will consider the evolving role of the nurse leader and how this evolution has led nurse leaders to assume the role of knowledge worker. You will prepare a PowerPoint presentation with an infographic (graphic that visually represents information, data, or knowledge. Infographics are intended to present information quickly and clearly.) to educate others on the role of nurse as knowledge worker.
Reference: Drucker, P. (1959).
The landmarks of tomorrow. New York, NY: HarperCollins Publishers.
To Prepare:
Review the concepts of informatics as presented in the Resources.
Reflect on the role of a nurse leader as a knowledge worker.
Consider how knowledge may be informed by data that is collected/accessed.
The Assignment:
Explain the concept of a knowledge worker.
Define and explain nursing informatics and highlight the role of a nurse leader as a knowledge worker.
Develop a simple infographic to help explain these concepts.
Your PowerPoint should Include the hypothetical scenario you originally shared in the Discussion Forum. Include your examination of the data that you could use, how the data might be accessed/collected, and what knowledge might be derived from that data. Be sure to incorporate feedback received from your colleagues’ responses.
.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Discuss the concept of strategic business–IT alignment and how it .docx
1. Discuss the concept of strategic business–IT alignment and how
it relates to the BOAT framework.
Minimum 300 words.
Include in text citations and references.
CHAPTER 16 Methodology—Conceptual
Database Design
Chapter Objectives
In this chapter you will learn:In this chapter you will learn:
• The purpose of a design methodology.
• The three main phases of database design: conceptual, logical,
and physical design.
• How to decompose the scope of the design into specific views
of
the enterprise.
• How to use ER modeling to build a local conceptual data
model
based on the information given in a view of the enterprise.
• How to validate the resultant conceptual data model to ensure
2. that it is a true and accurate representation of a view of the
enterprise.
• How to document the process of conceptual database design.
• End-users play an integral role throughout the process of
conceptual database design.
In Chapter 10Chapter 10 we described the main stages of the
database system
development lifecycle, one of which is database designdatabase
design. This stage
starts only after a complete analysis of the enterprise’s
requirements
has been undertaken.
In this chapter, and Chapters 17Chapters 17–1919, we describe
a methodology for
455
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_019.xhtml#eid278
76
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid377
80
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_029.xhtml#eid413
43
the database design stage of the database system development
3. lifecycle for relational databases. The methodology is presented
as a
step-by-step guide to the three main phases of database design,
namely: conceptual, logical, and physical design (see Figure
10.1Figure 10.1).
The main aim of each phase is as follows:
• Conceptual database designConceptual database design—to
build the conceptual
representation of the database, which includes identification of
the important entities, relationships, and attributes.
• Logical database designLogical database design—to translate
the conceptual
representation to the logical structure of the database, which
includes designing the relations.
• Physical database designPhysical database design—to decide
how the logical structure
is to be physically implemented (as base relations) in the target
DBMS.
Structure of this Chapter
In Section 16.1Section 16.1 we define what a database design
methodology is
4. and review the three phases of database design. In Section
16.2Section 16.2 we
provide an overview of the methodology and briefly describe
the
main activities associated with each design phase. In Section
16.3Section 16.3
we focus on the methodology for conceptual database design
and
present a detailed description of the steps required to build a
conceptual data model. We use the ER modeling technique
described
in Chapters 12Chapters 12 and 1313 to create the conceptual
data model. The
conceptual data model described in this chapter is the starting
point
for the next phase of database design described in the following
455
456
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_019.xhtml#eid280
03
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid365
69
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid366
42
6. two chapters.
In Chapters 18Chapters 18 and 1919 we complete the database
design
methodology by presenting a detailed description of the steps
associated with the production of the physical database design
for
relational DBMSs. This part of the methodology illustrates that
the
development of the logical data model alone is insufficient to
guarantee the optimum implementation of a database system.
For
example, we may have to consider modifying the logical model
to
achieve acceptable levels of performance.
Appendix DAppendix D presents a summary of the database
design
methodology for those readers who are already familiar with
database design and simply require an overview of the main
steps.
Throughout the methodology the terms “entity” and
“relationship”
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid377
80
8. 16.1.1 What Is a Design Methodology?
Design methodology
A structured approach that uses procedures, techniques, tools,
and
documentation aids to support and facilitate the process of
design.
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_020.xhtml#eid300
21
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_051.xhtml#eid848
53
A design methodology consists of phases each containing a
number of
steps that guide the designer in the techniques appropriate at
each
stage of the project. A design methodology also helps the
designer to
plan, manage, control, and evaluate database development
projects.
Furthermore, it is a structured approach for analyzing and
modeling a
set of requirements for a database in a standardized and
organized
manner.
9. 16.1.2 Conceptual, Logical, and Physical
Database Design
In presenting this database design methodology, the design
process is
divided into three main phases: conceptual, logical, and
physical
database design.
Conceptual database design
The process of constructing a model of the data used in an
enterprise,
independent of all physical considerations.
The conceptual database design phase begins with the creation
of a
conceptual data model of the enterprise that is entirely
independent
of implementation details such as the target DBMS, application
programs, programming languages, hardware platform,
performance
issues, or any other physical considerations.
456
457
10. Logical database design
The process of constructing a model of the data used in an
enterprise
based on a specific data model, but independent of a particular
DBMS
and other physical considerations.
The logical database design phase maps the conceptual data
model on
to a logical model, which is influenced by the data model for
the target
database (for example, the relational model). The logical data
model is
a source of information for the physical design phase, providing
the
physical database designer with a vehicle for making trade-offs
that
are very important to the design of an efficient database.
Physical database design
The process of producing a description of the implementation of
the
database on secondary storage; it describes the base relations,
file
11. organizations, and indexes used to achieve efficient access to
the
data, and any associated integrity constraints and security
measures.
The physical database design phase allows the designer to make
decisions on how the database is to be implemented. Therefore,
physical design is tailored to a specific DBMS. There is
feedback
between physical and logical design, because decisions taken
during
physical design for improving performance may affect the
logical data
model.
16.1.3 Critical Success Factors in Database
Design
The following guidelines are often critical to the success of
database
design:
• Work interactively with the users as much as possible.
• Follow a structured methodology throughout the data
modeling
12. process.
• Employ a data-driven approach.
• Incorporate structural and integrity considerations into the
data
models.
• Combine conceptualization, normalization, and transaction
validation techniques into the data modeling methodology.
• Use diagrams to represent as much of the data models as
possible.
• Use a Database Design Language (DBDL) to represent
additional
data semantics that cannot easily be represented in a diagram.
• Build a data dictionary to supplement the data model diagrams
and the DBDL.
• Be willing to repeat steps.
These factors are built into the methodology we present for
database
design.
16.2 Overview of the Database Design
Methodology
In this section, we present an overview of the database design
13. 457
458
methodology. The steps in the methodology are as follows.
Conceptual database design
Step 1 Build conceptual data model
Step 1.1 Identify entity types
Step 1.2 Identify relationship types
Step 1.3 Identify and associate attributes with entity or
relationship types
Step 1.4 Determine attribute domains
Step 1.5 lDetermine candidate, primary, and alternate key
attributes
Step 1.6 Consider use of enhanced modeling concepts (optional
step)
Step 1.7 Check model for redundancy
Step 1.8 Validate conceptual data model against user
transactions
14. Step 1.9 Review conceptual data model with user
Logical database design for the relational
model
Step 2 Build logical data model
Step 2.1 Derive relations for logical data model
Step 2.2 Validate relations using normalization
Step 2.3 Validate relations against user transactions
Step 2.4 Check integrity constraints
Step 2.5 Review logical data model with user
Step 2.6 Merge logical data models into global model (optional
step)
Step 2.7 Check for future growth
Physical database design for relational
databases
Step 3 Translate logical data model for target DBMS
Step 3.1 Design base relations
Step 3.2 Design representation of derived data
15. Step 3.3 Design general constraints
Step 4 Design file organizations and indexes
Step 4.1 Analyze transactions
Step 4.2 Choose file organizations
Step 4.3 Choose indexes
Step 4.4 Estimate disk space requirements
Step 5 Design user views
Step 6 Design security mechanisms
Step 7 Consider the introduction of controlled redundancy
Step 8 Monitor and tune the operational system
This methodology can be used to design relatively simple to
highly
complex database systems. Just as the database design stage of
the
database systems development lifecycle (see Section
10.6Section 10.6) has three
phases—conceptual, logical, and physical design—so too has
the
methodology. Step 1Step 1 creates a conceptual database
design, Step 2Step 2
16. creates a logical database design, and Steps 3Steps 3 to 88
create a physical
database design. Depending on the complexity of the database
system
being built, some of the steps may be omitted. For example,
Step 2.6Step 2.6
of the methodology is not required for database systems with a
single
user view or database systems with multiple user views being
managed using the centralized approach (see Section
10.5Section 10.5). For this
reason, we refer to the creation of a single conceptual data
model only
in Step 1Step 1 and single logical data model only in Step 2Step
2. However, if the
database designer is using the view integration approach (see
SectionSection
10.510.5) to manage user views for a database system, then
Steps 1Steps 1 and 22
458
459
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_019.xhtml#eid282
43
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid368
18. a
database system. However, the methodology is presented using
the
more general terms “conceptual data model” and “logical data
model”
with the exception of the optional Step 2.6Step 2.6, which
necessitates the use
of the terms local logical data model and global logical data
model, as
it is this step that describes the tasks necessary to merge
separate local
logical data models to produce a global logical data model.
An important aspect of any design methodology is to ensure that
the
models produced are repeatedly validated so that they continue
to be
an accurate representation of the part of the enterprise being
modeled. In this methodology the data models are validated in
various
ways such as by using normalization (Step 2.2Step 2.2), by
ensuring the
critical transactions are supported (Steps 1.8Steps 1.8 and
2.32.3), and by
19. involving the users as much as possible (Steps 1.9Steps 1.9 and
2.52.5).
The logical model created at the end of Step 2Step 2 is then
used as the
source of information for physical database design described in
StepsSteps
33 to 88. Again, depending on the complexity of the database
systems
being designed and/or the functionality of the target DBMS,
some of
the steps of physical database design may be omitted. For
example,
Step 4.2Step 4.2 may not be applicable for certain PC-based
DBMSs. The steps
of physical database design are described in detail in Chapters
18Chapters 18
and 1919.
459
460
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid386
23
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_019.xhtml#eid278
76
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid386
23
21. this manner. It is likely that knowledge gained in one step may
alter
decisions made in a previous step. Similarly, it may be useful to
look
briefly at a later step to help with an earlier step. Therefore, the
methodology should act as a framework to help guide the
designer
through database design effectively.
To illustrate the database design methodology we use the
DreamHome
case study. The DreamHome database has several user views
(Director, Manager, Supervisor, Assistant, and Client) that are
managed using a combination of the centralized and view
integration
approaches (see Section 11.4Section 11.4). Applying the
centralized approach
resulted in the identification of two collections of user views
called
StaffClient user views and Branch user views. The user views
represented by each collection are as follows:
• StaffClient user viewsStaffClient user views—representing
Supervisor, Assistant, and
22. Client user views;
• Branch user viewsBranch user views—representing Director
and Manager user
views.
In this chapter, which describes Step 1Step 1 of the
methodology, we use the
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_020.xhtml#eid300
21
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid368
17
StaffClient user views to illustrate the building of a conceptual
data
model, and then in the following chapter, which describes Step
2Step 2, we
describe how this model is translated into a logical data model.
As the
StaffClient user views represent only a subset of all the user
views of
the DreamHome database, it is more correct to refer to the data
models as local data models. However, as stated earlier when
we
described the methodology and the worked examples, for
simplicity
23. we use the terms conceptual data model and logical data model
until
the optional Step 2.6Step 2.6, which describes the integration of
the local
logical data models for the StaffClient user views and the
Branch user
views.
16.3 Conceptual Database Design
Methodology
This section provides a step-by-step guide for conceptual
database
design.
Step 1: Build Conceptual Data Model
Objective
To build a conceptual data model of the data requirements of
the
enterprise.
The first step in conceptual database design is to build one (or
more)
conceptual data models of the data requirements of the
enterprise. A
conceptual data model comprises:
24. epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid378
34
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid386
23
• entity types;
• relationship types;
• attributes and attribute domains;
• primary keys and alternate keys;
• integrity constraints.
The conceptual data model is supported by documentation,
including
ER diagrams and a data dictionary, which is produced
throughout the
development of the model. We detail the types of supporting
documentation that may be produced as we go through the
various
steps. The tasks involved in Step 1Step 1 are:
Step 1.1 Identify entity types
Step 1.2 Identify relationship types
Step 1.3 Identify and associate attributes with entity or
25. relationship
types
Step 1.4 Determine attribute domains
Step 1.5 Determine candidate, primary, and alternate key
attributes
Step 1.6 Consider use of enhanced modeling concepts (optional
step)
Step 1.7 Check model for redundancy
Step 1.8 Validate conceptual data model against user
transactions
Step 1.9 Review conceptual data model with user
Step 1.1: Identify entity types
Objective
To identify the required entity types.
The first step in building a conceptual data model is to
determine and
460
461
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid368
17
26. define the main objects that the users are interested in. These
objects
are the entity types for the model (see Section 12.1Section
12.1). One method of
identifying entities is to examine the users’ requirements
specification. From this specification, we identify nouns or
noun
phrases that are mentioned (for example, staff number, staff
name,
property number, property address, rent, number of rooms). We
also
look for major objects, such as people, places, or concepts of
interest,
excluding those nouns that are merely qualities of other objects.
For
example, we could group staff number and staff name with an
object
or entity called Staff and group property number, property
address,
rent, and number of rooms with an entity called
PropertyForRent.
An alternative way of identifying entities is to look for objects
that
have an existence in their own right. For example, Staff is an
27. entity
because staff exist whether or not we know their names,
positions,
and dates of birth. If possible, the users should assist with this
activity.
It is sometimes difficult to identify entities because of the way
they are
presented in the users’ requirements specification. Users often
talk in
terms of examples or analogies. Instead of talking about staff in
general, users may mention people’s names. In some cases,
users talk
in terms of job roles, particularly when people or organizations
are
involved. These roles may be job titles or responsibilities, such
as
Director, Manager, Supervisor, or Assistant.
To confuse matters further, users frequently use synonyms and
homonyms. Two words are synonyms when they have the same
meaning, for example, “branch” and “office.” Homonyms occur
when
the same word can have different meanings depending on the
context.
28. For example, the word “program” has several alternative
meanings
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid313
33
such as a course of study, a series of events, a plan of work, and
an
item on the television.
It is not always obvious whether a particular object is an entity,
a
relationship, or an attribute. For example, how would we
classify
marriage? In fact, depending on the actual requirements, we
could
classify marriage as any or all of these. Design is subjective,
and
different designers may produce different, but equally valid,
interpretations. The activity therefore relies, to a certain extent,
on
judgement and experience. Database designers must take a very
selective view of the world and categorize the things that they
observe
within the context of the enterprise. Thus, there may be no
29. unique set
of entity types deducible from a given requirements
specification.
However, successive iterations of the design process should
lead to the
choice of entities that are at least adequate for the system
required.
For the StaffClient user views of DreamHome, we identify the
following entities:
Staff PropertyForRent
PrivateOwner BusinessOwner
Client Preference
461
462
Lease
Document entity types
As entity types are identified, assign them names that are
meaningful
and obvious to the user. Record the names and descriptions of
entities
30. in a data dictionary. If possible, document the expected number
of
occurrences of each entity. If an entity is known by different
names,
the names are referred to as synonyms or aliases, which are also
recorded in the data dictionary. Figure 16.1Figure 16.1 shows
an extract from
the data dictionary that documents the entities for the
StaffClient user
views of DreamHome.
Step 1.2: Identify relationship types
Objective
To identify the important relationships that exist between the
entity
types.
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid369
51
Figure 16.1 Extract from the data dictionary for the
StaffClient user views of DreamHome showing a
description of entities.
Having identified the entities, the next step is to identify all the
31. relationships that exist between these entities (see Section
12.2Section 12.2).
When we identify entities, one method
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid313
77
is to look for nouns in the users’ requirements specification.
Again, we
can use the grammar of the requirements specification to
identify
relationships. Typically, relationships are indicated by verbs or
verbal
expressions. For example:
• Staff Manages PropertyForRent
• PrivateOwner Owns PropertyForRent
• PropertyForRent AssociatedWith Lease
The fact that the requirements specification records these
relationships suggests that they are important to the enterprise
and
should be included in the model.
We are interested only in required relationships between
entities. In
32. the previous examples, we identified the Staff Manages
PropertyForRent and the PrivateOwner Owns PropertyForRent
relationships. We may also be inclined to include a relationship
between Staff and PrivateOwner (for example, Staff Assists
PrivateOwner). However, although this is a possible
relationship, from
the requirements specification, it is not a relationship that we
are
interested in modeling.
In most instances, the relationships are binary; in other words,
the
relationships exist between exactly two entity types. However,
we
should be careful to look out for complex relationships that may
involve more than two entity types (see Section 12.2.1Section
12.2.1) and
recursive relationships that involve only one entity type (see
SectionSection
12.2.212.2.2).
462
463
33. epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid314
66
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid315
43
Great care must be taken to ensure that all the relationships that
are
either explicit or implicit in the users’ requirements
specification are
detected. In principle, it should be possible to check each pair
of entity
types for a potential relationship between them, but this would
be a
daunting task for a large system comprising hundreds of entity
types.
On the other hand, it is unwise not to perform some such check,
and
the responsibility is often left to the analyst/designer. However,
missing relationships should become apparent when we validate
the
model against the transactions that are to be supported (Step
1.8Step 1.8).
Use Entity–Relationship (ER) diagrams
It is often easier to visualize a complex system rather than
34. decipher
long textual descriptions of a users’ requirements specification.
We
use ER diagrams to represent entities and how they relate to one
another more easily. Throughout the database design phase, we
recommend that ER diagrams be used whenever necessary to
help
build up a picture of the part of the enterprise that we are
modeling.
In this book, we use UML, but other notations perform a similar
function (see Appendix CAppendix C).
Determine the multiplicity constraints of
relationship types
Having identified the relationships to model, we next determine
the
multiplicity of each relationship (see Section 12.6Section 12.6).
If specific values
for the multiplicity are known, or even upper or lower limits,
document these values as well.
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid375
52
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_053.xhtml#eid854
91
35. epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid318
81
Multiplicity constraints are used to check and maintain data
quality.
These constraints are assertions about entity occurrences that
can be
applied when the database is updated to determine whether the
updates violate the stated rules of the enterprise. A model that
includes multiplicity constraints more explicitly represents the
semantics of the relationships and results in a better
representation of
the data requirements of the enterprise.
Figure 16.2 First-cut ER diagram showing entity and
relationship types for the StaffClient user views of
DreamHome.
Check for fan and chasm traps
Having identified the necessary relationships, check that each
relationship in the ER model is a true representation of the “real
world,” and that fan or chasm traps have not been created
inadvertently (see Section 12.7Section 12.7).
36. 463
464
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid322
62
Figure 16.2Figure 16.2 shows the first-cut ER diagram for the
StaffClient user
views of the DreamHome case study.
Document relationship types
As relationship types are identified, assign them names that are
meaningful and obvious to the user. Also record relationship
descriptions and the multiplicity constraints in the data
dictionary.
Figure 16.3Figure 16.3 shows an extract from the data
dictionary that
documents the relationships for the StaffClient user views of
DreamHome.
Step 1.3: Identify and associate attributes
with entity or relationship types
Objective
To associate attributes with appropriate entity or relationship
types.
37. The next step in the methodology is to identify the types of
facts about
the entities and relationships that we have chosen to be
represented
in the database. In a
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid370
07
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid370
43
similar way to identifying entities, we look for nouns or noun
phrases
in the users’ requirements specification. The attributes can be
identified where the noun or noun phrase is a property, quality,
identifier, or characteristic of one of these entities or
relationships
(see Section 12.3Section 12.3).
Figure 16.3 Extract from the data dictionary for the
StaffClient user views of DreamHome, showing a
description of relationships.
By far the easiest thing to do when we have identified an entity
(x) or
a relationship (y) in the requirements specification is to ask
38. “What
information are we required to hold on x or y?” The answer to
this
question should be described in the specification. However, in
some
cases it may be necessary to ask the users to clarify the
requirements.
Unfortunately, they may give answers to this question that also
contain other concepts, so the users’ responses must be
carefully
considered.
Simple/composite attributes
It is important to note whether an attribute is simple or
composite (see
Section 12.3.1Section 12.3.1). Composite attributes are made up
of simple
464
465
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid315
91
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid316
34
39. attributes. For example, the address attribute can be simple and
hold
all the details of an address as a single value, such as “115
Dumbarton
Road, Glasgow, G11 6YG.” However, the address attribute may
also
represent a composite attribute, made up of simple attributes
that
hold the address details as separate values in the attributes
street
(“115 Dumbarton Road”), city (“Glasgow”), and postcode (“G11
6YG”).
The option to represent address details as a simple or composite
attribute is determined by the users’ requirements. If the user
does
not need to access the separate components of an address, we
represent the address attribute as a simple attribute. On the
other
hand, if the user does need to access the individual components
of an
address, we represent the address attribute as being composite,
made
up of the required simple attributes.
40. In this step, it is important that we identify all simple attributes
to be
represented in the conceptual data model including those
attributes
that make up a composite attribute.
Single/multi-valued attributes
In addition to being simple or composite, an attribute can also
be
single-valued or multi-valued (see Section 12.3.2Section
12.3.2). Most attributes
encountered will be single-valued, but occasionally a multi-
valued
attribute may be encountered; that is, an attribute that holds
multiple
values for a single entity occurrence. For example, we may
identify
the attribute telNo (the telephone number) of the Client entity
as a
multivalued attribute.
On the other hand, client telephone numbers may have been
identified as a separate entity from Client. This is an
alternative, and
465
41. 466
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid316
64
equally valid, way to model this. As you will see in Step
2.1Step 2.1, multi-
valued attributes are mapped to relations anyway, so both
approaches
produce the same end result.
Derived attributes
Attributes whose values are based on the values of other
attributes
are known as derived attributes (see Section 12.3.3Section
12.3.3). Examples of
derived attributes include:
• the age of a member of staff;
• the number of properties that a member of staff manages;
• the rental deposit (calculated as twice the monthly rent).
Often, these attributes are not represented in the conceptual data
model. However, sometimes the value of the attribute or
attributes on
42. which the derived attribute is based may be deleted or modified.
In
this case, the derived attribute must be shown in the data model
to
avoid this potential loss of information. However, if a derived
attribute is shown in the model, we must indicate that it is
derived.
The representation of derived attributes will be considered
during
physical database design. Depending on how an attribute is
used, new
values for a derived attribute may be calculated each time it is
accessed or when the value(s) it is derived from changes.
However,
this issue is not the concern of conceptual database design, and
is
discussed in more detail in Step 3.2Step 3.2 in Chapter
18Chapter 18.
Potential problems
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid378
97
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid316
87
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_028.xhtml#eid399
16
43. epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_028.xhtml#eid396
71
When identifying the entities, relationships, and attributes for
the
user views, it is not uncommon for it to become apparent that
one or
more entities, relationships, or attributes have been omitted
from the
original selection. In this case, return to the previous steps,
document
the new entities, relationships, or attributes, and reexamine any
associated relationships.
As there are generally many more attributes than entities and
relationships, it may be useful to first produce a list of all
attributes
given in the users’ requirements specification. As an attribute is
associated with a particular entity or relationship, remove the
attribute from the list. In this way, we ensure that an attribute is
associated with only one entity or relationship type and, when
the list
is empty, that all attributes are associated with some entity or
44. relationship type.
We must also be aware of cases where attributes appear to be
associated with more than one entity or relationship type, as
this can
indicate the following:
(1) We have identified several entities that can be represented
as a
single entity. For example, we may have identified entities
Assistant and Supervisor both with the attributes staffNo (the
staff
number), name, sex, and DOB (date of birth), which can be
represented as a single entity called Staff with the attributes
staffNo (the staff number), name, sex, DOB, and position (with
values
Assistant or Supervisor). On the other hand, it may be that these
entities share many attributes but there are also attributes or
relationships that are unique to each entity. In this case, we
must
decide whether we want to generalize the entities into a single
entity such as Staff, or leave them as specialized entities
45. representing distinct staff
roles. The consideration of whether to specialize or generalize
entities was discussed in Chapter 13Chapter 13 and is addressed
in more
detail in Step 1.6Step 1.6.
(2) We have identified a relationship between entity types. In
this
case, we must associate the attribute with only one entity, the
parent entity, and ensure that the relationship was previously
identified in Step 1.2Step 1.2. If this is not the case, the
documentation
should be updated with details of the newly identified
relationship. For example, we may have identified the entities
Staff and PropertyForRent with the following attributes:
Staff staffNo, name, position, sex, DOB
PropertyForRent propertyNo, street, city, postcode,
type, rooms, rent, managerName
The presence of the managerName attribute in PropertyForRent
is
46. intended to represent the relationship Staff Manages
PropertyForRent. In this case, the managerName attribute
should be
omitted from PropertyForRent and the relationship Manages
should
be added to the model.
DreamHome attributes for entities
466
467
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_022.xhtml#eid326
13
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid373
99
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid369
40
For the StaffClient user views of DreamHome, we identify and
associate attributes with entities as follows:
Staff staffNo, name (composite: fName, IName),
position, sex, DOB
PropertyForRent propertyNo, address (composite: street,
city, postcode), type, rooms, rent
47. PrivateOwner ownerNo, name (composite: fName, IName),
address, telNo
BusinessOwner ownerNo, bName, bType, address, telNo,
contactName
Client clientNo, name (composite: fName,
IName), telNo, eMail
Preference prefType, maxRent
Lease leaseNo, paymentMethod, deposit (derived
as PropertyForRent.rent*2), depositPaid,
rentStart, rentFinish, duration (derived
as rentFinish – rentStart)
DreamHome attributes for relationships
Some attributes should not be associated with entities, but
instead
should be associated with relationships. For the StaffClient user
views
of DreamHome, we identify and associate attributes with
relationships, as follows:
48. Views viewDate, comment
Document attributes
As attributes are identified, assign them names that are
meaningful to
the user. Record the following information for each attribute:
• attribute name and description;
• data type and length;
• any aliases that the attribute is known by;
• whether the attribute is composite and, if so, the simple
attributes
that make up the composite attribute;
• whether the attribute is multi-valued;
• whether the attribute is derived and, if so, how it is to be
computed;
• any default value for the attribute.
467
468
Figure 16.4 Extract from the data dictionary for the
49. StaffClient user views of DreamHome showing a
description of attributes.
Figure 16.4Figure 16.4 shows an extract from the data
dictionary that
documents the attributes for the StaffClient user views of
DreamHome.
Step 1.4: Determine attribute domains
Objective
To determine domains for the attributes in the conceptual data
model.
The objective of this step is to determine domains for all the
attributes
in the model (see Section 12.3Section 12.3). A domaindomain is
a pool of values from
which one or more attributes draw their values. For example, we
may
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid372
76
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid315
91
define:
50. • the attribute domain of valid staff numbers (staffNo) as being
a
five-character variable-length string, with the first two
characters
as letters and the next one to three characters as digits in the
range 1–999;
• the possible values for the sex attribute of the Staff entity as
being
either “M” or “F.” The domain of this attribute is a single
character
string consisting of the values “M” or “F.”
A fully developed data model specifies the domains for each
attribute
and includes:
• allowable set of values for the attribute;
• sizes and formats of the attribute.
Further information can be specified for a domain, such as the
allowable operations on an attribute, and which attributes can
be
compared with other attributes or used in combination with
other
attributes. However, implementing these characteristics of
51. attribute
domains in a DBMS is still the subject of research.
Document attribute domains
As attribute domains are identified, record their names and
characteristics in the data dictionary. Update the data dictionary
entries for attributes to record their domain in place of the data
type
and length information.
STEP 1.5: Determine candidate, primary, and
alternate key attributes
Objective
To identify the candidate key(s) for each entity type and, if
there is
more than one candidate key, to choose one to be the primary
key and
the others as alternate keys.
This step is concerned with identifying the candidate key(s) for
an
entity and then selecting one to be the primary key (see
SectionSection
52. 12.3.412.3.4). A candidate keycandidate key is a minimal set of
attributes of an entity
that uniquely identifies each occurrence of that entity. We may
identify more than one candidate key, in which case we must
choose
one to be the primary keyprimary key; the remaining candidate
keys are called
alternate keysalternate keys.
468
469
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid317
17
People’s names generally do not make good candidate keys. For
example, we may think that a suitable candidate key for the
Staff
entity would be the composite attribute name, the member of
staff’s
name. However, it is possible for two people with the same
name to
join DreamHome, which would clearly invalidate the choice of
name as
a candidate key. We could make a similar argument for the
53. names of
property owners. In such cases, rather than coming up with
combinations of attributes that may provide uniqueness, it may
be
better to use an existing attribute that would always ensure
uniqueness, such as the staffNo attribute for the Staff entity and
the
ownerNo attribute for the PrivateOwner entity, or define a new
attribute
that would provide uniqueness.
When choosing a primary key from among the candidate keys,
use the
following guidelines to help make the selection:
• the candidate key with the minimal set of attributes;
• the candidate key that is least likely to have its values
changed;
• the candidate key with fewest characters (for those with
textual
attribute(s));
• the candidate key with smallest maximum value (for those
with
numerical attribute(s));
54. • the candidate key that is easiest to use from the users’ point of
view.
In the process of identifying primary keys, note whether an
entity is
strong or weak. If we are able to assign a primary key to an
entity, the
entity is referred to as being strong. On the other hand, if we
are
unable to identify a primary key for an entity, the entity is
referred to
as being weak (see Section 12.4Section 12.4). The primary key
of a weak entity
can be identified only when we map the weak entity and its
relationship with its owner entity to a relation through the
placement
of a foreign key in that relation. The process of mapping
entities and
their relationships to relations is described in Step 2.1Step 2.1,
and therefore
the identification of primary keys for weak entities cannot take
place
55. until that step.
DreamHome primary keys
The primary keys for the StaffClient user views of DreamHome
are
shown in Figure 16.5Figure 16.5. Note that the Preference
entity is a weak entity
and, as identified previously, the Views relationship has two
attributes,
viewDate and comment.
469
470
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_021.xhtml#eid317
95
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_027.xhtml#eid378
97
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid373
89
Figure 16.5 ER diagram for the StaffClient user views of
DreamHome with primary keys added.
Document primary and alternate keys
Record the identification of primary and any alternate keys in
the data
dictionary.
56. STEP 1.6: Consider use of enhanced modeling
concepts (optional step)
Objective
To consider the use of enhanced modeling concepts, such as
specialization/generalization, aggregation, and composition.
In this step, we have the option to continue the development of
the ER
model using the enhanced modeling concepts discussed in
ChapterChapter
1313, namely specialization/generalization, aggregation, and
composition. If we select the specialization approach, we
attempt to
highlight differences between entities by defining one or more
subclassessubclasses of a superclasssuperclass entity. If we
select the generalization
approach, we attempt to identify common features between
entities to
define a generalizing superclass entity. We may use aggregation
to
represent a ‘has-a’ or ‘is-part-of’ relationship between entity
types,
57. where one represents the ‘whole’ and the other the ‘part’. We
may use
composition (a special type of aggregation) to represent an
association
between entity types where there is a strong ownership and
coincidental lifetime between the ‘whole’ and the ‘part’.
For the StaffClient user views of DreamHome, we choose to
generalize
the two entities PrivateOwner and BusinessOwner to create a
superclass
Owner that contains the common attributes ownerNo, address,
and telNo.
The relationship that the Owner superclass has with its
subclasses is
mandatory and disjoint, denoted as {Mandatory, Or}; each
member of
the Owner superclass must be a member of one of the
subclasses, but
cannot belong to both.
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_022.xhtml#eid326
13
Figure 16.6 Revised ER diagram for the StaffClient user
views of DreamHome with specialization/generalization
58. added.
In addition, we identify one specialization subclass of Staff,
namely
Supervisor, specifically to model the Supervises relationship.
The
relationship that the Staff superclass has with the Supervisor
subclass
is optional: a member of the Staff superclass does not
necessarily
have to be a member of the Supervisor subclass. To keep the
design
simple, we decide not to use aggregation or composition. The
revised
ER diagram for the StaffClient user views of DreamHome is
shown in
Figure 16.6Figure 16.6.
470
471
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid374
29
There are no strict guidelines on when to develop the ER model
using
59. enhanced modeling concepts, as the choice is often subjective
and
dependent on the particular characteristics of the situation that
is
being modeled. As a useful “rule of thumb” when considering
the use
of these concepts, always attempt to represent the important
entities
and their relationships as clearly as possible in the ER diagram.
Therefore, the use of enhanced modeling concepts should be
guided
by the readability of the ER diagram and the clarity by which it
models
the important entities and relationships.
These concepts are associated with enhanced ER modeling.
However,
as this step is optional, we simply use the term “ER diagram”
when
referring to the diagrammatic representation of data models
throughout the methodology.
STEP 1.7: Check model for redundancy
Objective
60. To check for the presence of any redundancy in the model.
In this step, we examine the conceptual data model with the
specific
objective of identifying whether there is any redundancy present
and
removing any that does exist. The three activities in this step
are:
471
472
(1) re-examine one-to-one (1:1) relationships;
(2) remove redundant relationships;
(3) consider time dimension.
(1) Re-examine one-to-one (1:1) relationships
In the identification of entities, we may have identified two
entities
that represent the same object in the enterprise. For example,
we may
have identified the two entities Client and Renter that are
actually the
same; in other words, Client is a synonym for Renter. In this
61. case, the
two entities should be merged together. If the primary keys are
different, choose one of them to be the primary key and leave
the
other as an alternate key.
(2) Remove redundant relationships
Figure 16.7 Remove the redundant relationship called
Rents.
A relationship is redundant if the same information can be
obtained
via other relationships. We are trying to develop a minimal data
model and, as redundant relationships are unnecessary, they
should
be removed. It is relatively easy to identify whether there is
more than
one path between two entities. However, this does not
necessarily
imply that one of the relationships is redundant, as they may
represent different associations between the entities. For
example,
consider the relationships between the PropertyForRent, Lease,
62. and
Client entities shown in Figure 16.7Figure 16.7. There are two
ways to find out
which clients rent which properties. There is the direct route
using the
Rents relationship between the Client and PropertyForRent
entities, and
there is the indirect route, using the Holds and AssociatedWith
relationships via the Lease entity. Before we can assess whether
both
routes are required, we need
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid374
89
to establish the purpose of each relationship. The Rents
relationship
indicates which client rents which property. On the other hand,
the
Holds relationship indicates which client holds which lease, and
the
AssociatedWith relationship indicates which properties are
associated
with which leases. Although it is true that there is a relationship
63. between clients and the properties they rent, this is not a direct
relationship and the association is more accurately represented
through a lease. The Rents relationship is therefore redundant
and
does not convey any additional information about the
relationship
between PropertyForRent and Client that cannot more correctly
be
found through the Lease entity. To ensure that we create a
minimal
model, the redundant Rents relationship must be removed.
(3) Consider time dimension
The time dimension of relationships is important when assessing
redundancy. For example, consider the situation in which we
wish to
model the relationships between the entities Man, Woman, and
Child, as
illustrated in Figure 16.8Figure 16.8. Clearly, there are two
paths between Man
and Child: one via the direct relationship FatherOf and the other
via
the relationships MarriedTo and MotherOf. Consequently, we
may think
64. that the relationship FatherOf is unnecessary. However, this
would be
incorrect for two reasons:
(1) The father may have children from a previous marriage, and
we
are modeling only the father’s current marriage through a 1:1
relationship.
(2) The father and mother may not be married, or the father may
be
472
473
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid375
63
married to someone other than the mother (or the mother may be
married to someone who is not the father).
In either case, the required relationship could not be modeled
without
the FatherOf relationship. The message is that it is important to
examine the meaning of each relationship between entities when
assessing redundancy. At the end of this step, we have
65. simplified the
local conceptual data model by removing any inherent
redundancy.
STEP 1.8: Validate conceptual data model
against user transactions
Objective
To ensure that the conceptual data model supports the required
transactions.
Figure 16.8 Example of a nonredundant relationship
FatherOf.
We now have a conceptual data model that represents the data
requirements of the enterprise. The objective of this step is to
check
the model to ensure that the model supports the required
transactions. Using the model, we attempt to perform the
operations
manually. If we can resolve all transactions in this way, we
have
checked that the conceptual data model supports the required
transactions. However, if we are unable to perform a transaction
66. manually, there must be a problem with the data model, which
must
be resolved. In this case, it is likely that we have omitted an
entity, a
relationship, or an attribute from the data model.
We examine two possible approaches to ensuring that the
conceptual
data model supports the required transactions:
(1) describing the transactions;
(2) using transaction pathways.
Describing the transaction
Using the first approach, we check that all the information
(entities,
relationships, and their attributes) required by each transaction
is
provided by the model, by documenting a description of each
473
474
transaction’s requirements. We illustrate this approach for an
example DreamHome transaction listed in Appendix AAppendix
67. A from the
StaffClient user views:
Transaction (d): List the details of properties managed
byTransaction (d): List the details of properties managed by
a named member of staff at the brancha named member of staff
at the branch
The details of properties are held in the PropertyForRent entity
and
the details of staff who manage properties are held in the Staff
entity. In this case, we can use the Staff Manages
PropertyForRent
relationship to produce the required list.
Using transaction pathways
The second approach to validating the data model against the
required transactions involves diagrammatically representing
the
pathway taken by each transaction directly on the ER diagram.
An
example of this approach for the query transactions for the
StaffClient
user views listed in Appendix AAppendix A is shown in Figure
16.9Figure 16.9. Clearly, the
68. more transactions that exist, the more complex this diagram
would
become, so for readability we may need several such diagrams
to
cover all the transactions.
This approach allows the designer to visualize areas of the
model that
are not required by transactions and those areas that are critical
to
transactions. We are therefore in a position to directly review
the
support provided by the data model for the transactions
required. If
there are areas of the model that do not appear to be used by
any
transactions, we may question the purpose of representing this
information in the data model. On the other hand, if there are
areas of
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_051.xhtml#eid848
53
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_051.xhtml#eid848
53
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid376
07
69. the model that are inadequate in providing the correct pathway
for a
transaction, we may need to investigate the possibility that
critical
entities, relationships, or attributes have been missed.
It may look like a lot of hard work to check every transaction
that the
model has to support in this way, and it certainly can be. As a
result, it
may be tempting to omit this step. However, it is very important
that
these checks are performed now
rather than later, when it is much more difficult and expensive
to
resolve any errors in the data model.
Figure 16.9 Using pathways to check whether the
conceptual data model supports the user transactions.
STEP 1.9: Review conceptual data model with
user
Objective
To review the conceptual data model with the users to ensure
that
70. they consider the model to be a “true” representation of the data
requirements of the enterprise.
474
475
Before completing Step 1Step 1, we review the conceptual data
model with
the user. The conceptual data model includes the ER diagram
and the
supporting documentation that describes the data model. If any
anomalies are present in the data model, we must make the
appropriate changes, which may require repeating the previous
step(s). We repeat this process until the user is prepared to
“sign off”
the model as being a “true” representation of the part of the
enterprise that we are modeling.
The steps in this methodology are summarized in Appendix
DAppendix D. The
next chapter describes the steps of the logical database design
methodology.
71. Chapter Summary
• A design methodologydesign methodology is a structured
approach that uses
procedures, techniques, tools, and documentation aids to
support
and facilitate the process of design.
• Database design includes three main phases:
conceptualconceptual,
logicallogical, and physicalphysical database design.
• Conceptual database designConceptual database design is the
process of constructing a
model of the data used in an enterprise, independent of all
physical considerations.
• Conceptual database design begins with the creation of a
conceptual data modelconceptual data model of the enterprise,
which is entirely
independent of implementation details such as the target DBMS,
application programs, programming languages, hardware
platform, performance issues, or any other physical
475
72. 476
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid368
17
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_054.xhtml#eid855
49
considerations.
• LogicalLogical database design database design is the process
of constructing a model
of the data used in an enterprise based on a specific data model
(such as the relational model), but independent of a particular
DBMS and other physical considerations. Logical database
design
translates the conceptual data model into a logicallogical
datadata model model
of the enterprise.
• Physical database designPhysical database design is the
process of producing a
description of the implementation of the database on secondary
storage; it describes the base relations, file organizations, and
indexes used to achieve efficient access to the data, and any
associated integrity constraints and security measures.
73. • The physical database design phase allows the designer to
make
decisions on how the database is to be implemented. Therefore,
physical designphysical design is tailored to a specific DBMS.
There is feedback
between physical and conceptual/logical design, because
decisions
taken during physical design to improve performance may affect
the structure of the conceptual/logical data model.
• There are several critical factors for the success of the
database
design stage, including, for example, working interactively with
users and being willing to repeat steps.
• The main objective of Step 1Step 1 of the methodology is to
build a
conceptual data model of the data requirements of the
enterprise.
A conceptual data model comprises: entity types, relationship
types, attributes, attribute domains, primary keys, and alternate
keys.
• A conceptual data model is supported by documentation, such
as
74. ER diagrams and a data dictionary, which is produced
throughout
the development of the model.
epub://k27oy2ap24fbg1fg0erl.1.vbk/OPS/loc_026.xhtml#eid368
17
• The conceptual data model is validated to ensure it supports
the
required transactions. Two possible approaches to ensure that
the
conceptual data model supports the required transactions are:
(1)
checking that all the information (entities, relationships, and
their
attributes) required by each transaction is provided by the
model
by documenting a description of each transaction’s
requirements;
(2) diagrammatically representing the pathway taken by each
transaction directly on the ER diagram.
Review Questions
16.1 Describe the purpose of a design methodology.
75. 16.2 Describe the main phases involved in database design.
16.3 Identify important factors in the success of database
design.
16.4 Discuss the important role played by users in the process
of
database design.
16.5 Describe the main objective of conceptual database design.
16.6 Identify the main steps associated with conceptual database
design.
We have covered a good deal of information regarding
methodology. Why (when) would the rigor of a methodology be
useful? Select one step in the Logical Data Model from the
Connolly text that you feel would “always” be useful and
explain why?
A web search for relevant articles and information could be
employed to assist you in your response. Your response should
be a reply to the original message.
300 Words Minimum