SlideShare a Scribd company logo
1 of 6
DATA BASE
IntroductionLO1 Understand databases and data management systems1.1 Analyze the key
issues and application of databases within organizational environments…1.2 Critically
evaluate the features and advantages of database management systems………LO2
Understand database design techniques2.1 Analyze a database developmental
methodology………………………………………..2.2 Discuss entity-relationship modelling and
normalization……………………………….LO3 be able to design, create and document databases3.1
Apply the database developmental cycle to a given data set……………………………3.2 Design a
fully functional database (containing at least four inter-relational tables) including user
interface………………………………………………………………………3.3 Evaluate the effectiveness of the
database solution and suggest methods of
improvement………………………………………………………………………………….3.4 Provide supporting user
and technical
documentation………………………………..….Conclusion…………………………………………………………………………
…………References……………………………………………………………………………………P1.1 Analyse the key
issues such as Integrity, Security, Recovery, Concurrency & Atomicity etc. and application of
databases within organizational environments such as Banking, Retail, HR, Education etc.In
recent years, database systems have aIDed support for a number of non-traditional data
types such as text documents, images, and maps and other spatial data. The goal is to make
databases universal servers, which can store all types of data. Rather than aID support for
all such data types into the core database, vendors offer aID-on packages that integrate with
the database to provide such functionality.The typical file-oriented system is supported by a
conventional operating system. Permanent records are stored in various files and a number
of different application programs are written to extract records from and aID records to the
appropriate files.1.1.1 Key issues of Database:1.1.1.1 Centralized control of data – Data
should be store in a central database server. Any components of database such as table,
forms, reports, query access are based on the user privilege granted from the
server.1.1.1.2 Data Redundancy means the appearance of the same data factor in more
thanone field or table of data, or including a data factor as a separate entity when it can be
easily inferred from information in existing data fields. This repetition of the data can cause
some distortions and anomalies in the results. The term is also used to refer to the backing
up or copying data on aIDitional servers or by other electronic means as a security
measure.1.1.1.3 Integrity implies the accuracy and consistency of stored data, indicated
by anAbsence of any alteration in data between two updates of a data record. Data integrity
is imposed within a database at its design stage through the use of standard rules and
procedures, and is maintained through the use of error checking and validation
routines.CourseCourse ID Course name Course
levelC001 HNCCSD L4C002 HNDCSD L5C003 BSc Computing L61.1.1.4 Security
refers to the collective measures used to protect and secure a database ordatabase
management software from illegitimate use and malicious threats and attacks. It is a broad
term that includes a multitude of processes, tools and methodologies that ensure security
within a database environment.1.1.1.5 Backup Duplicate (redundant) copy of data saved
during a backup session, andAvailable as replacement of damaged or lost primary
data.1.1.1.6 Recovery means restoration in full or in part of the data stored in deleted
orDamaged data files. In case of file deletion, if the space originally occupied by the deleted
file is not overwritten (or the disk is not reformatted after deletion) the file may be
recoverable through common ‘ undelete’ programs. In case of damaged files (or files
stored on damaged media), custom-written software and sophisticated equipment is
required for any extent of recovery.1.1.1.7 Atomicity is a feature of databases systems
dictating where a transaction must be all-Or-nothing. That is, the transaction must either
fully happen, or not happen at all. It must not complete partially.1.1.1.8 Consistency, in the
context of databases, states that data cannot be written that wouldViolate the database’ s
own rules for valid data. If a certain transaction occurs that attempts to introduce
inconsistent data, the entire transaction is rolled back and an error returned to the
user.1.1.1.9 Isolation, in the context of databases, specifies when and how the
changesImplemented in an operation become visible to other parallel operations.
Transaction isolation is an important part of any transactional system. It deals with
consistency and completeness of data retrieved by queries un-affecting a user data by other
user actions. A database acquires locks on data to maintain a high level of isolation.1.1.1.10
Durability in databases is the property that ensures transactions are saved permanently and
do not accidentally disappear or get erased, even during a database crash. This is usually
achieved by saving all transactions to a non-volatile storage medium.1.1.1.11 Data
Independence is the idea that generated and stored data should be kept separate from
applications that use the data for computing and presentation. In many systems, data
independence is an innate function related to the multiple components of the system;
however, it is possible to keep data contained within a use application.1.1.2 Application of
databases within organizational environmentsDatabase systems are widely used in
different areas because of their numerous advantages. Some of the most common database
applications are listed here.• Airlines and railways: Airlines and railways use online
databases for reservation, and for displaying the schedule information.• Banking: Banks
use databases for customer inquiry, accounts, loans, and other transactions.• Education:
Schools and colleges use databases for course registration, result, and other
information.• Telecommunications: Telecommunication departments use databases to
store information about the communication network, telephone numbers, record of calls,
for generating monthly bills, etc.• Credit card transactions: Databases are used for
keeping track of purchases on credit cards in order to generate monthly statements.• E-
commerce: Integration of heterogeneous information sources (for example, catalogues) for
business activity such as online shopping, booking of holiday package, consulting a doctor,
etc.• Health care information systems and electronic patient record: Databases are used
for maintaining the patient health care details.• Digital libraries and digital publishing:
Databases are used for management and delivery of large bodies of textual and multimedia
data.• Finance: Databases are used for storing information such as sales, purchases of
stocks and bonds or data useful for online trading.• Sales: Databases are used to store
product, customer and transaction details.Education Advantages• Strengthen distance
learning programs with apps that make data, class information and feedback accessible in
real-time.• Improve field research results by giving professors and student’ s access to
online data management solutions.• Reallocate funds typically spent on expensive IT
operations and software maintenance.• Tracking test scores with fewer mistakes and
share student progress.• Encouraging parent participation by communicating and
gathering feedback.• Sharing knowledge, tips, and documents between faculty
members.• Making it easy to access emergency contact information.• Reporting
absences and streamlining other administrative tasks.Banking• the highest level of
security• back up- every hour, after every transactions or the whole backup after
midnightThe efficiency of an automated payments process is reliant on the input of accurate
data. Data validation is the only way to ensure that the information captured is
accurate.Data communications costs are usually less with distributed databases because
processing can be done locally. For example, with customer records housed locally, a branch
does not incur telecommunications costs to communicate with a headquarters computer
that houses the branch’ s data.If there is a hardware and software problem at a computer
center that stores and processes all branch information, all the branches may be affected.
With distributed databases, many branches can continue computer processing without
waiting for the central location to become operable again.1.2 Critically evaluate the features
and advantages of database management systemsA database is a software program, used to
store, delete, update and retrieve data. A database can be limited to a single desktop
computer or can be stored in large server machines, like the IBM Mainframe.1.2.1 Features
of Database1.2.1.1 Primary Key – The unique data field in a table is assigned a primary key.
The primary key helps in the identification of data. It also checks for duplicates within the
same table, thereby reducing data redundancy. There are tables which have a secondary key
in aIDition to the primary key.1.2.1.2 Foreign Key – The secondary key is also called
‘ foreign key’ . The secondary key refers to the primary key of another table, thus
establishing a relationship between the two tables.1.2.1.3 Remote Control Refers to a
program’ s or device’ s ability to control a computer system from a remote location.
Remote-control programs for PCs enable you to access data stored on your home system
even when you are travelling.1.2.1.4 Control provides access to data stored in databases
using any one of three types of Record set objects. The Data control enables you to move
from record to record and to display and manipulate data from the records in bound
controls.1.2.1.5 Table Refers to data arranged in rows and columns. A spreadsheet, for
example, is a table. In relational database management systems, all information is stored in
the form of tables.1.2.1.6 Forms A formatted document containing blank fields that users
can fill in with data. With paper forms, it is usually necessary for someone to transfer the
data from the paper to a computer database, where the results can then be statistically
analysed.1.2.1.7 Query A request for information from a database. There are three general
methods for posing queries:• Choosing parameters from a menu: In this method, the
database system presents a list of parameters from which you can choose. This is perhaps
the easiest way to pose a query because the menus guide you, but it is also the least
flexible.• Query by example (QBE): In this method, the system presents a blank record
and lets you specify the fields and values that define the query.• Query language: Many
database systems require you to make requests for information in the form of a stylized
query that must be written in a special query language. This is the most complex method
because it forces you to learn a specialized language, but it is also the most powerful.1.2.1.8
Reports represent a formatted and organized presentation of data. Most database
management systems include a report writer that enables you to design and generate
reports.1.2.1.9 Triggers – In a DBMS, a trigger is a SQL procedure that initiates an action
(i.e., fires an action) when an event (INSERT, DELETE or UPDATE) occurs.1.2.2 Advantages
of database management systems1.2.2.1 Sharing of data In DBMS, data can be shared by
authorized users of the organization. The DBA manages the data and gives rights to users to
access the data. Many users can be authorized to access the same set of information
simultaneously. The remote users can also share same data. Similarly, the data of same
database can be shared between different application programs.1.2.2.2 Reduction of
Redundancy/duplication In DBMS, the data redundancy can be controlled or reduced but is
not removed completely. Sometimes, it is necessary to create duplicate copies of the same
data items in order to relate tables with each other. By controlling the data redundancy, you
can save storage space. Similarly, it is useful for retrieving data from database using
queries.1.2.2.3 Referential integrity Referential integrity is a relational database concept,
which states that table relationships must always be consistent. In other words, any foreign
key field must agree with the primary key that is referenced by the foreign key. Thus, any
primary key field changes must be applied to all foreign keys, or not at all. The same
restriction also applies to foreign keys in that any updates (but not necessarily deletions)
must be propagated to the primary parent key.P2.1- Analyse a database developmental
methodology such as SSADM and its phases feasibility study, requirement analysis,
requirement specification, physical design etc.2.1.1 SSADM – Structured Systems Analysis
and Design Methods• Feasibility Study – the business area is analyzed to determine
whether a system can cost effectively support the business requirements.• Requirements
Analysis – the requirements of the system to be developed are identified and the current
business environment is modeled in terms of the processes carried out and the data
structures involved.• Requirements Specification – detailed functional and non-functional
requirements are identified and new techniques are introduced to define the required
processing and data structures.• Logical System Specification – technical systems options
are produced as well as the logical design of update and enquiry processing and system
dialogues.• Physical Design -a physical database design and a set of program
specifications are created using the logical system specification and technical system
specification.P2.2 – Discuss entity-relationship modelling such as one-to-one, one-to-many
and many-to-many relationship and normalization with 1st, 2nd and 3rd normalization to
design database solution for Computer Choice.2.2.1 Entity-relationship modelling2.2.1.1
EntityAn entity-relationship model is a systematic way of describing and defining a business
process. The process is modelled as components (entities) that are linked with each other
by relationships that express the dependencies and requirements between them, such as:
one building may be divided into zero or more apartments, but one apartment can only be
located in one building. Entities may have various properties (attributes) that characterize
them. Diagrams created to represent these entities, attributes, and relationships graphically
are called entity– relationship diagrams.2.2.1.2 Attributes- These are the ‘ characteristics’
shared by all entities of a given entity type. There are data elements associated with an
entity.2.2.2.3 RelationshipEntity Relationship: Relationships allow you to describe the
connections between different database tables in powerful ways. Once you’ ve described
the relationships between your tables, you can later leverage that information to perform
powerful cross-table queries, known as joins.There are three different types of database
relationships, each named according to the number of table rows that may be involved in
the relationship. Each of these three relationship types exists between two tables.• One-
to-one relationships occur when each entry in the first table has one, and only one,
counterpart in the second table. One-to-one relationships are rarely used because it is often
more efficient to simply put all of the information in a single table.• One-to-many
relationships are the most common type of database relationship. They occur when each
record in the first table corresponds to one or more records in the second table but each
record in the second table corresponds to only one record in the first table. For example, the
relationship between a Teachers table and a Students table in an elementary school
database would likely be a one-to-many relationship, because each student has only one
teacher, but each teacher may have multiple students.• Many-to-many relationships occur
when each record in the first table corresponds to one or more records in the second table
and each record in the second table corresponds to one or more records in the first table.
For example, the relationship between a Teachers and a Courses table would likely be
many-to-many because each teacher may instruct more than one course and each course
may have more than one instructor.2.2.2 Normalisation is primarily a tool used to validate
and improve a logical design so that it satisfies certain constraints that avoid unnecessary
duplication of data.Database normalization has the rules to be followed while creating
databases. Each rule is called as normal form.?First Normal form states – Remove duplicate
column and identify each set of related data with a primary key.?Second normal form –
Create relationship between master and master detail tables using foreign key.?Third
normal form – Remove the fields that do not depend on the primary key.P 3.1 – Apply the
database developmental cycle i.e. learners need to show the workings of different phases of
database development methodology to develop database solution for the Computer Choice
given data set.SSADM using to develop our DB solutionI. Feasibility Studya. Economic
feasibility – • Budget – no academic course work,• Time – 15 weeksb. Technical
feasibility• Hardware – RAM-1/2GB, Processor – Celeron/Pentium Dual Core, AMD, HID
– 40GB,• Software – Windows-7/8, MS Access/Open Office Base, Smart Draw, MS
Excel/Open Office Calc, MS Word/ O F Writer.• Operational feasibility – Sales, Orders,
Inventory.II. Requirements AnalysisMr. Craig is a recently graduate from university and is
planning to start up a computer hardware store to sell computers and computer
accessories. For Computer Choice it is important to sell the products at the right price and
to keep the details of the customers. Also the company plans to recruit 6-9 members of staff
and for every sale they will earn commission and this should also be included in the
database. Manufacturer and supplier details are also important so Mr. Craig wants to
include them in the database as well.ORDER TODAY YOUR PAPER WITH SIMILAR
INSTRUCTIONS AND WE WILL WRITE YOUR PAPER FROM SCRATCH

More Related Content

Similar to DATA BASE.docx

Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptLisaMalar
 
A database management system
A database management systemA database management system
A database management systemghulam120
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptxmulukendemis44
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notesTanya Makkar
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management SystemsRaj vardhan
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentationanuj_rakheja
 
Types Of Database For Flat File Database
Types Of Database For Flat File DatabaseTypes Of Database For Flat File Database
Types Of Database For Flat File DatabaseChristina Valadez
 
1. Chapter One.pdf
1. Chapter One.pdf1. Chapter One.pdf
1. Chapter One.pdffikadumola
 
Transaction Management
Transaction ManagementTransaction Management
Transaction ManagementA. S. M. Shafi
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge ManagementMeenakshi Paul
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMSAhmed478619
 
DBMS-1.pptx
DBMS-1.pptxDBMS-1.pptx
DBMS-1.pptxkingVox
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersMustafa Kamel Mohammadi
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemMarisela Stone
 

Similar to DATA BASE.docx (20)

Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.ppt
 
Database, Lecture-1.ppt
Database, Lecture-1.pptDatabase, Lecture-1.ppt
Database, Lecture-1.ppt
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
A database management system
A database management systemA database management system
A database management system
 
8.DBMS.pptx
8.DBMS.pptx8.DBMS.pptx
8.DBMS.pptx
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptx
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management Systems
 
Ems
EmsEms
Ems
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
 
Types Of Database For Flat File Database
Types Of Database For Flat File DatabaseTypes Of Database For Flat File Database
Types Of Database For Flat File Database
 
1. Chapter One.pdf
1. Chapter One.pdf1. Chapter One.pdf
1. Chapter One.pdf
 
Transaction Management
Transaction ManagementTransaction Management
Transaction Management
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMS
 
DBMS-1.pptx
DBMS-1.pptxDBMS-1.pptx
DBMS-1.pptx
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 

More from write31

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxwrite31
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxwrite31
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docxwrite31
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxwrite31
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxwrite31
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docxwrite31
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwrite31
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxwrite31
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxwrite31
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwrite31
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxwrite31
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxwrite31
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxwrite31
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxwrite31
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxwrite31
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxwrite31
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxwrite31
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxwrite31
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxwrite31
 

More from write31 (20)

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docx
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docx
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docx
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docx
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docx
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docx
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docx
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docx
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docx
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docx
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docx
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docx
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docx
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docx
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docx
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docx
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docx
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docx
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 

DATA BASE.docx

  • 1. DATA BASE IntroductionLO1 Understand databases and data management systems1.1 Analyze the key issues and application of databases within organizational environments…1.2 Critically evaluate the features and advantages of database management systems………LO2 Understand database design techniques2.1 Analyze a database developmental methodology………………………………………..2.2 Discuss entity-relationship modelling and normalization……………………………….LO3 be able to design, create and document databases3.1 Apply the database developmental cycle to a given data set……………………………3.2 Design a fully functional database (containing at least four inter-relational tables) including user interface………………………………………………………………………3.3 Evaluate the effectiveness of the database solution and suggest methods of improvement………………………………………………………………………………….3.4 Provide supporting user and technical documentation………………………………..….Conclusion………………………………………………………………………… …………References……………………………………………………………………………………P1.1 Analyse the key issues such as Integrity, Security, Recovery, Concurrency & Atomicity etc. and application of databases within organizational environments such as Banking, Retail, HR, Education etc.In recent years, database systems have aIDed support for a number of non-traditional data types such as text documents, images, and maps and other spatial data. The goal is to make databases universal servers, which can store all types of data. Rather than aID support for all such data types into the core database, vendors offer aID-on packages that integrate with the database to provide such functionality.The typical file-oriented system is supported by a conventional operating system. Permanent records are stored in various files and a number of different application programs are written to extract records from and aID records to the appropriate files.1.1.1 Key issues of Database:1.1.1.1 Centralized control of data – Data should be store in a central database server. Any components of database such as table, forms, reports, query access are based on the user privilege granted from the server.1.1.1.2 Data Redundancy means the appearance of the same data factor in more thanone field or table of data, or including a data factor as a separate entity when it can be easily inferred from information in existing data fields. This repetition of the data can cause some distortions and anomalies in the results. The term is also used to refer to the backing up or copying data on aIDitional servers or by other electronic means as a security measure.1.1.1.3 Integrity implies the accuracy and consistency of stored data, indicated by anAbsence of any alteration in data between two updates of a data record. Data integrity
  • 2. is imposed within a database at its design stage through the use of standard rules and procedures, and is maintained through the use of error checking and validation routines.CourseCourse ID Course name Course levelC001 HNCCSD L4C002 HNDCSD L5C003 BSc Computing L61.1.1.4 Security refers to the collective measures used to protect and secure a database ordatabase management software from illegitimate use and malicious threats and attacks. It is a broad term that includes a multitude of processes, tools and methodologies that ensure security within a database environment.1.1.1.5 Backup Duplicate (redundant) copy of data saved during a backup session, andAvailable as replacement of damaged or lost primary data.1.1.1.6 Recovery means restoration in full or in part of the data stored in deleted orDamaged data files. In case of file deletion, if the space originally occupied by the deleted file is not overwritten (or the disk is not reformatted after deletion) the file may be recoverable through common ‘ undelete’ programs. In case of damaged files (or files stored on damaged media), custom-written software and sophisticated equipment is required for any extent of recovery.1.1.1.7 Atomicity is a feature of databases systems dictating where a transaction must be all-Or-nothing. That is, the transaction must either fully happen, or not happen at all. It must not complete partially.1.1.1.8 Consistency, in the context of databases, states that data cannot be written that wouldViolate the database’ s own rules for valid data. If a certain transaction occurs that attempts to introduce inconsistent data, the entire transaction is rolled back and an error returned to the user.1.1.1.9 Isolation, in the context of databases, specifies when and how the changesImplemented in an operation become visible to other parallel operations. Transaction isolation is an important part of any transactional system. It deals with consistency and completeness of data retrieved by queries un-affecting a user data by other user actions. A database acquires locks on data to maintain a high level of isolation.1.1.1.10 Durability in databases is the property that ensures transactions are saved permanently and do not accidentally disappear or get erased, even during a database crash. This is usually achieved by saving all transactions to a non-volatile storage medium.1.1.1.11 Data Independence is the idea that generated and stored data should be kept separate from applications that use the data for computing and presentation. In many systems, data independence is an innate function related to the multiple components of the system; however, it is possible to keep data contained within a use application.1.1.2 Application of databases within organizational environmentsDatabase systems are widely used in different areas because of their numerous advantages. Some of the most common database applications are listed here.• Airlines and railways: Airlines and railways use online databases for reservation, and for displaying the schedule information.• Banking: Banks use databases for customer inquiry, accounts, loans, and other transactions.• Education: Schools and colleges use databases for course registration, result, and other information.• Telecommunications: Telecommunication departments use databases to store information about the communication network, telephone numbers, record of calls, for generating monthly bills, etc.• Credit card transactions: Databases are used for keeping track of purchases on credit cards in order to generate monthly statements.• E- commerce: Integration of heterogeneous information sources (for example, catalogues) for
  • 3. business activity such as online shopping, booking of holiday package, consulting a doctor, etc.• Health care information systems and electronic patient record: Databases are used for maintaining the patient health care details.• Digital libraries and digital publishing: Databases are used for management and delivery of large bodies of textual and multimedia data.• Finance: Databases are used for storing information such as sales, purchases of stocks and bonds or data useful for online trading.• Sales: Databases are used to store product, customer and transaction details.Education Advantages• Strengthen distance learning programs with apps that make data, class information and feedback accessible in real-time.• Improve field research results by giving professors and student’ s access to online data management solutions.• Reallocate funds typically spent on expensive IT operations and software maintenance.• Tracking test scores with fewer mistakes and share student progress.• Encouraging parent participation by communicating and gathering feedback.• Sharing knowledge, tips, and documents between faculty members.• Making it easy to access emergency contact information.• Reporting absences and streamlining other administrative tasks.Banking• the highest level of security• back up- every hour, after every transactions or the whole backup after midnightThe efficiency of an automated payments process is reliant on the input of accurate data. Data validation is the only way to ensure that the information captured is accurate.Data communications costs are usually less with distributed databases because processing can be done locally. For example, with customer records housed locally, a branch does not incur telecommunications costs to communicate with a headquarters computer that houses the branch’ s data.If there is a hardware and software problem at a computer center that stores and processes all branch information, all the branches may be affected. With distributed databases, many branches can continue computer processing without waiting for the central location to become operable again.1.2 Critically evaluate the features and advantages of database management systemsA database is a software program, used to store, delete, update and retrieve data. A database can be limited to a single desktop computer or can be stored in large server machines, like the IBM Mainframe.1.2.1 Features of Database1.2.1.1 Primary Key – The unique data field in a table is assigned a primary key. The primary key helps in the identification of data. It also checks for duplicates within the same table, thereby reducing data redundancy. There are tables which have a secondary key in aIDition to the primary key.1.2.1.2 Foreign Key – The secondary key is also called ‘ foreign key’ . The secondary key refers to the primary key of another table, thus establishing a relationship between the two tables.1.2.1.3 Remote Control Refers to a program’ s or device’ s ability to control a computer system from a remote location. Remote-control programs for PCs enable you to access data stored on your home system even when you are travelling.1.2.1.4 Control provides access to data stored in databases using any one of three types of Record set objects. The Data control enables you to move from record to record and to display and manipulate data from the records in bound controls.1.2.1.5 Table Refers to data arranged in rows and columns. A spreadsheet, for example, is a table. In relational database management systems, all information is stored in the form of tables.1.2.1.6 Forms A formatted document containing blank fields that users can fill in with data. With paper forms, it is usually necessary for someone to transfer the
  • 4. data from the paper to a computer database, where the results can then be statistically analysed.1.2.1.7 Query A request for information from a database. There are three general methods for posing queries:• Choosing parameters from a menu: In this method, the database system presents a list of parameters from which you can choose. This is perhaps the easiest way to pose a query because the menus guide you, but it is also the least flexible.• Query by example (QBE): In this method, the system presents a blank record and lets you specify the fields and values that define the query.• Query language: Many database systems require you to make requests for information in the form of a stylized query that must be written in a special query language. This is the most complex method because it forces you to learn a specialized language, but it is also the most powerful.1.2.1.8 Reports represent a formatted and organized presentation of data. Most database management systems include a report writer that enables you to design and generate reports.1.2.1.9 Triggers – In a DBMS, a trigger is a SQL procedure that initiates an action (i.e., fires an action) when an event (INSERT, DELETE or UPDATE) occurs.1.2.2 Advantages of database management systems1.2.2.1 Sharing of data In DBMS, data can be shared by authorized users of the organization. The DBA manages the data and gives rights to users to access the data. Many users can be authorized to access the same set of information simultaneously. The remote users can also share same data. Similarly, the data of same database can be shared between different application programs.1.2.2.2 Reduction of Redundancy/duplication In DBMS, the data redundancy can be controlled or reduced but is not removed completely. Sometimes, it is necessary to create duplicate copies of the same data items in order to relate tables with each other. By controlling the data redundancy, you can save storage space. Similarly, it is useful for retrieving data from database using queries.1.2.2.3 Referential integrity Referential integrity is a relational database concept, which states that table relationships must always be consistent. In other words, any foreign key field must agree with the primary key that is referenced by the foreign key. Thus, any primary key field changes must be applied to all foreign keys, or not at all. The same restriction also applies to foreign keys in that any updates (but not necessarily deletions) must be propagated to the primary parent key.P2.1- Analyse a database developmental methodology such as SSADM and its phases feasibility study, requirement analysis, requirement specification, physical design etc.2.1.1 SSADM – Structured Systems Analysis and Design Methods• Feasibility Study – the business area is analyzed to determine whether a system can cost effectively support the business requirements.• Requirements Analysis – the requirements of the system to be developed are identified and the current business environment is modeled in terms of the processes carried out and the data structures involved.• Requirements Specification – detailed functional and non-functional requirements are identified and new techniques are introduced to define the required processing and data structures.• Logical System Specification – technical systems options are produced as well as the logical design of update and enquiry processing and system dialogues.• Physical Design -a physical database design and a set of program specifications are created using the logical system specification and technical system specification.P2.2 – Discuss entity-relationship modelling such as one-to-one, one-to-many and many-to-many relationship and normalization with 1st, 2nd and 3rd normalization to
  • 5. design database solution for Computer Choice.2.2.1 Entity-relationship modelling2.2.1.1 EntityAn entity-relationship model is a systematic way of describing and defining a business process. The process is modelled as components (entities) that are linked with each other by relationships that express the dependencies and requirements between them, such as: one building may be divided into zero or more apartments, but one apartment can only be located in one building. Entities may have various properties (attributes) that characterize them. Diagrams created to represent these entities, attributes, and relationships graphically are called entity– relationship diagrams.2.2.1.2 Attributes- These are the ‘ characteristics’ shared by all entities of a given entity type. There are data elements associated with an entity.2.2.2.3 RelationshipEntity Relationship: Relationships allow you to describe the connections between different database tables in powerful ways. Once you’ ve described the relationships between your tables, you can later leverage that information to perform powerful cross-table queries, known as joins.There are three different types of database relationships, each named according to the number of table rows that may be involved in the relationship. Each of these three relationship types exists between two tables.• One- to-one relationships occur when each entry in the first table has one, and only one, counterpart in the second table. One-to-one relationships are rarely used because it is often more efficient to simply put all of the information in a single table.• One-to-many relationships are the most common type of database relationship. They occur when each record in the first table corresponds to one or more records in the second table but each record in the second table corresponds to only one record in the first table. For example, the relationship between a Teachers table and a Students table in an elementary school database would likely be a one-to-many relationship, because each student has only one teacher, but each teacher may have multiple students.• Many-to-many relationships occur when each record in the first table corresponds to one or more records in the second table and each record in the second table corresponds to one or more records in the first table. For example, the relationship between a Teachers and a Courses table would likely be many-to-many because each teacher may instruct more than one course and each course may have more than one instructor.2.2.2 Normalisation is primarily a tool used to validate and improve a logical design so that it satisfies certain constraints that avoid unnecessary duplication of data.Database normalization has the rules to be followed while creating databases. Each rule is called as normal form.?First Normal form states – Remove duplicate column and identify each set of related data with a primary key.?Second normal form – Create relationship between master and master detail tables using foreign key.?Third normal form – Remove the fields that do not depend on the primary key.P 3.1 – Apply the database developmental cycle i.e. learners need to show the workings of different phases of database development methodology to develop database solution for the Computer Choice given data set.SSADM using to develop our DB solutionI. Feasibility Studya. Economic feasibility – • Budget – no academic course work,• Time – 15 weeksb. Technical feasibility• Hardware – RAM-1/2GB, Processor – Celeron/Pentium Dual Core, AMD, HID – 40GB,• Software – Windows-7/8, MS Access/Open Office Base, Smart Draw, MS Excel/Open Office Calc, MS Word/ O F Writer.• Operational feasibility – Sales, Orders, Inventory.II. Requirements AnalysisMr. Craig is a recently graduate from university and is
  • 6. planning to start up a computer hardware store to sell computers and computer accessories. For Computer Choice it is important to sell the products at the right price and to keep the details of the customers. Also the company plans to recruit 6-9 members of staff and for every sale they will earn commission and this should also be included in the database. Manufacturer and supplier details are also important so Mr. Craig wants to include them in the database as well.ORDER TODAY YOUR PAPER WITH SIMILAR INSTRUCTIONS AND WE WILL WRITE YOUR PAPER FROM SCRATCH