Create and document a Context Diagram for the System

Assignment Help Computer Network Security
Reference no: EM132394547

MIS605 Systems Analysis and Design Assignment - Laureate International Universities, Australia

Complete the following tasks:

Task 1 - Create and document a Context Diagram for the System.

Task 2 - Create and document a Level 0 Data Flow Diagram (DFD). The Level 0 DFD should contain all the major high-level processes of the System and how these processes are interrelated.

Task 3 - Select three major and non-trivial processes from Level 0 DFD, decompose each of the processes into a more explicit Level 1 DFD.

Task 4 - Using your own experience with similar online student enrolment systems and the information provided in the case study:

(i) Identify all the entities and their relationships in the System

(ii) Create and document an Entity Relationship Diagram (ERD) for the System.

Note: the case study has not and does not intend to provide a comprehensive description of entities in the System. You are expected to use your own experience with information systems in general and online student enrolment systems in particular to develop this ERD. For example, would Subject Name be an attribute for a Subject? Would Date of Birth be an attribute for Students?

Task 5 - Should data be stored in files in a file system or in a database for the System? Justify your answer.

Task 6 - Translate the ERD you developed in Task 4 into a physical relational database design. Document database tables and their relationship in MSWord file. Normalise your database design to the Third Normal Form (3NF).

4. Please note that your responses to the tasks above must relate to the case study provided.

Word Count and Layout

  • The total word count for the written assessment should be no more than 2500 words.
  • Please provide all your answers in a MS word document.
  • All diagrams must be drawn using Lucidchart and copied into the MSWord document.
  • Please note that you are NOT required to copy the task description over to the MS Word document. Use the task number to indicate which task your response relates to.
  • The recommended font size is 12 with 1.5 spacing.

Referencing - It is essential that you use appropriate APA style for citing and referencing research.

Reference no: EM132394547

Questions Cloud

What should i recommend the company to do : Is it ethical to sell the toy? If I am a consult, what should I recommend the company to do?
Why is increased coordination needed to manage supply chains : Why is increased coordination needed to manage supply chains?
How should i recommend the company do : Therefore, is that ethical to fire that 10-year-old boy. And, how should I recommend the company do?
CMGT556 Enterprise Models Assignment Problem : CMGT556 Enterprise Models assignment help and solutions, University of Phoenix, assessment help - Create a chart that compares each MSS's potential.
Create and document a Context Diagram for the System : MIS605 Systems Analysis and Design Assignment Help and Solution - Laureate International Universities, Australia. Create a Context Diagram for the System
Describe the various categories of new products : Respond to the following questions that support this week's readings. Describe the various categories of new products. Describe the strengths and weaknesses.
BUSI 438 Marketing Brand Management Question : BUSI 438 Marketing Brand Management assignment help and assessment help, Liberty University - What image do customers have of your brand?
Discuss the operations strategy of chosen organisation : Discuss the operations strategy of the chosen organisation. Does the chosen organisation have a clear operations strategy? How does the operations strategy
Difference between agile and waterfall projects : What is the difference between agile and waterfall projects? What are the advantages of the agile approach?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  What are common protection measures that you can do

What common critical or potentially dangerous areas can you find? What are common protection measures that you can do?

  What information items are included in this ticket

When the Server receives the authenticator and the ticket from the client. The server will compare the information items contained in the authenticator and the ticket to authenticate the client user's identity. Please give a detailed answer on how..

  What is the single most important asset of security program

What are the benefits if personnel in security management develop skills as educators for their organization's security? Analyze and explain your point of view. Why are security programs relevant? What is the single most important asset of a securi..

  What are some of the major strategies and risks

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  What are some of the tests performed to ensure the fault

How would you determine the level of fault tolerance needed for a particular business operational function?

  Create an enterprise key management system

Identify Components of Key Management - Advanced Cryptography Functions and Identify Key Management Gaps, Risks, Solutions, and Challenges

  Difference between the terms safety and security

What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?

  What is your approach to protecting your privacy

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Discussion of any three variants of botnet

Melbourne Institute of Technology, Australia - MN502 Overview of Network Security Assignment - Potential threats and mitigation tools for Botnet

  Prepare a paper on new approaches in cryptography

Prepare a paper on new approaches in cryptography - Cryptography of the Modern Era - This a 6-pages research paper, cite your sources and use apa citation

  Why should people care about password security

Why should people care about password security -  Can computer hacking be justified under extraordinary circumstances.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd