Create database schema that supports the company business

Assignment Help Basic Computer Science
Reference no: EM132361314

This assignment consists of two (2) sections: a design document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.One of the main functions of any business is to transform data into information. The use of relational databases and data warehousing has gained recognition as a standard for organizations. A quality database design makes the flow of data seamless. The database schema is the foundation of the relational database. The schema defines the tables, fields, relationships, views, indexes, and other elements. The schema should be created by envisioning the business, processes, and workflow of the company. Since your company is an innovative Internet-based company, movement toward data warehousing seems to be one of the most viable options to give your company a competitive advantage; however, these concepts must be explained to the executive board in a manner to garner support. Section 1: Design DocumentWrite a six to ten (6-10) page design document in which you:

Support the need for the use of relational databases and data warehousing. From a management standpoint, it may be important to show the efficiencies that can be gained for executive oversight.

Create a database schema that supports the company's business and processes. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.

Identify and create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved. Normalize the database tables to third normal form (3NF).

Identify and create an Entity-Relationship (E-R) Diagram relating the tables of the database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain your rationale behind the design of the E-R Diagram.

Identify and create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain the rationale behind the design of your DFD.

Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram should map data between source systems, operational systems, data warehouses and specified data marts. Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project PlanUse Microsoft Project to:

Update the project plan (summary and detail) template, from Project Deliverable 2: Business Requirements, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

The specific course learning outcomes associated with this assignment are:

Describe the methods and best practices in implementing process change in IT organizations.

Describe the role and methods of technology-induced process improvement in organizations.

Use technology and information resources to research issues in information systems.

Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Reference no: EM132361314

Questions Cloud

Developing and delivering on IT value proposition : discussed the concepts of developing and delivering on the IT value proposition. Discuss Five principles for delivering value.
Provides integration of the management-sales-manufacturing : Enterprise Resource Planning (ERP) provides integration of the management, sales, manufacturing, accounting, and inventory areas.
What are basic reasons that people resist change : What are basic reasons that people resist change? How would one define business intelligence (BI)? Identify and briefly discuss real-world application of BI.
Describe needed integration with other system-infrastructure : Describe the scope and analyze how to control the scope. Describe the needed integration with other systems and infrastructure.
Create database schema that supports the company business : Create a database schema that supports the company's business and processes. Explain and support the database schema with relevant arguments
Creating marketing campaign project schedule : Creating a marketing campaign project schedule that defines the tasks, duration, dependencies, and resources for the Insty Chat App.
Meltdown and spectre vulnerabilities : Meltdown and Spectre Vulnerabilities. One of the biggest concerns when a vulnerability is discovered is how to inform the public.
How to learn and implement web security in real life : How to learn and implement web security in real life?
Cyber-attacks could affect our business : Cyber-attacks could affect our business. Disruptions in our computer systems could adversely impact our business.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Scope and the work breakdown structure

Projects operate in an environment broader than the project itself. Project managers need to take a systems approach when working on projects.

  Alternating characters in the two strings

Write function, named foldStrings(string1, string2) that takes, as arguments, two strings. If the two strings are equal in length, the function returns a string

  Assess financial statements-decision-making process

Audit committees play an important role to assess financial statements and to support decision-making process. Governments and different people like shareholder are interested to enhance the credibility of the financial reports.

  Roduce an error message for any input value less than 1582

roduce an error message for any input value less than 1582

  Determining the annual interest rate

Also assume you put no other money in that account. If the annual interest rate is R = 0.04 (4%), then at the end of the year you would have

  The sum of the angles of a triangle is always 180

The sum of the angles of a triangle is always 180. Get two angles from the user and display what the final angle must be in order to complete the triangle. Run the program to see the exact format of the output.

  Html5 can validate weather an email address true or false

HTML5 can validate weather an email address entered by the user actually exists. True or False

  Describe the seven business models of software

Define and discuss Software as a service (SaaS), Infrastructure as a service (IaaS), and storage as a service.

  Interests of managerial agents

Corporate governance is a relationship among shareholders and is used to determine a firm's direction and control its performance.

  What value would you use for the standard

What value would you use for the standard?

  What is outsourcing and what are the risks of outsourcing

What is outsourcing? What are the risks of outsourcing? Why do companies outsource. The economic argument for outsourcing.

  What is unified threat management

What is Unified Threat Management (UTM) and the services it combines into one device. Does UTM holds true to the principle of defense-in-depth

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd