Cybertoys-what do you think of marcia design and why

Assignment Help Basic Computer Science
Reference no: EM132380027

Case in Point 9.2: CyberToys

You handle administrative support for CyberToys, a small chain that sells computer hard- ware and software and specializes in personal service. The company has four stores located at malls and is planning more. Each store has a manager, a technician, and between one and four sales reps.

Bruce and Marcia Berns, the owners, want to create a personnel records database, and they asked you to review a table that Marcia designed. She suggested fields for store number, location, store telephone, manager name, and manager home telephone. She also wants fields for technician name and technician home telephone and fields for up to four sales rep names and sales rep home telephones.

Draw Marcia's suggested design and analyze it using the normalization concepts you learned in the chapter. What do you think of Marcia's design and why?

Attachment:- System Analysis and Design.rar

Reference no: EM132380027

Questions Cloud

Change Management Process for IT security : Explain in your own words what some of the challenges are with the Change Management Process for IT security.
Footprinting or digital reconnaissance : Explain in your own words what FOOTPRINTING (or digital reconnaissance) is, you now have an idea as to how to conduct a digital investigative project.
Why it is important intelligence gathering process : what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.
What are three examples of information system hardware : What are the five components that make up an information system? What are three examples of information system hardware?
Cybertoys-what do you think of marcia design and why : Draw Marcia's suggested design and analyze it using the normalization concepts you learned in the chapter. What do you think of Marcia's design and why?
Unique relationship with the disaster recovery plan : The business impact analysis (BIA) has a unique relationship with the disaster recovery plan. Describe what this relationship means to you.
Discuss the evolution of internet security : Discuss the evolution of internet security.
Steps for facilitating effective collaboration : Discuss at least three 3 steps for facilitating effective collaboration. Please write 350 words and add the reference.
Looking at host-based IDS after NIDS : Looking at host-based IDS after NIDS gives us the basis to begin to make some comparisons between the two.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Special snow tires on a shipment of trucks

The Contracting Officer on the current contract for truckstells the contractor to install special snow tires on a shipment of trucks.

  Communication piece through the use of visuals

Over the past few weeks, you've worked to put together a communication piece through the use of visuals.

  Suggest a new scheduling algorithm

Suggest a new scheduling algorithm. Show its advantages and disadvantages.

  What is the marginal benefit of the 2nd car wash each month

What is the marginal benefit of the 2nd car wash each month? What is the optimal number of car washes per month? Why? Draw a graph to justify your responses.

  Explain in the context of human capital

Explain who should bear the cost of agility training for an NFL wide receiver. Should the team pay, or the player? Explain in the context of human capital.

  Significance of declaring a reference parameter

What is the significance of declaring a reference parameter or a pointer parameter as a const parameter?

  Show that a deadlock cannot occur

N processes share M resource units that can be reserved and released only one at a time. The maximum need of each process does not exceed M, and the sum of all maximum needs is less than M + N. Show that a deadlock cannot occur.

  What steps can an organization take to reduce these risks

Examine possible risks that can arise when systems are constructed using COTS. What steps can an organization take to reduce these risks?

  Significance in application design

What does relational closure mean, and what is its significance in application design?

  Describe how the statements relate to the ad-as model

Describe how the following statements relate to the AD-AS model:

  How do you know that a system has no solution

Find all of the ordered triples (x, y, z) such that when any one of the numbers is added to the product of the other two, the result is 2.

  Analyse information security vulnerabilities and threats and

Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd