Database administrator for department store

Assignment Help Computer Networking
Reference no: EM13763422

Database Administrator for Department Store

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region. They have also launched a series of marketing campaigns to attract new customers and increase sales. For your hired role, you will be responsible for creating and maintaining an enterprise-wide database system that will hold the sales and inventory data for the organization. The designed database will help operations in supporting its new business marketing strategy. Using the concepts presented throughout the course, you will develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization.

Write a twelve to fifteen (12-15) page paper in which you:

1. Identify the potential sales and department store transactions that can be stored within the database.
2. Design a database solution and the potential business rules that could be used to house the sales transactions of the department store.
3. Evaluate all relationships of each entity within your database solution using the Crow's Foot notation. Include all data elements, entities, relationships (such as 1:M, 1:1, M:N), and cardinalities for the department store database in your diagram. Note: The graphically depicted solution is not included in the required page length.
4. Research the Internet for best practices of how retail stores use databases for retaining customers and increasing sales and complete the following:

1.Justify how Big Data tools could be used for forecasting sales and inventory of the department store.
2.Propose two (2) SQL Stored Procedures that use SQL functions to help sales associates perform explanatory or predictive analytics.
3.Give your opinion on which of the two (2) ways you proposed in Question four (4) b provide greater value to expanding their business within the region.
4.Provide a copy of your working SQL code as part of the paper.
5. Research the Internet for database vendors that provide cloud computing services and complete the following:
1.Estimate the types of costs involved or the pricing structure required when implementing a cloud-hosted solution for a database.
2.Analyze security considerations and pricing of the different cloud implementation types.
3.Rank the cloud services options of Software as a Service, Platform as a Service and Infrastructure as a Service in terms of functionality, mobility, and ability to provide distributed transaction concurrency. Compare how these cloud-based services fit within an environment where users are mobile. Determine the technical provisions that would be required to ensure data integrity.
6. Evaluate whether the use of a distributed DBMS structure is appropriate and identify the optimization techniques that should be factored in to enhance the operations of the database in your design.
7. Provide at least two (2) examples of how lost updates and uncommitted data may occur, keeping in mind that five (5) stores will be generating transactions.
8. Determine the concurrency control factors that can be used to ensure valid execution of transactions within the current multiuser environment.
9. Research the Internet for backup and restoration recovery solutions and database security threats that could be applicable to the department store. Upon your research, complete the following:
1.Suggest at least two (2) options that could be made available to provide disaster management functions for the database system within the retail environment.
2.Assess the types of security threats that may exist when managing the department store database and suggest measure(s) that can be performed to minimize these threats that are particular to retail.
10.Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  •  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  •  Include a cover page containing the title of the assignment, The cover page and the reference page are not included in the required assignment page length.
  •  Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  •  Compose conceptual data modeling techniques that capture information requirements.
  •  Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.
  •  Describe the basic mechanisms for accessing relational databases from various types of application development environments.
  •  Use technology and information resources to research issues in the strategic implications and management of database systems.
  •  Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions

Reference no: EM13763422

Questions Cloud

Implement a simple automated bank registry system : Implement a simple automated bank registry system. The implementation will include several attributes related to a transaction, and the data will be managed in a global linked list within memory.
Public and community health issues : Identify the demographics and effect of the issue or disease on the community.
Summarize bellamys treatment of component of citizenship : Summarize Bellamy's treatment of one of the principal components of citizenship (membership, rights and participation). Treat both the conceptual and historical dimensions of his discussion.
What were the solutions used to address the problem : What were the solutions used to address the problem and Do you feel the solution or approach used appropriate for the cause
Database administrator for department store : The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.
What are the pros of social media : What are the pros of social media, and how do you think they can be harnessed to promote effective communication?
Natural ocean disasters issues : Would the effects of this event be any different if it occurred at a high or low tide? If so how?
Discuss rationale behind choosing each media elements : Discuss the rationale behind choosing each of the three media elements and support your discussion with concepts from the course material.
Explain internet and the world wide web : Explain how the Internet and the World Wide Web have evolved over the years and disrupted traditional ways of doing business.

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe any of the internetworking equipment that you have

discuss any of the internetworking equipment that you have experience with and the advantages and disadvantages of

  Design the layout of users domains trusted domains

design the layout of users domains trusted domains anonymous users etc for a start-up open source software company abc.

  Clusters can be implemented by leveraging most of the

clusters can be implemented by leveraging many operating systems and applications. in a report of 1-2 pages complete

  Explain the osi model and tcp-ip protocol

Define and explain the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

  1 we are building a network using radios that operate at

1. we are building a network using radios that operate at 1ghz in an urban area.nbsp once end of the link will have the

  When collision has occurred then how does a host on

when collision has occurred then how does a host on ethernet lan know when to transmit more details explanation need?1.

  Connecting computers in a local area network

Assume you are asked to head a non computerized department and you need ten computers and would like to connect them to each other.

  Write security policy by nstissc model by analyzing cells

Write down the security policy document of less than 1000 words for business which operates web site which sells books.

  Describe the characteristics of the worst reports

Describe the characteristics of the worst reports. Consider different aspects of the report that could go wrong such as format, layout and content, and describe what could go wrong with them under different categories

  Lan security in a network environment

Discuss today's Local Area Networks security issues related to peer-to-peer network, client /server network and virtualisation environment.

  Explaining decryption function

Determine the decryption function. What is the decrypted plaintext?

  Case study- handmade furniture ltd

Assignment case study: HandMade Furniture Ltd. Each office worker has their own PC. There is a mixture of Windows XP, Windows 7 and Windows 8 installed together with various versions of Microsoft Office

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd