Reference no: EM13803796
Assignment: Business Rules and Data Models
Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.
Use the internet to research the types of information that a college would want to track in a database. Focus your attention on information that could represent entities within a database as well as attributes of such entities.
Write a two to three (2-3) page paper in which you:
1. Describe the purpose of the database.
2. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.
3. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the business rules that could impact the structure of the database.
4. Determine the information that the conceptual model of the database would include and determine the information that the physical model of the database would include.
Epa published an economically significant proposed rule
: EPA published an economically significant proposed rule intended to reduce CO2 emissions from existing power plants. EPA expects annual compliance costs
|
What is the net force on the motorcycle
: What is the jets acceleration - What is the net force on the motorcycle
|
What a story about the han dynasty
: What a story about the Han dynasty?
|
Reflection on diversity
: Reflection on Diversity
|
Describe the purpose of the database
: Describe the purpose of the database. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity
|
How are particularistic historical and social have discussed
: How are the particularistic historical, social, and philosophical backgrounds that have been discussed thus far influential to the way you can formulate these questions?
|
Create an implementation plan for your organization
: Create an implementation plan for your organization, one of the Virtual Organizations, or a project from the websites such as challenge.gov or a state RFP site. Obtain instructor approval of the plan before beginning
|
Strategy for dealing with the risk
: For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)
|
Contributions of leadership-management
: Compare and contrast the contributions of leadership, management, and organizational structures to the organizational failure.
|