Develop a crud matrix develop a crud matrix

Assignment Help Computer Engineering
Reference no: EM132085623

One easy way to determine information ownership is to think of CRUD-create, read, update, and delete.

If you cannot only read but also create, update, and/or delete information, then in some way you own that information because you are responsible for its quality. Here again, let's consider your school as an example and focus on your personal and transcript information.

That information includes your student ID, name, address, phone number, GPA, declared major, declared minor (if you have one), and courses completed (your transcript).

Part 1: Identify Create, Update, and Delete Privileges For each piece of information, first identify who has create, update, and delete privileges.

Include any individuals or departments that have these sorts of information privileges. There may be several. If so, who is ultimately responsible for your personal and transcript information?

Second, identify all the groups of people at your school who can only view (read) your information.

Part 2: Develop a CRUD Matrix Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges.

Part 3: Write a Detail Document Write a detail document about the various business rules that define how the scenario described in Part 1 works with respect to information ownership and their relationships.

Identify the appropriate relationships among the information, and define the minimum and maximum privileges associated with each relationship.

Reference no: EM132085623

Questions Cloud

Write a class called darts : One way to estimate the value of p is to simulate a darts game. The darts player throws at a circular board with a radius of 1 foot.
The interarrival time has an exponential distribution : Cars arrive at Joe’s Service Station for an oil change every 15 minutes, and the interarrival time has an exponential distribution.
How will your team manage any conflict which may arise : How will you as a team communicate if a team member is not contributing and collaborating effectively? How will your team manage any conflict which may arise?
Deign a synchronization solution using only locks : Deign a synchronization solution using only locks, semaphores and integer variables that achieve.
Develop a crud matrix develop a crud matrix : Identify Create, Update, and Delete Privileges For each piece of information, first identify who has create, update, and delete privileges.
Calculate the net present value and profitability index : BAK Corp. is considering purchasing one of two new diagnostic machines. Calculate the net present value and profitability index of each machine
Expalin variables in java must have a declared type : For each one of the following statements about Java, indicate whether or not it is also true for Smalltalk.
Discuss about the database transaction management : The simulation times, number of data blocks, and longest read or write time period are set at the beginning of the simulation.
Organizational culture characteristics make project : A variety of organizational culture characteristics make project success more likely.

Reviews

Write a Review

Computer Engineering Questions & Answers

  List four different html tags which define the structure of

question 1 list 4 different html tags that define the structure of a document and briefly define the function of

  Discuss trojan programs on microsoft windows computers

The Windows Task Manager can be used to seek out Trojan programs on Microsoft Windows computers

  Generate a few more visualizations that examine any aspect

Generate a few more visualizations that examine any other weather aspect you're interested in for any locations you're curious about.

  Did you describe how they would deploy different software

scenario your boss has come to you and expressed that there are several software packages that he would like you to

  Design a document containing plan for authentication methods

Design a document containing a sample plan for authentication methods, users, and roles used for a test database.

  Define the read and write control signal

Draw a timing diagram relative to the CPU clock shown in Figure P-2-20, which includes the address and data buses. R/W_L and the write control signal.

  Write a program that simulates inventory bins in a warehouse

Write a program that simulates inventory bins in a warehouse. Each bin holds a number of the same type of parts.

  Compute the geometric mean for the given example with asc

Compute the geometric mean for the Example with ASC3 as the reference. Are the relative performances same as in Example?

  Challengeopportunity area for suh choose one of the three

using the case provided propose a technology solution that results from your analysis of the business environment.

  What is meant by two-key lockout and n-key rollover

What are the factors to be considered for interfacing a hex keyboard to a microcontroller?

  What would a call to minimum look like

What would a call to Minimum look like if the actual parameters are a variable called Deductions and the literal 2000?

  Determined through default conventions

An advantage of dynamic scoping is that access to nonlocal variables is considerably faster than accesses to nonlocals when static scoping is used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd