Developers database and its corresponding tables

Assignment Help Basic Computer Science
Reference no: EM131578811

Before database developers database and its corresponding tables, the developers must determine what type of data must be stored, business rules about the data (such as an invoice date cannot be earlier than a purchase date), and relationships between different pieces of data. To determine such information, the data analyst must ask questions of stakeholders throughout the organization.

For this discussion, assume you work in the IT department of an organization. Your boss wants you to track all types of IT assets throughout the organization. She wants to know:

  • The acquisition cost.
  • The acquisition date.
  • Software installed on each user and server machine.
  • Licenses owned and actually used.
  • User assignment.
  • Other details.

Develop and list the questions you would ask stakeholders throughout the organization to determine what data you will store and how you should best organize it.

Reference no: EM131578811

Questions Cloud

Common cause of computer failures : Briefly describe what you would do to back up your home computer to protect yourself from a computer failure. What are the most common cause of computer failure
Find the expected number of unoccupied locations : We have seen a number of occasions when our intuition about expected values or probability in general fails us.
Business-related files stored : How would this change if you were to open a "business in the home" and had business-related files stored/used?
Presentation of the theory or model : Present one theory or model of behavioral change which would be effective in a population and/or community?
Developers database and its corresponding tables : Before database developers database and its corresponding tables, the developers must determine what type of data must be stored.
Changes in an employee''s values : Changes in an employee's values, interests, and job performance cause
Write a code of a gui : Write a code of a GUI. I choose a Contact list where you havea name, phone number, email and zipcode. The contact should be able to edit, save, delete
Develop a vulnerability assessment plan : For this assignment, you will need to develop a vulnerability assessment plan.
Two advantages and limitations of using historical cost : Explain two advantages and two limitations of using historical cost for the accounting valuation of assets; and the measurement of periodic income.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the next state for each of the six unused states

Determine the next state for each of the six unused states in the BCD ripple counter shown in Fig. 7-14. Determine whether the counter is self-correcting.

  Find the least squares regression equation

Construct a 95% confidence interval for the mean number of people attracted to an event when 4400 cards have been distributed.

  Determine the surface temperature on a windy day

If the air around this line is at 16°C, determine the surface temperature on a windy day, assuming a wind blows across the line at 33 km/h.

  Advising about a software purchase

Your local art museum recently purchased a quad-core computer with 16 GB of RAM. The curator read an article about an art collection inventory system software package that could go on the new computer. You have a long experience with end users has..

  Data type in programming languages

What is the range of the short data type in programming languages?

  Understanding of effective leadership

Based on your understanding of effective leadership, how do you think your representation captures those qualities or characteristics?

  Design a system of three lans with four bridges

Design a system of three LANs with four bridges. The bridges (B1 to B4) connect the LANs as shown below. Show diagram in Word and use any diagramming tool to demonstrate the design (Forouzan 2007, p.465).

  Compute the path integral

Compute the path integral F · dS where F = (x^2 - y^2) i + xj and C is one circuit of the circle C (x^2) +(y^2)= 4 in the counterclockwise direction.

  Why is it significant to project planning

Why is it a good practice to delay naming specific individuals as resources early in the planning process?

  Describe your strategy in a brief memo

What should Paperback Press watch for to detect possible obsolescence in the future? Develop a checklist with specific examples that management could use.

  Research and pick one organization

Research and Pick ONE organization that can you conduct a risk assessment on. It can be any organization or company of choice. For the case study, you are pretty much creating your risk assessment report.  Case Study 1 is the first section of that re..

  Why do some block cipher modes of operation only

Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd