Identify potential sales and department store transactions

Assignment Help Computer Engineering
Reference no: EM132187674

Question: The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region. They have also launched a series of marketing campaigns to attract new customers and increase sales. For your hired role, you will be responsible for creating and maintaining an enterprise-wide database system that will hold the sales and inventory data for the organization. The designed database will help operations in supporting its new business marketing strategy. Using the concepts presented throughout the course, you will develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization.

Write a twelve to fifteen (12-15) page paper in which you:

1. Identify the potential sales and department store transactions that can be stored within the database.

2. Design a database solution and the potential business rules that could be used to house the sales transactions of the department store.

3. Evaluate all relationships of each entity within your database solution using the Crow's Foot notation. Include all data elements, entities, relationships (such as 1:M, 1:1, M:N), and cardinalities for the department store database in your diagram. Note: The graphically depicted solution is not included in the required page length.

4. Research the Internet for best practices of how retail stores use databases for retaining customers and increasing sales and complete the following:

• Justify how Big Data tools could be used for forecasting sales and inventory of the department store.

• Propose two (2) SQL Stored Procedures that use SQL functions to help sales associates perform explanatory or predictive analytics.

• Give your opinion on which of the two (2) ways you proposed in Question four (4) b provide greater value to expanding their business within the region.

• Provide a copy of your working SQL code as part of the paper.

5. Research the Internet for database vendors that provide cloud computing services and complete the following:

• Estimate the types of costs involved or the pricing structure required when implementing a cloud-hosted solution for a database.

• Analyze security considerations and pricing of the different cloud implementation types.

• Rank the cloud services options of Software as a Service, Platform as a Service and Infrastructure as a Service in terms of functionality, mobility, and ability to provide distributed transaction concurrency. Compare how these cloud-based services fit within an environment where users are mobile. Determine the technical provisions that would be required to ensure data integrity.

6. Evaluate whether the use of a distributed DBMS structure is appropriate and identify the optimization techniques that should be factored in to enhance the operations of the database in your design.

7. Provide at least two (2) examples of how lost updates and uncommitted data may occur, keeping in mind that five (5) stores will be generating transactions.

8. Determine the concurrency control factors that can be used to ensure valid execution of transactions within the current multiuser environment.

9. Research the Internet for backup and restoration recovery solutions and database security threats that could be applicable to the department store. Upon your research, complete the following:

• Suggest at least two (2) options that could be made available to provide disaster management functions for the database system within the retail environment.

• Assess the types of security threats that may exist when managing the department store database and suggest measure(s) that can be performed to minimize these threats that are particular to retail.

10. Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM132187674

Questions Cloud

What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.
What is your monthly mortgage payment : Now suppose you borrowed P0 on a 15-year mortgage at r annual interest rate compounded daily. What is your monthly mortgage payment M15
Identify potential sales and department store transactions : Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening.
How the method can be used to plan out the system : Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking.
Write an essay about the presentation : Write an 800 word essay about the presentation "Navigating the Journey of Technology Transformation. The response must be typed.
Prepare the plant assets section of bridgeport balance sheet : June 1 Sold land for $3,025,600. The land cost $1,891,000. Prepare the plant assets section of Bridgeport's balance sheet at December 31, 2018
Write a search method with four parameters : Write a search method with four parameters: the search array, the target, the start subscript, and the finish subscript. The last two parameters indicate.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss cookies and two other pieces of information

Identify two specific types of data that should be stored in cookies and two other pieces of information

  Sources must be cited in apa formatnbsp your response

sources must be cited in apa format.nbsp your response should be a minimum of one single-spaced pagenbspto anbspmaximum

  The tabular output has to include these cross-totals

Thus, each salesperson passes in between 0 and 5 sales slips per day. suppose that the information from all the slips for last month is available.

  Make a finite-state machine for a combination lock

Construct a finite-state machine for a combination lock that contains numbers 1 through 40 and that opens only when the correct combination, 10 right, 8 second.

  Implement the basic radiosity algorithm

Implement the basic radiosity algorithm for rendering the inside surfaces of a cube when one inside face of the cube is a light source.

  Analyze why getty image embraced agile methodologies

Analyze why Getty Image embraced Agile methodologies. Speculate on the result if Agile methodologies were not embraced in this situation.

  Write a loop in which you ask users their age

Write a loop in which you ask users their age, and then tell them the cost of their movie ticket.

  Define interface that implement the abstract data-type stack

Define the interface of a module that implements the abstract data-type STACK, where operation pop raises an exception if called to operate on an empty stack.

  Write a report about your discovery and the whole process

You need to write a report (around 3-4 pages, Maximum 1500 words) about your discovery and the whole process of data collection and analysis.

  What is the general theme of the paper you read

What is the general theme of the paper you read? What does the title mean? Who are the authors? Where are they from? What positions do they hold?

  Create a deck of cards

Create a deck of cards. A card is a tuple containing a number between 1 and 13 representing the cards value and a string contianing "clubs".

  What is the morality of posting an encryption key

Discuss your answer using Act utilitarianism while taking into account the harms and benefits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd