Implement the described database in ms access

Assignment Help Computer Networking
Reference no: EM131973550

Data and Information Management

Managing Data in Databases

Purpose of the assessment

The purpose of this assignment is to develop skills in managing data in databases and to gain understanding of data model development and implementation using a commercially available database management system development tool.

On completion of this assignment students will be able to:
a. Model organisational information requirements using conceptual data modelling techniques.
b. Convert the conceptual data models into relational data modeland verify their structural characteristics with normalisation techniques.

Assignment Description

1. The schema for the LibraryDB database is given below. LibraryDB is a database that keeps track of information about the books and their circulation in a library.

The primary keys are underlined. The foreign keys are denoted by asterisks (*).

Borrow(transactionID:text, personID*:text ;borrowdate:date, returndate:date)
Book(ISBN:number, title:text, Volnumber:number, year_published:numeric, NoofCopies:number; Price:number; PublisherID:text)
Person(personID:text, firstname:text, lastname:text, address:text, city:text,
postcode:txt, phonenumber:number)
publisher(publisherID:text,publisherfullname:txt)

Description of the schema

borrow -- keeps track of the check-ins and check-outs of the books.
person -- keeps track of the people who borrow books from the library.
book -- contains information about the books that are available in the library.
publisher -- keeps track of the publisher information.

a. Implement the above described database in MS Access. You are required to create the above 4tables with the given attributes. Name the database as ‘LibraryDB' .

b. Populate all tables with suitable data (at least 3 records per table- suitable to answer given queries) using the following SQL statements or data sheet view in MS Access.
INSERT into TableName
VALUES ("..","..",.....)

Write SQL queries for the following questions and execute the queries on the ‘LibraryDB' database you created in MS Access.

c. Prepare a list of ISBN number, title, Volnumber, NoofCopiesof all Books in the library.

d. Assume that you want to count how many books in the library which are older than 10 years (i.eyear_published is before 2008). Write a query to find the number.

e. Display details of all books that cost more than the average price of the books in the library.
(Hint: use sub-query).

f. Display details of all bookswhich are published in year 2017 and published by "ACER Press" publishers (publisherfullname is "ACER Press")
(Hint: you may need to join Book table and publisher table)

g. Create a new table named "Borrower" that includes personID, firstname, lastname, address of the borrower, borrowdate and returndate.
Hint : you may need to join 2 tables Person and Borrow.

2. Sales tracking is important in many online stores. Figure 1 shows the ER diagram that captures important information in the tracking of sales in a Bookstore. Specifically, the ER diagram captures relationships between authors, Books, customers, publishers, warehouses and shopping-basket.

446_Bookstore ER Diagram.jpg

Figure 1: Bookstore ER Diagram

a. Convert the ER diagram into a relational database schema. Be certain to indicate primary keys (underline).
EgBook (ISBN: NUMBER; title:text,.....)

b. Identify two attributes in the ER diagram of figure 1 that might represent a composite attribute, and explain why/how it might represent a composite attribute.

c. Determine the cardinality of the relationships(listed below) in the above ER diagram. The cardinality shows how much of one side of the relationship belongs to how much of the other side of the relationship. Write the business rule that you would use to mark the cardinality, as shownin the example given in figure 2.

i. Book-Author
ii. Book - publisher
iii. Book - Warehouse

Example:

Relationship between shopping-basket --- Customer

308_Example.jpg

Business rule:
A customer may submit any number of orders on to the shopping-basket. However, each order must be submitted by exactly one customer.

Figure 2: Example of cardinality of business rule for the ‘shopping-basket --- Customer' relationship

3. Prepare a brief report on the following "Big data technologies". (6 Marks)
a. Hadoop
b. MapReduce

Use the following heading for writing the report for each topic:
1. Introduction
2. Capabilities and Limitations
3. Conclusion

Verified Expert

The solution file is prepared in ms word to discussed about the requirements of organization using conceptual data modelling, converted conceptual data model into relational data model. Also discussed about big data technologies and references are included as per IEEE format.

Reference no: EM131973550

Questions Cloud

Create presentation on the selected personality disorders : Choose and read any one case study from Chapter 13 (Personality Disorders) in DSM-5 in Action. Research the specific personality disorder from your chosen.
According to liquidity premium theory : If the yield on a discount bond that matures in 4 years is 9.25%, then according to liquidity premium theory,
Securities must you put into your brokerage account : How much in cash or securities must you put into your brokerage account if the broker’s initial margin requirement is 50% of the value of the short position?
Press sway public opinion in an election : How might a partisan press sway public opinion in an election? Do you believe media's coverage of politics is completely without bias? Why or why not?
Implement the described database in ms access : Implement the described database in MS Access. You are required to create the above 4tables with the given attributes. Name the database as LibraryDB
Negligently crashes into a victim : Follis, Graham, and Hawthorne have a general partnership, each agreeing to split losses 20 percent, 20 percent, and 60 percent, respectively.
Determining the fieldwork opportunities : To begin networking for fieldwork opportunities and build a database of community resources, research two clinical facilities that assist individuals in crisis.
How do medical billing and coding specialists : How do medical billing and coding specialists keep up-to-date with changes in ICD and CPT?
What is the rate of return on her investment : What is the margin in Dee’s account when she first purchases the stock? What is the rate of return on her investment?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd