Implement the described database in ms access

Assignment Help Computer Networking
Reference no: EM131976767

Data and Information Management

Managing Data in Databases

Purpose of the assessment

The purpose of this assignment is to develop skills in managing data in databases and to gain understanding of data model development and implementation using a commercially available database management system development tool.

On completion of this assignment students will be able to:
a. Model organisational information requirements using conceptual data modelling techniques.
b. Convert the conceptual data models into relational data model and verify their structural characteristics with normalisation techniques.

Assignment Description

1. The schema for the LibraryDB database is given below. LibraryDB is a database that keeps track of information about the books and their circulation in a library.

The primary keys are underlined. The foreign keys are denoted by asterisks (*).

Borrow(transactionID:text, personID*:text ;borrowdate:date, returndate:date)
Book(ISBN:number, title:text, Volnumber:number, year_published:numeric, NoofCopies:number; Price:number; PublisherID:text)
Person(personID:text, firstname:text, lastname:text, address:text, city:text,
postcode:txt, phonenumber:number)
publisher(publisherID:text,publisherfullname:txt)

Description of the schema

borrow -- keeps track of the check-ins and check-outs of the books.
person -- keeps track of the people who borrow books from the library.
book -- contains information about the books that are available in the library.
publisher -- keeps track of the publisher information.

a. Implement the above described database in MS Access. You are required to create the above 4tables with the given attributes. Name the database as ‘LibraryDB' .

b. Populate all tables with suitable data (at least 3 records per table- suitable to answer given queries) using the following SQL statements or data sheet view in MS Access.
INSERT into TableName
VALUES ("..","..",.....)

Write SQL queries for the following questions and execute the queries on the ‘LibraryDB' database you created in MS Access.

c. Prepare a list of ISBN number, title, Volnumber, NoofCopiesof all Books in the library.

d. Assume that you want to count how many books in the library which are older than 10 years (i.eyear_published is before 2008). Write a query to find the number.

e. Display details of all books that cost more than the average price of the books in the library.
(Hint: use sub-query).

f. Display details of all bookswhich are published in year 2017 and published by "ACER Press" publishers (publisherfullname is "ACER Press")
(Hint: you may need to join Book table and publisher table)

g. Create a new table named "Borrower" that includes personID, firstname, lastname, address of the borrower, borrowdate and returndate.
Hint : you may need to join 2 tables Person and Borrow.

2. Sales tracking is important in many online stores. Figure 1 shows the ER diagram that captures important information in the tracking of sales in a Bookstore. Specifically, the ER diagram captures relationships between authors, Books, customers, publishers, warehouses and shopping-basket.

446_Bookstore ER Diagram.jpg

Figure 1: Bookstore ER Diagram

a. Convert the ER diagram into a relational database schema. Be certain to indicate primary keys (underline).
EgBook (ISBN: NUMBER; title:text,.....)

b. Identify two attributes in the ER diagram of figure 1 that might represent a composite attribute, and explain why/how it might represent a composite attribute.

c. Determine the cardinality of the relationships(listed below) in the above ER diagram. The cardinality shows how much of one side of the relationship belongs to how much of the other side of the relationship. Write the business rule that you would use to mark the cardinality, as shownin the example given in figure 2.

i. Book-Author
ii. Book - publisher
iii. Book - Warehouse

Example:

Relationship between shopping-basket --- Customer

308_Example.jpg

Business rule:
A customer may submit any number of orders on to the shopping-basket. However, each order must be submitted by exactly one customer.

Figure 2: Example of cardinality of business rule for the ‘shopping-basket --- Customer' relationship

3. Prepare a brief report on the following "Big data technologies". (6 Marks)
a. Hadoop
b. MapReduce

Use the following heading for writing the report for each topic:
1. Introduction
2. Capabilities and Limitations
3. Conclusion

Reference no: EM131976767

Questions Cloud

Define strategic financial management external analysis : Strategic financial management external analysis (Create one table which identifies the external issues faced by the ACADIA healthcare.
What is internal rate of return-should project be undertaken : What is the internal rate of return? Should the project be undertaken?
Using financial statements especially in healthcare : Explain why it is important to know the scope of business being reviewed when using financial statements especially in healthcare.
What components and attributes will need to be included : A national builder has hired your software development firm. What components and attributes will need to be included in your home class? Why?
Implement the described database in ms access : MN405 - Data and Information Management - Convert the conceptual data models into relational data model and verify their structural characteristics
How important would you characterize globalization : How important would you characterize globalization for developing business professionals? Take a position and provide evidence.
What is the present value of these cash flows : If the discount rate is 8%, what is the present value (today) of these cash flows if.
Briefly describe the product you would produce and sell : Briefly describe the product you would produce and sell. What market will you target this product for? At what price would you sell your product?
Explain the types of budget approaches : What types of budget approaches are typically used in for-profit companies as opposed to non-profit organizations? Explain at least two different budget methods

Reviews

len1976767

5/9/2018 5:18:22 AM

Quiz (30 marks) Demonstrated excellent ability to think critically. Demonstrated an ability to think critically. Demonstrated reasonable ability to think. Demonstrated some ability to think critically but not complete. Did not demonstrate ability to think critically.

len1976767

5/9/2018 5:18:16 AM

Q3. Model organisational information requirements(with Big data technologies) (6 marks) Demonstrated excellent knowledge on the topic Demonstrated good knowledge on the topic. Demonstrated reasonable knowledge on the topic Demonstrated some knowledge on the topic. Did not demonstrate any knowledge on the topic.

len1976767

5/9/2018 5:18:09 AM

Q2. Convert the conceptual data model into relational data model. (24 marks) Demonstrated excellent ability to think critically. Demonstrated an ability to think critically. Demonstrated reasonable ability to think. Demonstrated some ability to think critically but not complete. Did not demonstrate ability to think critically.

len1976767

5/9/2018 5:18:03 AM

Marking criteria: Marks are allocated for each part as below: Marking Rubric for Assignment 1 -Total Marks 100 Excellent 100% Very Good 80% Good 60% Satisfactory 40% Unsatisfactory 0%-20% Q1. Model organisational information requirements using conceptual data modelling techniques and Query Writing Skills (40 marks) Evidence of accurate and well- written queries Evidence of good query writing skills. Generally relevant. Demonstrated reasonable query writing skills. Did not demonstrate evidence of understanding the topic.

Write a Review

Computer Networking Questions & Answers

  Described a layered model of networking

Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.

  Explain the benefits of conducting a site survey

You will need to be sure that your boss understands what tools you will need to conduct the site survey and why each is needed.

  Explain at least one disadvantage of using each topology

In this paper, (a) define each topology, (b) provide a scenario for using each topology, and (c) identify at least one disadvantage of using each topology.

  Design ip network based on requirements for company

XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Design the IP network based on the requirements stated above.

  Ftp client program and starts downloading

A client computer opens an FTP client program and starts downloading certain files from an FTP server. While the download is in progress, the user opens

  Write a summary of the history of computer networks

Write a summary of the history of computer networks. Please include major events until the year of 2017

  Discuss frequency sets that are used for wi-fi networks

What other devices in a business or home might cause interference with these frequencies. How does 802.11ac utilize these frequencies

  How will the software circuit firewall react

Which type of attack is primarily intended to disrupt the availability of critical business functions - assify each attack method in relation to its direct impact.

  Message forwarding a computer in the computing department

message forwarding a computer in the computing department has just been turned on. the user starts up their web browser

  Provide one specific network configuration example

Provide one specific network configuration example for each best practice that demonstrates the application of the best practice. Provide justification as to why each best practice should be followed.

  Differences between classful and classless routing

Explain the differences between- a routing protocol and a routed protocol, classful and classless routing and Distance Vector Routing Protocols and Link State Routing Protocols

  Optimize wireless security on an ap

Properly securing a wireless access point is not the kind of chore that most home users think to do. Some IT students have actually created businesses securing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd