Make list of business rules for shelter

Assignment Help Basic Computer Science
Reference no: EM133234862

You have been asked to build a database for a pet foster and adoption shelter. The agency is a nonprofit that takes in stray or abandoned pets and places them with foster caregivers until the pet is adopted. Foster caregivers are volunteers, though they must first be screened. The database needs to track all animals in its care, their species, breed, name, and condition. It also needs to track all approved foster caregivers and the animals currently in their care. Foster caregivers are also supposed to turn in monthly reports on the animals in their care. The database also needs to track the adoptions of the animals.

Currently, volunteers come into the shelter and fill out a paper form. After a background check, they are added to a file. Some volunteers complain that they are never contacted again. The shelter staff admits, they tend to go with foster caregivers they know, and some people get forgotten in the file. The shelter has also occasionally lost track of an animal in foster care when the caregiver failed to turn in the monthly reports. Another recurring problem is that when someone comes into the shelter looking to adopt, it is not always easy or even possible to let them know about all the animals available for adoption.

Ideally, the shelter would like people to be able to register as a volunteer online. They would like to be able to call up a list of all available foster volunteers. They would also like to be able to pull up all the animals of the kind a potential adopter is interested in and know exactly where those animals are and who is caring for them.

1. Make a list of some of the major issues with the current system used in the shelter.

2. Identity who the major stakeholders are and list them.

3. Would animals be stakeholders in this database? Explain why or why not.

4. Make a list of requirements for each of the stakeholders showing how he or she would interact with the database.

5. Make a list of business rules for the shelter.

6. What might be some of the shelter database security issues?

7. Make a list of all the nouns in the description of the shelter.

8. Take the list from practice5, and determine what you think would be the major entities.

9. List the attributes for each of the entities you listed in practice6.

10. Identify some candidate keys.

Reference no: EM133234862

Questions Cloud

Find information about cloud security breaches : Find information about the legislative history behind one of the regulations. Find information about cloud security breaches.
Current state of phishing attacks : How the current state of phishing attacks doesn't fully meet the expectations of society. If it did do so, it would not be a Grand Challenge needing work
Description of sample database domain : In a general case we would like to aggregate the measurements of humidity and temperature over time.
About security operations centers : This assignment is about Security Operations Centers (SOC) from this module's lecture.
Make list of business rules for shelter : Identity who the major stakeholders are and list them. Make a list of business rules for the shelter. Identify some candidate keys.
Formulas are logically equivalent : Which of the formulas are logically equivalent
What constitutes sensitive and non-confidential data : Companies are still having a difficult time in protecting their data in digital format and defining what constitutes sensitive and non-confidential data,
Techniques in handling categorical attributes : What are the techniques in handling categorical attributes? How do continuous attributes differ from categorical attributes?
University database contains information : A university database contains information about professors (identified by social security number, or SSN), departments (identified deptid), and courses

Reviews

Write a Review

Basic Computer Science Questions & Answers

  In what ways are FERPA-COPPA and CIPA

In what ways are FERPA, COPPA, and CIPA similar and what challenges do they face regarding protecting children on the Internet?

  Aligning needs with computer purchase

What type of computer do you recommend your friend purchases? Explain your rationale behind your selections.

  What are the 4 tables we need to create the solution in sql

CEO of Entertainment Inc. wants to keep track of performance of engagement that each customer and agent have engaged. For each customer and agent

  Benefits and the challenges of using cdss

Explains the benefits and the challenges of using a CDSS in the clinical situation you choose.

  Assignment on graph traversals

For this problem, you are asked to consider directed graphs. Suppose the graph to be considered has one root.

  Potential vulnerabilities in making purchase with debit card

Recognoze any potential vulnerabilities in making purchase with debit card, and which area of CIA triad they apply to.

  Simulated disaster and comprehensive recovery test

A simulated disaster and comprehensive recovery test may involve many of an organization's key personnel for several days.

  Describe hypothetical situation

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner

  Cloud computing can consist of number of different component

Cloud computing can consist of any number of different components, capabilities, functions, and resources, each meeting particular business needs.

  Explain the problem of global warming

Use orthodox economic theory to explain the problem of global warming (climate change) and suggest policy solutions.

  Compute the jaccard similarity of each of the pairs

Compute, for each pair of columns of that figure, the fraction of the 120 permutations of the rows that make the two columns hash to the same value.

  What will be the bit sequence that actually gets transmitted

Calculate the redundancy code. What will be the bit sequence that actually gets transmitted?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd