Personal and transcript information

Assignment Help Basic Computer Science
Reference no: EM131074843

One easy way to determine information ownership is to think of CRUD-create, read, update, and delete. If you cannot only read but also create, update, and/or delete information, then in some way you own that information because you are responsible for its quality.

Here again, let's consider your school as an example and focus on your personal and transcript information. That information includes your student ID, name, address, phone number, GPA, declared major, declared minor (if you have one), and courses completed (your transcript).

Part 1: Identify Create, Update, and Delete Privileges

For each piece of information, first identify who has create, update, and delete privileges. Include any individuals or departments that have these sorts of information privileges. There may be several. If so, who is ultimately responsible for your personal and transcript information? Second, identify all the groups of people at your school who can only view (read) your information.

Part 2: Develop a CRUD Matrix 

Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges (example: https://ocean.otr.usm.edu/~w300778/is-doctor/pubpdf/sc2008.pdf).

Part 3: Write a Detail Document

Write a detail document about the various business rules that define how the scenario described in Part 1 works with respect to information ownership and their relationships. Identify the appropriate relationships among the information, and define the minimum and maximum privileges associated with each relationship.

Your paper must be a minimum of two pages, double-spaced and comply with CSU-Global Guide to Writing and APA Requirements. You may want to review the assignment criteria found in the Rubric.

Reference no: EM131074843

Questions Cloud

What are the practical policies that emerge out of outlook : George Kennan’s Long Telegram/Mr. X article. What is the post-war Soviet outlook? What are the sources of this outlook? What are the practical policies that emerge out of this outlook? What should the US do in light of Soviet policy/outlook?
What do you find most interesting about the cultural : What do you find most interesting about the cultural or ploitical background of the new testament and why?
Intrusion detection system on a virtual machine : How do you Install SNORT Intrusion detection system on a virtual machine using Mint and configure it to create a simple rule which generates an alert each time a specific website is visited from that virtual machine (e.g. www.yahoo.com).
Write a paper about the odyssey translated by samuel butler : Write a paper about The Odyssey Translated by Samuel Butler. What is the content? If you aren't certain of the genre, then usually thinking out the nature of the content will help you figure it out.
Personal and transcript information : Here again, let's consider your school as an example and focus on your personal and transcript information. That information includes your student ID, name, address, phone number, GPA, declared major, declared minor (if you have one), and courses ..
Calculate the new equilibrium quantity : Suppose that the market demand for medical care is summarized by the following: p=400 and the market supply is summarized by the following function: p = 50 +3Q health insurance is made available with not deductible and a 25% coinsurance rate. Calcula..
How would you define a successful project : Based on what you have seen in your own experience, and based on what you have read so far, how would YOU define a successful project? What do you think contributes to a project being unsuccessful? And, when you read about HUGE failures, do you be..
Rapid changes ocurring in business technology : Support or contradict this statement: "Given the realities of today's economy and the rapid changes ocurring in business technology, all competitive advantages are short-lived. There is no such thing as a sustainable competitive advantage that lasts ..
Construct the basis matrix ms for x(t) : Where G is the geometry matrix [p0 p1 p2 p3] and u (t) is the column vector (1, t, t2 , t3). In a uniform B-spline, each segment uses the same basis matrix, but the geometry matrix changes. Construct the basis matrix MS for x(t).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd