Database Management Systems

timer Asked: Mar 25th, 2017
account_balance_wallet $30

Question Description

Assessment focuses on design and research issues related to Database Management Systems. Each student submits a detailed report as per the task specifications through Moodle. The assignment has two sections (Part A and Part B) focusing on advanced database concepts: Part A focuses on analysis of key factors of database systems. In part B you are required to write a scholarly academic article based on critical engagement with work done in Part-A.

check the attachment all the details of the assignment is in it

Unformatted Attachment Preview

PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM Database Systems and Administration (ECM38IS) Spring 2017 Individual Assignment Hand out Week: Week 3 Duration: 9 weeks Submission Date: Week 12 Total Marks: 100 Objective: The assignment constitutes 70% of the module mark. Assessment focuses on design and research issues related to Database Management Systems. Each student submits a detailed report as per the task specifications through Moodle. The assignment has two sections (Part A and Part B) focusing on advanced database concepts: Part A focuses on analysis of key factors of database systems. In part B you are required to write a scholarly academic article based on critical engagement with work done in Part-A. Outcome: 1. Evaluate the role of conceptual modeling in the development of database systems and apply the entity-relationship modeling approach to a realistic scenario 2. Apply the essential concepts of relational databases, (including keys, normalization and referential integrity) to sample data sets and demonstrate best practice in the development of an appropriate and effective database system 3. Select and apply appropriate techniques involved in database administration 4. Critically evaluate security issues relating to database management systems and propose appropriate strategies to address security problems 1 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM Part A Scenario: Aaliya Institute of Management and Technology (AIMT) conducts courses to award Bachelors and Masters Degree programmes in various specializations. It has a well-established manual system to manage almost all the day to day business of an academic institute and is inclined to proceed with automation of all the process. AIMT has a Dean and few Associate and Assistant Deans to assist the Dean in academic matters. It has many departments and each department can offer different programmes. Each department is chaired by a Head of the Department (HoD). Further, each department is identified with a unique ID, department name, and employee_ID of the person who is heading the department. Within a department, each Programme is managed by a Programme Manager (PM), who in turn reports to the HoD. Each department offers a bunch of courses spread across different programmes which necessitates the need of interaction between the PMs and HoD during allotment of modules to teaching staff. A module to be offered can have multiple sessions and each module is identified by a unique module code, module name and number of credit hours. Each teaching faculty is allocated with a teaching load of minimum of 18 credits. If the module that is offered belong to Master's level, then one credit load is considered to be equal to one and a half credit. In order to be familiar with the responsibilities of HoDs, AIMT has decided to bring in some changes at the administrative level by introducing one or more Assistant HoDs who can assist the HoD in overall functioning of the department. Existing staff members instead of directly reporting to HoD, will now be directly reporting to one of the Assistant HoDs. After the introduction of Assistant HoDs, the teaching work load of staff who are serving as Assistant HoDs has been reduced to 10 credits and that of the PMs also. It is to be noted that Dean, Associate/Assistant Dean, HoD, PM, teaching staff such as Professor, Associate Professor, Assistant Professor, Lecturer are all employees and every employee is 2 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM identified with a unique ID, name, gender, date of birth, designation, department to which he/she belongs, skills of the faculty. Propose a conceptual model after an in-depth research on AIMT operations and processes. In order to come up with an appropriate design/solution, you must study the requirements, issues and best practices in this problem context. You can make relevant assumptions required to formulate business rules, security, administration and modelling. Based on the above information execute Task 2, 3, 4 and Task 5. You may have to make additional assumptions to execute the above tasks. Task 1: Submit a work proposal for this assignment on or before 23:59 on Saturday (end of Week-5), which must include:  Understanding of deliverables – a detailed description of deliverables.  General overview of the given tasks – (Part A and Part-B) - initial understanding of solution to all tasks with timeline to complete them and identification of literature resources. (For more clarity, please refer to criteria of evaluating the work proposal given on the last page of this assignment). (10 marks) Task 2: Design an Entity Relationship Diagram (ERD) to model the above scenario. Identify the different entities and attributes of each entity. Suggest and justify the choice of relationship and cardinality of the relationship. State the assumptions (if any) made by you to develop the ERD based on your research. Provide detailed analysis and justification for the selection of entities and attributes based on your research. (12 Marks) 3 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM Task 3: Derive a set of relational tables from the ER diagram (Task 2), using appropriate choices for the table attributes. List the integrity rules and business rules, which you would recommend to ensure the quality of data. Indicate all necessary key constraints. Critically analyze the constraints and business rules based on your study of the AIMT. (12 Marks) Task 4: Outline the kinds of anomalies that can arise in the scenario given above by using un-normalized tables. Show how the table created in task 2 could be re-organized into separate tables to avoid anomalies (Decompose the table structures to a set of 3NF tables). (14 Marks) Task 5: As a database administrator identification of specific roles for users, authentication policy, storage management and database recovery are critical. The efficiency and complexity of database administration depends on the identified strategy and tools. Propose and critically review user management, backup/recovery strategy, storage management/techniques formulated for the system discussed in Task 1-3. (12 Marks) Part B Write a research article in IEEE Format describing the solution to the scenario given in Part-A. The research article can be approximately 2500 words. (25 Marks) Present the research article using a poster presentation covering the following aspects of research:      Problem specification, importance of research and research questions   Theoretical framework   Rigor of literature review   Methods or empirical analysis techniques;   Key findings and conclusions; (15 Marks) As a Post Graduate student, you are required to spend time in research and study. Apply the research skills (such as ability to formulate research questions; technical and analytical skills to solve those questions, ability to communicate results) to prepare your article. It is expected that a Post Graduate student demonstrates the research abilities to expand his/her knowledge on 4 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM latest database technology. Importantly, to achieve the above goal, you are expected to learn with much greater independence and need to do a significant background reading on the chosen topic. The template (Microsoft word file) for the article will be made available on the Moodle soon. The date, venue and specifications of the poster presentation will be communicated to you. No marks will be awarded if poster presentation is not done. Guidelines Follow the guidelines mentioned below for your assignment. i. Students are expected to do a critical analysis of the tasks and present their analysis by drawing on relevant theoretical concepts. Marks will be awarded based on the ability of students to undertake the task in a logical manner by drawing on appropriate concepts and theoretical frameworks/literatures. ii. Report should have a Title Page. Title Page should contain the following information. a. Assignment Name b. Student name c. Student ID iii. It should have Table of Contents. iv. Use page numbers. v. Assignment should be typed in your own words using Times New Roman font. vi. Use Diagrams to explain in detail. vii. Use suitable notations in your diagrams. viii. Use appropriate SQL syntax wherever applicable. ix. Copy paste from the Internet is strictly not acceptable. x. References should be included in the last page and literature under pinning is needed at the point of explaining the concept. xi. Attach the evidences (if any). The purpose of assignment is to do some research work so you can consult books in Library or use internet or computer magazines or any other source. We are obliged to establish 5 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM assessment criteria and then mark you upon how well (or otherwise) you meet those criteria. In turn, our assessment of you will be scrutinized by the external examiners, so we must be able to defend the marks we award. We will be far more impressed by a student who demonstrates their active participation, interest and understanding of the module subject matter than by a meticulously presented submission. Plagiarism Policy Please refer to the plagiarism policy in the PG student handbook. Clarification on Late Submission Policy (Dated. Tuesday, May 03, 2016): Students may contact their teachers for clarification on specific details of the submission time if required. The recommended practice at MEC is to set the cutoff time to 23:59 on the due date for all assessment submissions. As per the Assessment Policy at MEC, for any late submissions, a penalty of deduction of 5% of the marks obtained for the resubmitted work will be imposed for each working day following the last date of submission till the date of actual submission. Assessment documents submitted beyond a period of one week after the last date of submission will not be accepted and will be awarded a zero for that assessment. In cases where the submission has been delayed due to extenuating circumstances, the student may be permitted to submit the work without imposing the late submission policy stated above. The extended period of submission will be one week from the original last date of submission. In such cases, the student is expected to submit the supporting certificates on or before the original last date of submission of the assessment and the decision of extension rests with faculty responsible for the assessment .The late submission policy shall be applied if the student fails to submit the work within one week of the original last date of submission. 6 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM Each criteria will be graded as follows: Marks Range 70-100 60-69 50-59 45-49 40-44 0-38 Evidence of research Critical evaluation Overall Shows evidence of extensive investigation of relevant concepts, technologies and issues. Clearly defined argument/ problem definition and source for lucid argumentation. Shows clear evidence of reflective thinking about the issues presents a clear and relevant argument. Substantial originality of innovation and Work of a very high thinking. standard Shows reasonable evidence of reflective Shows evidence of investigation of relevant thinking about the issues with adequate concepts, technologies and issues. evaluation. Demonstration of detailed Presentation of data, arguments and analysis and clear expectations are set decisions in a useful form. Accurate data based on literature. Good logic and and conclusions of the analysis. coherence of argumentation. Work of good quality Reasonable level of investigation. Adequate application of theoretical framework and research methods. Less adequate research into the relevant concepts, technologies and issues. Satisfactory conceptualization of the area of study. Poor research. Inadequate, inaccurate or irrelevant treatment of the task specifications. Poor application of theoretical framework and research methods. Lack of evidence of research or weak report. Adequate evaluation, lacking in depth of reflective thinking with respect to major points. Demonstration of adequate ability to conduct critical analysis. Acceptable And adequate work Work with some merit but at the lower end only just Largely descriptive, with little reflective achieving what is thinking. required. The work is only just Clear signs of understanding, but Acceptable in its present presentation, reflection and analysis are form. poor. No discernible reflection or evaluation. Inability to deal with the chosen The work is deemed research question in a critical manner. weak and inadequate. 7 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM CRITERIA Work Proposal: (Turnitin based Submission) A brief explanation of understanding of deliverables for Part A: (2 Marks) Time schedule to carry out tasks for Part-A (2 Marks) Identification of literature for Part B: (2 Mark) Brief understanding of topic for Part-B (2 Marks) Time schedule/Plan for Part B: (2 Marks); Part A: (Turnitin based Submission): Task 2: Extent of clarity in evaluating the role of conceptual modeling in the development of database systems and apply the entity-relationship modeling approach to a realistic scenario (a) 8 entities with attributes including justification (8M) (b) Justification of choice of relationship and cardinalities (4M) Task 3: Ability to apply the essential concepts of relational databases to sample data sets and demonstrate best practice in the development of an appropriate and effective database system. (a) Formation of 8 tables with PKs and FKs (8M) (b) Critical analysis of constraints and business rules (4M) Task 4: (a) Outline the 3 anomalies with appropriate examples(3*3=9M) (b) Normalization and normal forms (5M) Task 5: Ability to review (a) User management (4M) (b) Backup/recovery strategy (4M) (c) Storage management (4M) Part B: Research article: (Turnitin based Submission) (a) Quality, originality and relevance of research article (5M) (b) Evidence of independent research and critical thinking (3M) (c) Depth of understanding of problem context (3M) (d) Literature review (3M) (e) Concise objectives of research problem (3M) (f) Research methodology (3M); (g) IEEE format (5M) Part B: Poster presentation: (a) Contents: Innovative / Creative (5M) (b) Design: Organization, compliance with documentation, grammar and spelling (5M) (c) Presentation: Presentation skills and Q&A (5M) Maximum Marks Marks Obtained 10 12 12 14 12 25 15 8 PG-DSA-ECM38IS-Sprg-17-R-CW2-PMM Student's Name: ID Marks Awarded for Part A: Marks Awarded for Part B: Marks obtained out of 100: Penalty (if any): Marks Obtained out of 100 (after deducting penalty) Marks Obtained out of 70: Name of the Assessor (Instructor) Signature of the Assessor Comments: Module Title: Module Leader/ Instructor: Semester: Programme: Database Systems and Administration (ECM38IS) Dr. Syed Zakir Ali / Dr. C. Jayakumari Spring 2017 MBA(IT) 9 ...
Purchase answer to see full attachment

Tutor Answer

School: UIUC



Part B: The Scholarly Article
Solving Insertion Anomalies in Data Base Management
Name of the author
The university department, the university name
The Location of the university including the address
The email of the author


Abstract-This article comprises of various methods and ways
by which an institution can solve the problem of insertion anomalies .This is a case whereby an
institution experiences difficulties when adding data in a database. The difficulties are
experienced due to absence of other data in a database. In the case whereby an institution hires
new assistant head of departments, there will be null values in the database if the new employee
are not directly assigned to the key entities in the database. These employees cannot be located in
the database and therefore this will result to inconsistencies in the database due to omission.
Therefore the main purpose of this article is to identify the process of solving the insertion
anomaly in an institution which in my case it is going to be Aaliya Institute of Management and
Technology. The process of avoiding or solving anomalies is referred to as normalization. In the
normalization process, the various relations in the institution will be split into well structured
relation that will enable the users to insert the tuples without causing any inconsistencies in the
database. From the article, one will be able to identify the various examples of anomalies that
occur in databases and the possible causes of these anomalies. Database administrators will also
be able to identify the process of normalization and safeguarding the data in an organization.
From the research on the anomalies and the normalization process, the article will conclude on
what’s the importance of these activities on institutions and the database administrators.
Keywords-relational database, database management
system, primary key, foreign key, structured Query Language and NoSQL


This article is a report of the assignment from my spring 2017.It portrays my
ability of research experience as a post graduate student. My mentor from the department
of database systems and administration directed my effort on this project by explaining to
me what is expected of me and by directing me to the library where I would get the
research materials. Anomalies are experienced in various database systems and therefore
as of late, many organizations have opted to research on the methods to avoid the
anomalies.Anomalies are inconsistence that exists between two parts of data. For
example in our case, there is a database that exists which contains information about the
heads of departments in every department. Therefore when the institution employs new
assistants, their database will not be available in the existing database. This will therefore
result to inconsistency in the database. The article therefore presents the set criteria for
coping with this inconsistency that comes up in the organization due to addition of
another group of employees.
Meaning of the key terms in database management
1. Relational Database- this is a set of database that
utilizes the relational model. The data in the relational model is arranged in tuples and
then the tuples are further divided into relations.
2. Database management systems-this is a software
system whose task is to help in organizing the housed data into specific database
3. Primary key-this might be a single attribute or a
combination of attributes that are used in identification of the unique row of data in a
particular given table

4.foreign key- these are single attributes or multiple
attributes that come from a common relational table whose values must be the same with
one another relational table’s primary key.

[1]A. Bhatia and V. Bansal, Database Management System, 1st ed. Oxford: Alpha
Science Internat, 2015.
The author of this book informs of the process of normalization in order to reduce the
chances of anomalies occurring in a given database. The author illustrates the various
complications that should be eliminated or added in a particular database in order to reduce the
chance of the anomalies occurring. The author begins by indicating the various rules that should
be considered when carrying out the process of normalization. These rules are;

One should make sure to eliminate the groups that

are repeating themselves and then create other tables for a set or related attributes and
then to ensure after doing all this, one should give each table a primary entity or key that
will be used to identify it. The main reason for considering this rule is to ensure that the
conditions of a database are fulfilled.

The other rule is to make sure to eliminate the

redundant data in a database. Considering this rule, the aut5hor states that an attribute that
depends only on a multi-valued key should be removed and placed in a different table.
The attributes are separated depending on the both parts of the key entities.

The third rule to successive normalization is to

eliminate the columns that are not dependent on the key. This should be followed by the
removal of the attributes that do not have any contribution to a description of the key.

The fourth rule is to put the multiple relationshi...

flag Report DMCA

Top quality work from this guy! I'll be back!

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors