Description
For this assignment, you will continue to work with the scenario you began in Chapters 1-7. Reread the information from each of these assignments at the end of each chapter. (Again, the “Westlake Research Hospital” scenario will act as an example throughout this course.)
Instructions:
- Reread your selected scenario at the end of all previous chapters.
- Read your scenario for Chapter 7 on page 175 to 177.
- Review the “Deliverables” section below.
- Review the “Suggestions for Scenarios” section on page 177 of your textbook for important details and ideas to assist you with your deliverables.
- Read the “Westlake Research Hospital” scenario on page 18, pages 41-45, page 61, page 80, page 101, page 124, pages 155-156, and page 176. Click here to review the suggested answer for this scenario to gain an understanding of what is expected of you on this assignment.
- When you have completed all of the deliverables, compress the files together into a single .zip file for upload. Contact your instructor if you have any questions.
Deliverables:
1. Complete the numbered tasks in the “To Do” section for your scenario. The table below shows where you can find each list of tasks:
Page 176 Vinces Vinyl
Explanation & Answer
Hello buddy, i have finished the assignent. Thank you for giving me that opportunty to work with you.
Unit VIII Project
1. Create tables of the data access needs of your users.
ADMIN
Table Name
SELECT
INSERT
UPDATE
DELETE
CONSTRAINTS
Album
Inventory
Purchases
Transactions
Sales
Requests
Customers
Album
Inventory
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
EMPLOYEES
Table Name
SELECT
INSERT
UPDATE
Album
Inventory
Purchases
Transactions
Sales
Requests
Customers
X
X
X
X
X
X
X
X
X
DELETE
CONSTRAINTS
Only date and time
X
CUSTOMERS
Table Name
Album
Inventory
Purchases
Transactions
Sales
Requests
Customers
SELECT
X
INSERT
X
UPDATE
X
DELETE
CONSTRAINTS
N/A
N/A
N/A
N/A
N/A
N/A
N/A
2. Create a security plan that includes authentication and authorization and general policies and
procedures. Consider the use of roles, stored procedures, views, and other tools.
Vince’s Vinyl will have a very simple but effective security plan. There will be an offsite server
which will only be accessible by admins and the owner. This server will store all the shop’s
information. Every day’s data will be back up in that d...