Individual: Database Design and ERD Creation

dbm 380

Question Description

The following assignment is based on the database environment proposed in the Week One Individual Assignment.

Perform a logical design on the proposed database environment without going through the full normalization process. Include the identification of all entities and attributes associated with the environment.

Create a 1-page memo to document your logical design including the process you went through.

Discuss the process you went through to select the appropriate data types, primary and foreign keys, and other constraints that are necessary to maintain the integrity of the database.

Create a detailed Entity Relationship Diagram (ERD) using the data specifications from the logical design. Use Microsoft® Visio®, Lucidchart, or another software tool of your choice to create this diagram.

Submit your assignment to the Assignment Files tab.

Unformatted Attachment Preview

Running head: DATABASE ENVIRONMENT MEMO Database Environment Memo James Barrett DBM/380 June 11, 2018 Professor Mirajkar Sridhar 1 DATABASE ENVIRONMENT MEMO 2 Database Environment Memo TO: Managing Director FROM: IT department DATE: June 11, 2018 SUBJECT: Database Environment Analyses of the database environment AZ enterprises operate with an information system that allows safekeeping of data as well as quick retrieval. The firm has 32 staff members who get to access the system. The system is supported by a MySQL database environment that hosted in a small server stored in a separate and secured room. As the business requirements increased, the firm realized the need to have a database admin to enable secure and specialized management. The DBA will have several important roles to play which would include; installation of the new more massive capacity server that would sufficiently and reliable get utilized from all computers in the firm. DBA will also ensure control and data access rights in efforts to enhance the system security. Permissions include read, write or both (Bulumulla et al., 2014). The write access was only given to those with high concern and trusted due to their authority levels and task. The other staff is allowed read permissions and restricted write permission to a small portion of data. For instance, the human resource department is given write allowance only in the case of employee’s data. Problems and constraints DATABASE ENVIRONMENT MEMO 2 The database environment has several challenges connected to it. First, there are compatibility issues experienced with the operating system not connecting with the database. Currently, 90% of the computers operating on Windows 8 are not connecting to the database (Coronel & Morris, 2016). However, older Microsoft versions in the rest of 10% of the machines have no issues. Therefore, this means that there is need to reinstall the machines with Windows XP or Windows 7 operating systems. Additionally, the database has no good sorting method hence challenging to obtain related data from it. The database limited regarding space. Objectives of the database environment The aim of the firm’s database is the provision of fast access, adequate storage and a high degree of reliability to ensure that the firm's operations do not come to a halt (Coronel & Morris, 2016). It aims at development and maintenance of friendly database environment that allows users access on a 24/7 basis. Scope and boundaries The database scope sets to offer remedies to the growing data requirements in addition to ensuring that database boundaries are supportive of all systems connecting to it from the organization (Groomer & Murthy, 2018). Thus, the memory constraint must be addressed together with compatibility and access constraints. Data specifications Entity Lists of Attributes DATABASE ENVIRONMENT MEMO Employee - Employee ID, Firstname, Lastname, Department Name, Address Department - Department name, department code Product - Product ID, Product name, Product price 2 DATABASE ENVIRONMENT MEMO 2 References Bulumulla, I. U., Cinarkaya, B., Sebata-Dempster, Y., Sheth, T., Warshavsky, A., & Zotter, B. (2014). System, method and computer program product for performing one or more actions based on a determined access permissions for a plurality of users U.S. Patent No. 8,925,041. Washington, DC: U.S. Patent and Trademark Office. Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management. Cengage Learning. Groomer, S. M., & Murthy, U. S. (2018). Continuous auditing of database applications: An embedded audit module approach. In Continuous Auditing: Theory and Application (pp. 105-124). Emerald Publishing Limited. ...
Purchase answer to see full attachment

Final Answer

Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any pr...

Robert__F (44631)
University of Maryland

Top quality work from this tutor! I’ll be back!

Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Thank you! Reasonably priced given the quality

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors