Data management and business intelligence

Assignment Help Basic Computer Science
Reference no: EM13909729

You have been hired as a consultant for a small retail company that sells widgetsonline. The company is interested in learning how to use their data to improve theirbusiness. They have asked you to write a business case (search term business casetemplate) to explain the justification for implementing a database management systemto improve business intelligence within the company.Within your business case, begin by explaining business intelligence. Then explain data management and how a database management system can facilitate businessintelligence. You should also explain the benefits that the company will experience withthe system.Next, consider the design of the system. Begin by describing the data entities, attributesand keys. For instance, a data entity may be Customer. Attributes of customer mayinclude name and address. The key may be a uniquely assigned customer number. Youshould have at least five data entities in your database. Create an entity-relationshipdiagram showing the relationship between the entities (YouTube search term: entityrelationship diagram tutorial). Create a relational database model to describe the data(YouTube search term: relational database model). References should be included Case Study: Database Development

Due Week 8 and worth 90 points

Read the following articles available in the ACM Digital Library:

Dual Assessment of Data Quality in Customer Databases,Journal of Data and Information Quality (JDIQ), Volume 1 Issue 3, December 2009, Adir Even, G. Shankaranarayanan.

Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. Paige.

o    Click STUDENT SERVICES >> Learning ResourcesCenter>> Databases

o    Scroll down to "Information Systems/Computing"

o    The ACM Digital Library is located below the heading " Information Systems/Computing"

Write a two to three (2-3) page paper in which you:

1.Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.

2.Recommend the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

3.Suggest three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.

4.From the software development methodologies described in the article titled, "Process-centered Review of Object Oriented

Software Development Methodologies," complete the following.

1.Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

2.Analyze how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

Reference no: EM13909729

Questions Cloud

Database driven web application : The project is to design, create, evaluate and present/defend a database driven PHP web site, to demonstrate what you have learnt from the module topics.
Prove the given theorem using one-sided chebyshev inequality : For all zero-mean rv s X with variance σ 2 other than the special case in (a), show that Pr{X ≥ σ } 0.5.Hint: Use the one-sided Chebyshev inequality of Exercise 1.32.
The following flowchart shows the august production : The following flowchart shows the August production activity of the Spalding Company.
Test the raw milk coming from provider : In schedule you must test the raw milk coming from provider B this incoming week. Your intention is to test the quality of the raw milk. Part of the company standard is to reject raw milk with total bacterial counts over 6 x 104 CFU/ml.
Data management and business intelligence : (search term business casetemplate) to explain the justification for implementing a database management systemto improve business intelligence within the company.Within your business case, begin by explaining business intelligence. Then explain data ..
What is the average return on the stock market : What is the average annual (historic) return on the hedge fund? Note the returns are reported monthly. Multiply by 12 to annual returns. Need to answer with annual returns. Answer should go to 1 place behind decimal (ie: 10% expressed as 10.0)
Concentration of a low-molecular weight solute : What do you think would happen if you were to repeat the experiment but, this time, you were to carry out the lysozyme treatment in a buffered solution containing a high concentration of a low-molecular weight solute, such as sugar or salt?
The following partially completed process cost summary : The following partially completed process cost summary describes the July production activities of Ashad Company.
What is jlj leverage ratio : JJ's Finance Emporium most recent financial statements showed net income of $3.33 per share and the ROE of JJ's was 20%. The dividend payout ratio was 40%. Find the growth rate (g) of JJ's.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Derive the simplest product-of-sums expression

Derive the simplest product-of-sums expression for the function f(x1,x2,x3,x4)= (x1'+x3'+x4')(x2'+x3'+x4)(x1+x2'+x3') HINT: use consensus property.

  Memory explain the allocation of memory cells when a

explain the allocation of memory cells when a function is called. what is stored in the function data area for an input

  Create a japplet that contains a jlabel and jbutton.

Create a JApplet that contains a JLabel and JButton. You'll create a JButton that will automatically change font typeface, style, and size when clicked by the user. Change the font typeface, style, and size on the JLabel.

  Hardware requirements for implementing windows server

You were hired as a consultant to analyze an existing Windows Server environment in a utilizing Windows Server 2003 and 2008.

  Use this information to find a tighter bound on p

If X is a non-negative random variable with E(X) = ?, then Markov's inequality tells us that for every a, P(X ? a) ? ?/a. As we saw in class, this bound is sometimes very loose. In this problem we'll look at a situation in which extra information ..

  Discuss the benefits of traditional linux file permissions

Discuss the benefits of the traditional Linux file permissions scheme. How might it be superior to permission methodologies employed in other operating systems and what are the differences in overall approach to permissions, privilege, and securit..

  What the next state of the machine should be as a function

what the next state of the machine should be as a function of the current state. then produce a combinational circuit using gates and D-flipflops that implements this state machine. label the least and most significant bit.

  Analyze issues drawn from the reading for the module

Prepare and submit a number of short papers assigned by the instructor. These auditing examples are an opportunity for you to analyze issues drawn from the reading for the module. Your written analysis will be approximately two to three pages in leng..

  Write a program to create a customer''s bill for a company

Write a program to create a customer's bill for a company. The company sells five computer gadgets which are CD, keyboard, printer, pen drive and speaker.

  Create a home page with navigation bar

Create a home page with navigation bar

  Compute number of total bits needed to implement cache

Suppose a computer's address size is K bits (using byte addressing), the cache size is k bits (using byte addressing), the cache size is S bytes. Compute the number of total bits needed to implement the cache.

  Comparing accuracies using test options

Compare the accuracies obtained using the three "test options": "Use training set", "cross-validation" and "percentage split".

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd