Describe the purpose of the database

Assignment Help Management Information Sys
Reference no: EM131345164 , Length: 3

Assignment : Business Rules and Data Models

Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.
Use the internet to research the types of information that a college would want to track in a database. Focus your attention on information that could represent entities within a database as well as attributes of such entities.

Write a two to three (2-3) page paper in which you:

1. Describe the purpose of the database.

2. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.

3. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the business rules that could impact the structure of the database.

4. Determine the information that the conceptual model of the database would include and determine the information that the physical model of the database would include.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131345164

Questions Cloud

Plot the waveform of each sinusoid : Plot the waveform of each sinusoid in Problem 1 by hand.- Use Multisim to produce the waveform in Problem 1(a).- Use MATLAB to produce the waveform in Problem 1(b).
Describe the methods to mitigate the vulnerabilities : Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. Describe the methods to mitigate the vulnerabilities, as they relate to the seven domains.
What type of environment do you do your best writing : In what type of environment do you do your best writing - How would you characterize your writing? Has it been better? Has it been worse and Do you write better at night or in the morning?
Determine the stackelberg equilibrium : Determine the Stackelberg equilibrium with one leader firm and two follower firms if the market demand curve is linear and each firm faces a constant marginal cost, m, and no fixed cost. (Hint: See Appendix 13B for the Stackelberg model with one f..
Describe the purpose of the database : Describe the purpose of the database.Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.Based on your research and / or com..
What makes zipcar an attractive employer for which to work : What makes Zipcar an attractive employer for which to work? What do those doing the actual hiring at Zipcar feel are important characteristics to find in potential employees?
Identify chosen organization significant it challenges : From the e-Activity, identify your chosen organization's significant IT challenges, the Windows Server 2012 edition it chose to meet these challenges, and the most significant operational benefits it derived from this choice
Compare two different juvenile justice programs : Compare two different juvenile justice programs currently being implemented in large cities and rural towns - Provide details on the goals for each program.
Explain the reasoning in the prisoners’ dilemma : Show the payoff matrix and explain the reasoning in the prisoners' dilemma example where Larry and Duncan, possible criminals, will get one year in prison if neither talks; if one talks, one goes free and the other gets five years; and if both tal..

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  What is the efficiency of the assembly line

Draw the precedence diagram and assign tasks using five workstations. - What is the efficiency of the assembly line, using your answer to (a)?

  Provide a history of its use as a weapon of mass destruction

Select one of the four primary categories of terrorist hazards (Chemical, Biological, Radiological/Nuclear, Explosives). Provide a history of its use as a weapon of mass destruction (WMD); describe how it is made and dispersed, signs and symptoms ..

  How firms can use social it

Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy

  Social networking technologies

Social Networking Technologies: Accurately respond to and plan for the specific needs of an MIS project

  Describe two sdlc methodologies and compare contrast them

Describe any two SDLC methodologies and compare contrast them. Devote 2 pages for each of the methodologies and one page to compare and contrast them.

  Supply chain expert explainsexplain why sales and

supply chain expert explainsexplain why sales and operations planning should transcend company boundaries.cite examples

  Multinational organization from a global organization

Transnational and Multinational Organizations - This solution explains how you would differentiate a transnational or multinational organization from a global organization.

  Developing global information systems

Developing Global Information Systems - challenges a company faces when developing global information systems

  Analyze porters five forces model

Analyze Porter's Five Forces Model in relation to competition within the industry of That corporation

  Discussion of the information used in the system

A discussion of any information security and ethical concerns with the system, A diagram of the information flow and any elements controlling proper access to the information it uses, A description of any proposed business process changes for the sys..

  Identify existing automation systems

Design services (Define message schema types, develop an abstract service interface, apply principles of service-orientation, standardize and refine the service interface, extend the service design, and finally identify other services)

  Benchmarking of internal versus external service processes

benchmarking of internal versus external service processes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd