Explain the key principles of data security

Assignment Help Database Management System
Reference no: EM131295271

Assignment : SQL Concepts and Database Design

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

Imagine that you work for a finance industry-based organization. Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance. You have been assigned to assist in preparing the documentation of the organization's sales database. You are asked to propose a data dictionary that can be used to document the following:

Employee (EmpNumber, EmpFirstName, EmpLastName, CommissionRate, YrlySalary, DepartmentID, JobID)

Invoice (InvNumber, InvDate, EmpNumber, InvAmount, CustomerID)

InvoiceLine (InvLineNumber, InvNumber, ProductNumber, Quantity)

Product (ProductNumber, ProductDescription, ProductCost)

Department (DepartmentID, DepartmentDescription)

Job (JobID, JobDescription)

Customer (CustomerID, CustomerName, CustomerAddress, CustomerPhone)

Write a three to four (3-4) page paper in which you:

Create a data dictionary that includes the following:

A description of the content for each field

The data type of each field

The format the data will be stored as in the field

The range of value for the field

A label, as required, if the attribute is a primary key or foreign key

Note: An example is shown in Table 7.3 in chapter 7 of the textbook.

Imagine that you are asked to identify the number of days that exist between the first invoice and last invoice for each month and complete the following:

Construct a query that will show the number of days that exist between the first invoice and last invoice, for each month, for each employee, using the DATEDIFF function. Be sure to provide the SQL script that will carry out this function.

Construct a query to show the expected payment date if invoices are due within 30 days of transaction.

Construct a query that will show distinct area codes of the customers.

Create a plan of the necessary activities that would be required to implement a valid database design process by including the following:

Steps in the conceptual design stage

Steps in DBMS selection stage

Steps in logical design stage

Steps in physical design stage

Task details of each activity within each stage

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Design a relational database so that it is at least in 3NF.

Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.

Explain the key principles of data security and identify data security risk and violations in data management system design.

Use technology and information resources to research issues in the strategic implications and management of database systems.

Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions.

Reference no: EM131295271

Questions Cloud

Tangible assets include land-equipment and goodwill : The collection of an account receivable is an asset source transaction. Tangible assets include land, equipment, and goodwill. The term used to recognize expense for property, plant, and equipment assets is depletion.
Background materials these include mortenson : For this assignment take a close look at the four required articles from the background materials these include Mortenson (2014), Cialdini (2001), Conger (1998), and Fracaro (2002). Pay close attention to what you perceive as the usefulness of the..
Internal controls will eliminate employee theft : A well-designed system of internal controls will eliminate employee theft and fraud in a company. Requiring separation of duties in a business allows the work of one employee to serve as a check on the work of other employees. Before a business check..
How the ungrounded voltage source vref supply ground current : If RPOS and RNEG are not equal, a current iG must flow into or out of ground. How does the ungrounded voltage source VREF supply this ground current?
Explain the key principles of data security : Explain the key principles of data security and identify data security risk and violations in data management system design.Use technology and information resources to research issues in the strategic implications and management of database systems.
Miscommunications that turn out to be very problematic : In retrospect, was there something that you could or should have been done differently? Why do we sometimes run into these miscommunications that turn out to be very problematic?
Cost is different for identical items of inventory : One of the disadvantages of the specific identification inventory cost flow method is that it can allow managers of a business to manipulate the amount of income the business reports by choosing which item to sell if the cost is different for identic..
Develop your writing skills which are very important : Each student is required to submit a project. This is not a group assignment. The goal of this project is to apply the concepts you learn in this course to real-life situations. The project should also help you develop your writing skills which ar..
Write a prototype program to perform simple statics : Your software company has been contracted to write a prototype program to perform simple statistical evaluations of integer data. Your program needs to implement the following functions given below.You will also need to provide a main program to ex..

Reviews

Write a Review

Database Management System Questions & Answers

  What is issue when working with a many-to-many relationship

What are some issues when working with a many-to-many relationship. Provide some examples.

  Explain how queries are processed by the oracle dbms

Explain how queries are processed by the Oracle DBMS and Explain how transactions are processed by the Oracle DBMS

  Drawing entities and relationship using crow-s foot notation

These following questions require to you to create entities and their relationship using the Crow's Foot notation suitably.

  Design an entity relationship diagram

Design an Entity-Relationship diagram for the auction database and enter the design using a data-modeling tool such as ERWin.

  Create data file grades with records of the form

Input names of students from the user, terminated by ZZZ, and create a data file GRADES with records of the form.

  Database design in mysql with column names of client

The instrutions are given below: MySQL Server and MySQL Workbench. In this schema, create all the necessary tables, columns, and relationships to complete your database.

  Draw the relationships between the tables

Draw the relationships between the tables. Assume that a DEPARTMENT does not need to have an EMPLOYEE, but that every EMPLOYEE is assigned to a DEPARTMENT.

  Analyze the data in at least three different ways

Analyze the data in at least three different ways. Each form of Data Analysis should be provided on a separate, appropriately labeled worksheet. It is expected that each sheet will be professionally formatted and clearly documented with titles, co..

  Explain the need for key restructuring

Give at least three reasons why ETL functions are most challenging in a data warehouse environment.

  Why it is important to use white box testing technique

Using IEEE and ACM Database, research on why it is important to use WHITE BOX AND BLACK BOX testing technique to evaluate a software module.

  Sort ascending by consultant id and date opened

Sort ascending by consultant ID and Date Opened. Don't show tickets with category ID of 0. HINT: You will require to use SELECT query with an alias in builder for the column.

  Implementation of information gathering component

Based on the pseudocode developed in Subtask 1.1, you are to implement the Information Gathering Component in this task.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd