Security plan for the database

Assignment Help Database Management System
Reference no: EM13810952

This project will help you apply all the concepts covered in this course for a given scenario. Vince Roberts runs a vintage record shop in the University district. His shop sells 45s, LPs and old 76 RPM records. Most of his stock is used. He buys used vinyl from customers or finds them at yard sales and discount stores. He does sell some new albums that are released on vinyl. So far, he has kept most of his inventory either in his head or in a spiral notebook he keeps behind the sale counter. But his inventory and his business have grown to where that is far from sufficient.

In this project, you will review the information given in the scenario and based on that information, create the following documents pertaining to the scenario:

Statement of Work (SOW)

Business requirements and rules

ERD

Security plan for the database

Vince Roberts runs a vintage record shop in the University district. His shop sells 45s, LPs, and old 76 RPM records. Most of his stock is used. He buys used vinyl from customers or finds them at yard sales and discount stores. Vince records the conditions of the vinyl and covers when he buys. Purchases are rated mint, good, fair or poor, depending on their condition. Vince doesn't buy poor-quality albums unless they are rare. Records that Vince doesn't want to buy can be left behind in the shop to go in the 5/$1 bin. He does sell some new albums that are released on vinyl.

Most customers get discounts on their purchases. Until now, Vince has kept most of his inventory either in his head or in a spiral notebook he keeps behind the sale counter. But his inventory and his business have grown to where that is far from sufficient.

Vince is looking for someone to build him a database that will track the extent and condition of his album inventory. He wants to keep better track of all purchases of albums and their sales. He also wants to determine the value of his inventory. The database Vince wants should be able to track, where, from whom, and for how much he purchased his stock. Vince also needs to track his sales. He is often not sure how much money he has spent and how much he has made.

In addition, Vince would like to allow his customers to make special requests and notify them when their request item comes in. The database should be able to track customer requests. The database will provide reports on total purchases and total costs for various periods of time. It will also generate an email list for notifying customers of new sales, new albums of interest, and other promotions.

Currently, Vince works alone but he is planning to hire few people to help him out with in his shop. Vince has very few security concerns for his database. However, he feels that if he starts collecting customer information, that data should be secured.

Vince doesn't have complex records but here are a few samples:

Album Purchases

Date

5/14/2009

 

 

 

 

Seller Name

Seller Phone

Album

Notes

Condition

Paid

John Raymond

206.555.2352

Rubber Soul

Amer. Not British. 2nd edition, good Sleeve

fair

4

Marylin Taylor

206.555.0945

Led Zeppelin IV

Not orig. Sleeve damaged, vinyl good

good

4.75

Jennifer Louis

206.555.4545

Gift of the flower to the Garden

Rare Donovan, box set, box cond poor, but vinyl excellent

excellent

12.25

Laura Hall

206.555.2080

Dark Side of the Moon

 

good

4.45

Album Sales

Date

5/12/2009

 

 

 

Customer

Album

Price ($)

Tax ($)

Total ($)

John Larson

Dylan, Blond on Blond

19.95

1.65

21.60

Tabitha Snyder

 

America

5.95

 

 

Joni Mitchell, Blue

6.25

 

 

Joan Baez, Ballads

4.20

1.36

17.76

Brad Johnson

McCartney, Venus and Mars

5.00

0.42

5.42

Maureen Carlson

Decemberists, The Crane Wife

15.50

 

 

Muddy Waters

7.75

1.9

25.18

Reference no: EM13810952

Questions Cloud

Consultant for university that wants to leverage social : Scenario: Imagine that you have been hired as a consultant for a university that wants to leverage social media and networking technologies to encourage the collaboration of students, and improve their overall sense of community.
How can the human genome be used to eradicate disease : How can the human genome be used to eradicate disease
Analyze at least three of the agency''s policies : Analyze at least three of the agency's policies, procedures, and / or plans regarding privatization. Title this section The Agency and Privatization
What angle should the second rock be thrown : What angle should the second rock be thrown to arrive at the same point as the first? How many seconds later should the second rock be thrown, after the first was thrown, to arrive at the same time?
Security plan for the database : This project will help you apply all the concepts covered in this course for a given scenario. Vince Roberts runs a vintage record shop in the University district. Security plan for the database
Purpose for foreign investment regulations : What is the purpose for foreign investment regulations? List and discuss the foreign investment regulations.
An entrepreneurial mindset is : An entrepreneurial mindset is
Summary of the following reading about international moneta : Summary of the following reading about  International Monetary Fund's Board of Governors In good times and in bad, the world is interconnected. Upticks in European markets affect traders in North America. Downturns on one side of the globe are felt w..
Find the velocity of the bomb when it hits the water : Find the velocity of the bomb when it hits the water - what is the deceleration of the bomb and what is the average force of impact?

Reviews

Write a Review

Database Management System Questions & Answers

  Create and input the design of the table

When building a database, you should first create and input the design of the table and reports at the same time. determine the input and then design the tables

  In a database the primary key field is used to

In a database, the primary key field is used to

  Explaining views for protecting access by unauthorized users

Why do you believe that views by themselves are insufficient for protecting access by unauthorized users?

  Relational databases are more efficient and effective

Describe why relational databases are more efficient AND effective for data management in organizations. How does the task of data normalization help to achieve these goals?

  Prepare a dfd and context diagram for the system

Journal entries have to be reconciled with the spreadsheet on a daily basis - Prepare a context diagram for the system and also prepare a diagram 0 DFD for the system

  Create the table for the relation training courses

An ER diagram for the system. Show all entities, relationships, cardinalities and optionalities. Also, include all intersection entities. You must use the Finkelstein methodology as per the study book and tutorials.

  Create an er diagram that will facilitate development of cms

For this phase, you are required to create an ER Diagram that will facilitate the development of CMS's company-wide database.It should be created using ER Assistant and include entities and attributes, relationships, and accompanying notes

  Different users and implement their permissions using sql

Create at least two different users and implement their permissions using SQL statements. Create a matrix to indicate the permissions (read, insert, delete, modify) you would grant to different users of your database

  Show the count of the class after deleting

Will insert any first name, last name, ID, GPA, and phone number, in the proper location in the list sorted alphabetically by last name.  After insertion, you should show the count of the class.  Then print the list after you insert.

  Create an update query to select all records in the tbl over

Create an update query to select all records in the tblOverPriced, decrease the Price field values by 10%, run and close the query.

  Create a crow''s foot erd using a specialization hierarchy

Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Tiny Hospital keeps information on patients and hospital rooms

  List all the functional dependencies present in the relation

You must implement the entity relationship model provided in the model solution to Assignment 1. The model solution will be released on the course website approximately TWO (2) weeks after the Assignment 1 due date.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd