Describe the purpose of the database

Assignment Help Management Information Sys
Reference no: EM131345164 , Length: 3

Assignment : Business Rules and Data Models

Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.
Use the internet to research the types of information that a college would want to track in a database. Focus your attention on information that could represent entities within a database as well as attributes of such entities.

Write a two to three (2-3) page paper in which you:

1. Describe the purpose of the database.

2. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.

3. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the business rules that could impact the structure of the database.

4. Determine the information that the conceptual model of the database would include and determine the information that the physical model of the database would include.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131345164

Questions Cloud

Plot the waveform of each sinusoid : Plot the waveform of each sinusoid in Problem 1 by hand.- Use Multisim to produce the waveform in Problem 1(a).- Use MATLAB to produce the waveform in Problem 1(b).
Describe the methods to mitigate the vulnerabilities : Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. Describe the methods to mitigate the vulnerabilities, as they relate to the seven domains.
What type of environment do you do your best writing : In what type of environment do you do your best writing - How would you characterize your writing? Has it been better? Has it been worse and Do you write better at night or in the morning?
Determine the stackelberg equilibrium : Determine the Stackelberg equilibrium with one leader firm and two follower firms if the market demand curve is linear and each firm faces a constant marginal cost, m, and no fixed cost. (Hint: See Appendix 13B for the Stackelberg model with one f..
Describe the purpose of the database : Describe the purpose of the database.Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.Based on your research and / or com..
What makes zipcar an attractive employer for which to work : What makes Zipcar an attractive employer for which to work? What do those doing the actual hiring at Zipcar feel are important characteristics to find in potential employees?
Identify chosen organization significant it challenges : From the e-Activity, identify your chosen organization's significant IT challenges, the Windows Server 2012 edition it chose to meet these challenges, and the most significant operational benefits it derived from this choice
Compare two different juvenile justice programs : Compare two different juvenile justice programs currently being implemented in large cities and rural towns - Provide details on the goals for each program.
Explain the reasoning in the prisoners’ dilemma : Show the payoff matrix and explain the reasoning in the prisoners' dilemma example where Larry and Duncan, possible criminals, will get one year in prison if neither talks; if one talks, one goes free and the other gets five years; and if both tal..

Reviews

Write a Review

Management Information Sys Questions & Answers

  General computer system securityhow do the characteristics

general computer system securityhow do the characteristics of a general computer system hardware components and

  Describe what hacking of memory or hacking of ram

Write two to three(3) page paper in which you: Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  Important information about technology questionshow has

important information about technology questionshow has technology impacted the workplace? how has technology impacted

  Predicting kilowatt usage- economicsinformation systemthe

predicting kilowatt usage- economicsinformation systemthe company has determined kilowatt-hours used for last year and

  Design of user interfaces - systems analysis and design

Discuss the design of user interfaces is of critical importance in systems analysis and design

  How improve global cooperation to respond to cybersecurity

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. Af..

  How will it affect health care in terms of cost

How will it affect health care in terms of cost and How will the law affect health care in terms of quality

  A patient information system for mental health care

Read the case study titled "A Patient Information System for Mental Health Care". Develop an overall architecture for the system described in the assigned reading

  How does technology improve individuals identity management

How has technology increased contact among people who are similar? How has technology increased contact among people who are different? How does technology strengthen communication within diasporic groups?

  Addresses why the smartphone is attractive

This post addresses why the Smartphone is attractive and describe the condition that makes it attractive.

  Principle of communication studies

Create a paper that, in some way, demonstrates your acquired knowledge of a core principle of communication studies - Issues within interpersonal communication.

  Create a single page web application

Create a single page web application that starts by initializing all eh customers. The page should present a menu that allows the user to view all customers,  search for a customer based on name, phone or email, add a customer or  delete a custome..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd