Explain what do business rules require to be effective

Assignment Help Database Management System
Reference no: EM13303885

IT 645 - Database Management Systems

You can use any source you prefer, the text, Internet, etc. The answers should not take more than 1 - 2 paragraphs of text, please submit a word processing document, please make sure it's compatible with MS Word. This is an INDIVIDUAL effort, I want each student to complete the questions on their own, you cannot solicit help, nor can you collaborate on the answers. ANY RECOGNIZED SHARED ANSWER WILL MERIT A -0- FOR ALL PARTIES INVOLVED.

1. What are the advantages of having the DBMS between the end user's applications and the database?

2. What are some reasons for studying file systems?

3. Describe the five types of users identified in a database system.

4. What components should an implementation-ready data model contain?

5. What do business rules require to be effective?

6. Describe a conceptual model and its advantages. What is the most widely used conceptual model?

7. What are the characteristics of a relational table?

8. Describe the use of nulls in a database.

9. What is the system catalog?

10. Explain the difference between simple and composite attributes. Provide at least one example of each.

11. Explain multivalued attributes, and provide an example. How are multivalued attributes indicated in the Chen model? How are they indicated in the Crow's Foot model?

12. What is a ternary relationship? Provide some example business rules that specify the need for a ternary or higher-order relationship.

13. Describe specialization and generalization.

14. Explain the "no change over time" characteristic of a good primary key.

15. In what two cases are composite primary keys particularly useful?

16. Explain normalization and its different forms.

17. Describe a dependency diagram and explain its purpose.

18. What steps are involved in the conversion to third normal form?

19. What is a schema? How many schemas can be used in one database?

20. What is a subquery? When is it used? Does the RDBMS deal with subqueries any differently from normal queries?

Reference no: EM13303885

Questions Cloud

Determine how far are you from the lightning stroke : Suppose that you hear a clap of thunder 15.5 s after seeing the associated lightning stroke. How far are you from the lightning stroke
Explain we have to make a project in java : We have to make a project in java . This is a small deskstop application no specifications given so far . The CD store has CD games and music we can rent a cd or we can buy . This is all we need to develop.
Calculate the moment of inertia of the hand : The length of an individual's forearm and hand is 30.0 cm and the mass of an individual's hand and forearm is 1.50 kg. Calculate the moment of inertia of the hand and forearm about a mediolateral axis through their combined COM
How old will frank be when she returns : Frank and Mary are twins, and Mary wants to travel to our nearest star system, Alpha Centauri (4.30 lightyears away). How old will Frank be when she returns
Explain what do business rules require to be effective : What are the advantages of having the DBMS between the end user's applications and the database. What are some reasons for studying file systems. IT 645 - Database Management Systems
Reflect the balance due on the lease : Prepare, in good form, a "Schedule of Lease Payments" and prepare in good form, the first two years of journal entries related to the lease acquisition, payments, and amortization (use straight-line).
Show your results by graphing the budget constraints : To what effect (income or substitution) do you attribute the change in utility levels between part a and part b?
Overcome problems-change made to code : Why they are important-the sorts of safegards they provide- problems faced by franchises and how instrument helpovercome these problem-use pratical examples of franchises in austrial when discusing problems faced by franchises and how low helps overc..
Overcome problems-change made to code : Why they are important-the sorts of safegards they provide- problems faced by franchises and how instrument helpovercome these problem-use pratical examples of franchises in austrial when discusing problems faced by franchises and how low helps overc..

Reviews

Write a Review

Database Management System Questions & Answers

  Use of data definition language-data manipulation language

Pick one of the different types of SQL statements (data definition language, data manipulation language, or data control language). Describe how that type of statement is use.

  Database to keep track of auto sales in car dealership

CAR (Serial-No, ModConsider the given relations for database which keeps track of auto sales in car dealership.

  Application important part of security model for databases

Using Internet as the research tool for extra information not presented in text, describe why application roles are important part of the security model for databases.

  Determine cost of least expensive part in part table

Write a query to determine the cost of the least expensive part in the part table? Format the returned price in dollars and cents using the correct function.

  How to use spool command

How to interactively query a database by using SQL statements and SQL*PLUS commands and how to use spool command to save an interactive session within SQL*PLUS.

  Prepare fully attributed data model

Use the results of the transcripts of an interview with IT consultant. Prepare a Fully Attributed Data Model. Add the data attributes for each entity."

  Design work breakdown structure for designing database

Design a work breakdown structure for the task below: Designing the database, Working on the website content

  Evaluate a dbms in terms of lock granularity

Suppose you are asked to evaluate a DBMS in terms of lock granularity and the different locking levels. Create a simple database environment in which these features would be important.

  Explain components represented in cell using mccumber model

Suppose that the security model is required for protection of information in class. Using NSTISSC model, analyze each of cells (i.e. 27 cells related with McCumber model).

  Create structurally sound relational database schema

Create a structurally sound relational database schema showing the minimum number of fields, tables, and relationships between the tables.

  Analyse the credit approval data set

Analyse the  Credit Approval  data set - A data set description in terms of the attributes present in the data, the number of instances,missing values, and other relevant characteristics.

  Using join sort results alphabetically by customer name

Using Join, list the items each customer ordered where the billing_price was lower than the item price (item, billing_price, and price). Sort the results alphabetically by customer name.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd