Research the concepts and technology of data etl

Assignment Help Software Engineering
Reference no: EM131258458

Introduction:

Research the concepts and technology of data ETL (Extraction, Transformation & Loading) and document the process from start to finish using Microsoft SSIS (SQL Server Integration Services) as the basis of your study.

Learning Outcome(s) Being Assessed:

1. Describe the operation of a data warehouse in support of business intelligence.

2. <not assessed in this coursework>

3. <not assessed in this coursework>

4. <not assessed in this coursework>

5. <not assessed in this coursework>

Details of Task:

ETL is an important process in the construction of Data WareHouse solutions. It consists of the following three primary phases, you must research each as well as the more specific steps contained within:

- Extracting Data
o From one or more external data sources.

- Transforming Data
o Ensure consistency and satisfy business requirements.

- Loading Data
o To the resultant Data WareHouse.

Microsoft SSIS provides a collection of tools to support ETL including:

- Data Flow Engine.
- Scripting Environment.
- Data Profiler.

"SSIS also acts to glue together the various servers and engines that make up SQL Server".

You must discuss the various tools that SSIS provides and relate them to the phases within ETL. You should also provide suitable examples from case studies (such as AdventureWorks & AdventureWorksDW) to reinforce your discussions.

Guidelines:

- Correctly reference resources that you use.
- You may also wish to compare & contrast other ETL solutions.

Resources Required:

You may use the computing laboratories on the 6th & 7th floors and the university's database servers (ask the lecturer for details).

You should make use of these specific tools & resources:

- Microsoft SQL Server 2012.
- SQL Server Books Online.
- The Internet.

Extenuating Circumstances:

If something serious happens that means that you will not be able to complete this assignment, you need to contact the module leader as soon as possible. There are a number of things that can be done to help, such as extensions, waivers and alternative assessments, but we can only arrange this if you tell us. To ensure that the system is not abused, you will need to provide some evidence of the problem.

More guidance is available at:

https://www.ljmu.ac.uk/about-us/public-information/student-regulations/guidance-policy-and-process

Reference no: EM131258458

Questions Cloud

Predicted relationship between money growth and inflation : How do these number match up with the predicted relationship between money growth and inflation in the long-run? Why do you think they matched up with the predicted relationship a bit better in one country than the other?
Examine the role that each public health agency : From the second e-Activity, analyze two to three (2-3) strategies that your state public health agency would employ in response to a pandemic event. From modifications made to policies in the last five years, infer the related lessons that have be..
Critique on an article-nationalisation of human capital : Summary of the article as you understand it ( do not copy-paste the abstract) and nature of the article (conceptual, descriptive or empirical) - provide the evidence
Identify the true statement about a claim of defamation : Identify the white collar crime that involves a fraudulent entity attracting investors, offering them high returns, and paying these returns, not from profits, but from investments made by subsequent investors.
Research the concepts and technology of data etl : Discuss the various tools that SSIS provides and relate them to the phases within ETL. You should also provide suitable examples from case studies (such as AdventureWorks & AdventureWorksDW) to reinforce your discussions.
How will dns be accessed by the lsdg systems explain : How will DNS be accessed by the LSDG systems? Explain. Explain how files on the network may be accessed by LSDG. Explain how LSDG can securely share files within their group and other selected groups/users in company.
What is the theoretical minimum for the smallest number : What is the theoretical minimum for the smallest number of workstations that Helms can achieve in this assembly line?
Create object called abc by assigning the number three : Create object called "abc" by assigning the number 3. Create different vectors ("a" is numeric, "b" is character and "c" is logical). List all the objects in the current session. Create vector "x" with the values {4, 4, 5, 6, 7, 2, 9}.
How does the decision in this case impact the validity : If auditing of financial statements is required for the protection of public investors, should all members of the PCAOB be taken from the investment community that uses audited financial statements or is there another suggestion for selecting memb..

Reviews

Write a Review

Software Engineering Questions & Answers

  Drawing upon your knowledge of software development

Drawing upon your knowledge of software development, which process--requirements, design, coding, or testing--do you think has the greatest effect on the overall success and quality of development

  Create flowchart to accept length of base of triangle

Create a flowchart that will accept the length of the base and height of a triangle and print the area. Area of a triangle is : area = 1/2b*h ; where b = base and h = height.

  Write a paper on a development lifecycle for an ids system

Write a paper on a development lifecycle for an IDS system

  Use case dependency for making an account deposit

Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product

  Compute student grades via linux shell script

Construct a shell script to run on Knoppix or Linux, that will compute and display the letter grades for the students based on the average of four test scores.

  Ray and jason have just finished developing the

ray and jason have just finished developing the documentation for a system your team recently completed. ray insists

  How to access the quality of software engineering

How to access the quality of software engineering? what are key points to measure the quality software design.

  Leadership challenge juggling culturesculture gender and

leadership challenge juggling culturesculture gender and leadership are closely related. in most cultures even western

  Create a use case based on relating functional requirements

Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.

  Which of the following advanced architectures

Which of the following advanced architectures do you consider to be the most reliable? Why? No plagarism

  Writing a pseudocode algorithm

Make a pseudocode algorithm you would write for a simple task like making a turkey sandwich, as well as 3-simple control structures that could be used to make this algorithm.

  How can cia triad of security be applied to an organization

How can the CIA triad of security be applied to an organization and not just a single system and What are the key factors involved in assessing the importance of a risk

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd