Sophistication to your dbms application

Assignment Help Basic Computer Science
Reference no: EM131229134

This project requires you to perform a systems analysis and then design a system solution using database software. Ace Auto Dealers specializes in selling new vehicles from Subaru. The company advertises in local newspapers and is listed as an authorized dealer on the Subaru Website and other major Web sites for auto buyers. The company benefits from a good local word of-mouth reputation and name recognition and is a leading source of information for Subaru vehicles in the Portland, Oregon, area. When a prospective customer enters the showroom, he or she is greeted by an Ace sales representative. The sales representative manually fills out a form with information such as the prospective customer's name, address, telephone number, date of visit, and make and model of the vehicle in which the customer is interested. The representative also asks where the prospect heard about Ace- whether it was from a newspaper ad, the Web, or word of mouth- and this information is noted on the form also. If the customer decides to purchase an auto, the dealer fills out a bill of sale form.

Ace does not believe it has enough information about its customers. It cannot easily determine which prospects have made auto purchases, nor can it identify which customer touch points have produced the greatest number of sales leads or actual sales so it can focus advertising and marketing more on the channels that generate the most revenue. Are purchasers discovering Ace from newspaper ads, from word of mouth, or from the Web?

Prepare a two-page systems analysis report, in APA format, detailing Ace's problem and a system solution that can be implemented using PC database management software. Then use database software to develop a simple system solution. Your systems analysis report should include the following:

  • Description of the problem and its organizational and business impact.
  • Proposed solution, solution objectives, and solution feasibility.
  • Costs and benefits of the solution you have selected. The company has a PC with Internet access and the full suite of Microsoft Office desktop productivity tools.
  • Information requirements to be addressed by the solution.
  • People, organization, and technology issues to be addressed by the solution, including any proposed changes in business processes.

Based on the requirements you have identified:

  • Prepare an entity relationship diagram which models your proposed design.
  • Write the SQL statements to create the database tables, relationships and populate each table with at least 10 records per table, where applicable.
  • Use Microsoft Access to create a database called Ace-Auto-Dealers.accdb using your SQL scripts.
  • Finally, use the database system you have created to generate data input forms, queries and reports that would be of most interest to management. The system is to support only the processing requirements described for the existing manual system. You should have:
    • A minimum of 3 data input forms depending upon your database design
    • The following queries are required:
      • Which touch point generates the most sales leads? Least sales leads?
      • Which touch point generates the most purchases? Least purchases?
      • Which sales representative sells the most vehicles?
      • What is the best-selling make of model?
    • The following reports are required:
      • Customer profile
      • Leads by touch point including customer information
      • Sales by touch point including customer and vehicle information

You may choose to add more sophistication to your DBMS application, but you are not required to do so. While the more you do, the better your performance will be judged, it is better to do the basics right, than to develop a sophisticated DBMS application which does not work properly. In making your decision, please keep in mind the time available to complete the project, your relative experience with DBMS software, and your prior experience with Access' advanced capabilities. You are not required to go beyond the basic application framework.

Reference no: EM131229134

Questions Cloud

What daily demand for copies will allow you to break even : For one to five copiers rented and daily demands of 500, 1000, 1500, and 2000 copies per day, find annual profit. That is, find annual profit for each of these combinations of copiers rented and daily demand.
Different types of social engineering : People in general try to be helpful and cooperative social creatures. As part of this social characteristic people tend to talk to others and often give out more information than they should.
Smallest number of edges : We define a best minimum s-t cut to be any minimum cut that has the smallest number of edges. Give an efficient algorithm to find a best minimum s-t cut in a givenflow network G. Do I use karger's algorithm to do it?
Computer system that has no operating system : What inconveniences can be faced by a user who is interacting with a computer system that has no operating system?
Sophistication to your dbms application : You may choose to add more sophistication to your DBMS application, but you are not required to do so. While the more you do, the better your performance will be judged, it is better to do the basics right, than to develop a sophisticated DBMS app..
Differences between mark''s records and the bank''s statement : Why are there differences between Mark's records and the bank's statement? What could Mark do during the next month to make the month-end reconciliation easier?
Identify the flow of events within each use case : Draw a use case diagram for the following dentist office system, but do not bother to identify the flow of events within each use case. Whenever new patients are seen for the first time, they complete a patient information form that asks their nam..
Simple way of detecting common mis-typings of card numbers : Credit card numbers have what is called a check digit. This is a simple way of detecting common mis-typings of card numbers. The algorithm is as follows:
How vital was expert testimony to the case : ow vital was expert testimony to the case? How would you as the prosecutor have prepared the expert witnesses for trial? Could a conviction have been rendered without the fiber evidence? What other evidence did the prosecution present?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the number of integers divisible

Calculate the number of integers divisible by 4 between 50 and 500, inclusive. Hexadecimal digits are formed using either a numeric decimal digit or a letter from A to F. How many possible digits can be chosen? Did you use the sum rule or the produ..

  Good coding practices with a meaningful coding example

Documentation of good coding practices with a meaningful coding example

  Write an assembly program in using your own simd extensions

For an 8-wide SIMD machine (i.e., 8 parallel SIMD functional units, write an assembly program in using your own SIMD extensions to MIPS to execute the loop. Compare the number of instructions executed on the SIMD machine to the MIMD machine.

  Assignment on gonna

Who is available right now to do a three page risk management paper? A-plus writer accepted assignment on last Monday and has yet to submit...they are way passed the due date...who can assist me please?

  Can you explain what is throw try and catch

Can you explain what is throw, try and catch

  Security of digital web platform against the unauthenticated

Security of digital web platform against the unauthenticated and automotive access is a prime concern for service provider now days. To form a smart and secure membrane at the door of websites, many of the host use Captchas to filter out their gue..

  Computing new computer cost at the end of year

Assume that 5 years from now you would like to trade in the computer and purchase a new one. You expect at 5 % increase in price each year. What would the new computer cost at the end of year 5?

  Given two stringsa and bcreate a bigger string made char a

Given two strings, A and B, create a bigger string made of the first char of A, the first char of B, the second char of A, the second char of B, and so on. Any leftover chars go at the end of the result

  Assessing security risks for determining infrastructure

As part of project to assess security risks for determining infrastructure, you have found that other managers often have various ideas on severity and levels of risk.

  Write a program keeps an appointment calendar in database

Write a program that keeps an appointment calendar in a database.

  Consider a processor that runs at 2.5 ghz

Consider a processor that runs at 2.5 GHz and 1 Volt. When running a given CPU-bound program, the processor consumes 100 W, of which 20 W is leakage. The program takes 10 seconds to execute. The processor is capable of running at different voltages a..

  Describe how the dekf algorithm can be used to train

Describe how the DEKF algorithm can be used to train the simple recurrent network shown in Fig. 15.3 You may also invoke the BPTT algorithm for this training.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd