Database Analysis & Design

Assignment 1 Introduction Within this report I will explain the following areas in detail, * Explain the different types of databases - flat file, hierarchical and relational. Compare the advantages and disadvantages of each. * Describe two analysis methodologies and again compare the advantages and disadvantages. This time use examples to illustrate your key points. * Describe the concepts involved in Logical Data Modelling. * Identify and describe potential modelling constraints that could arise from a logical data model using examples. * Finally discuss the benefits of Logical Data Modelling. Databases There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases This section will show a description about flat file databases and the advantages and disadvantages Description A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone

  • Word count: 4878
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Implementation of an IT system.

IMPLEMENTATION When I decided to start my actual project, I decided to stick to my initial designs, which I drew in specification, as I thought that they were easy to use and are appropriate for easycar and my end user. My end user Ms F.Oji requested a system, which was easier to use than the current system, as they have employees who may need a bit of training in order to become accustomed to the system. I first went to and then clicked on programs, then Microsoft Office and decided to use Microsoft Excel (I will explain later in my implementation why I chose this program) for my project like so: When I done that, I started with a blank spreadsheet, which was named Sheet: Then, I changed its name from Sheet 1 to Main Menu by double-clicking on where it says Sheet1, and entered its new name, then clicked on the blank spreadsheet in order to save the name given to it: Later, I went to the website (www.easycar.com) of whom I'm creating the system for (as my end-user Ms.F.Oji requested), and I done a print screen of it in order for me to take its logo and put it in my main menu, (I pasted the picture in Paint (Clicked Start-then Programs- went to Accessories and selected Paint) and selected the part of the picture that I needed): Then, this page came up: When I selected the logo, I pasted it in Microsoft Excel, and resized (by clicking on it and dragging it to my

  • Word count: 4866
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Network Security

TABLE OF CONTENTS INTRODUCTION 1 WHAT IS NETWORK? 2 CLASSIFICATION OF NETWORKS 3 TYPES OF NETWORKS USED IN BUSINESS ORGANIZATIONS 3 Peer-to-Peer Networks 3 Client/Server Networks 3 Thin-Client Computing 4 NEED OF SECURITY OVER BUSINESS NETWORKS 4 BUSINESS NETWORK THREATS AND THEIR EFFECTS 4 Disruptions 4 Unauthorised Access 5 Trojan Horse Programs 5 Denial-of-Service (DoS) 6 Email spoofing 6 Packet sniffing 6 Measures Against unauthorised access 7 Formulating a Network Security Policy 7 Components of a Network Security Policy 7 Developing User Profiles 9 Using biometrics 9 Updating the operating system 10 Taking care of the network access points 10 Security Measures when connected to the Internet 10 Firewall 11 Physical security of the network 12 Secure Network Devices 15 Secure Call-Back Modems 15 Crypto-Capable Routers 15 Virtual Private Networks 15 CONCLUSIONS 16 REFERENCES 17 Network Security Introduction Since the last two decades there has been an overwhelming increase in the number of organizations that rely on data communication networks for their daily business communications, resource sharing, database information retrieval so on and so forth. Previously most computers were centralized and managed in data centres. Computers were kept in locked rooms and links outside a site were unusual. Computer security threats were rare, and were

  • Word count: 4850
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Various computing questions

Q=1 EXPLAIN IN DETAIL a. TRANSACTION PROCESSING SYSTEMS. It is the processing in which a system respond to a user's command to carry out some operation to and fro. The request or command is called TRANSACTION, and the system carrying it out is called TRANSACTION PROCESSING SYSTEM e.g cash machines. Transaction processing systems are the systems working at a low level of any organizational structure being operated by data entry operators etc to collect and store data which is needed to be transported then to decisional level of organisations. But it is important to make sure nothing goes wrong at this level of handling data before it is transported to upper level to be manipulated and then making decisions based on information provided. "There is some support for the propositions that (1) Transaction processing systems should be able to be managed within each work group in an organisation, managed that is with respect to work stations in use and functionality available on those workstations. (2) exhibit very little model behaviour. (3) support a high degree of operator independence or asynchornity." REFERNCE: http://www.csse.monash.edu.au/~cavram/papers/tp/tr94-02h.html There are 9 types of transaction processing models : Batch systems: 2: Monitor systems : 3: Time sharing systems 4: Advanced virtual terminal front end systems 5: Client server systems

  • Word count: 4824
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Applied ICT in business scenario answers

Scenario 1 Questions 1 and 2 The North India Motor Company is a manufacturer of cars and vans. It has a modern factory and a computerised production line in New Delhi. Robot arms are used in the manufacture of each car. The company is planning to introduce a new sports car and wishes to advertise this car. It is trying to decide between advertising on its own website and advertising on somebody else’s website using pop-ups. . (a) Describe four end effectors, other than a drill, in terms of the tasks each would perform assembling the cars. - Sensors or cameras to check work of robots. - Robots arm to grip parts from one part of the car or van to another one or to other part of the factory. - Sprays to paint the body of the car once finished. - Polishers to give a nice look to the car once painted. (4) (b) Describe how a robot arm would be programmed to drill holes in the car body. The robot would be programmed through a computer which stores a series of movements. This is saved in the computer’s memory in order to repeat it trough a remote control and could approach a production line. (4) (c) Discuss the advantages and disadvantages to the car company of using robot arms rather than humans. Advantages: fewer errors than humans. Lower costs since less wages are paid. The robots do not get tired, can work 24 hours all days. Best productivity

  • Word count: 4731
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks.

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks. A network can be defined as "A group of two or more computer systems linked together". The main reason for doing this is to enable any 2 or more computers to share each other's resources and thus this is a feature of all networks. Security in this context can be defined as "the act of protecting information (data files) from being access by unauthorised individuals or groups". There are three common types of network set up which are defined by there topology. Figure 1 illustrates the difference between Star, Bus and Ring networks which are used in network types as LAN, WAN, WLAN etc. A network runs on protocols, which define a common set of rules and signals that computers on the network use to communicate. A network can be isolated and independent such as a small home-area network (HAN) but once a network is connected to another network it can be defined as an Internet. Networks are frequently thought of as two different systems due to the fact that they can be access internally as well externally. Both methods give rise to different security issues and should be tackled differently by the network administration. Internal users in most cases are over looked as threats to security as they can cause malicious and unintentional damage to a

  • Word count: 4645
  • Level: AS and A Level
  • Subject: ICT
Access this essay

A relative of mine works for a corporate firm on CRM (Customer Relationship Management) software

Date __________________________ This alternate plan paper has been examined and approved. Examining Committee: ________________________________________ ________________________________________ ________________________________________ TABLE OF CONTENTS Chapter I. INTRODUCTION ......................................1 Current market talk. ....................................3 Approach of study ......................................4 Goal of study.............................................4 Key terms................................................5 II. PEOPLE ..................................................6 Importance of people component.....................7 III. PROCESS.................................................8 Importance of Process component....................11 IV. TECHNOLOGY........................................12 V. CRM SOFTWARE VENDOR SELECTION.......14 Functionality requirements...........................14 Technical requirements.................................15 VI. CONCLUSION..........................................19 Glossary...................................................19 CHAPTER I INTRODUCTION A relative of mine works for a corporate firm on CRM (Customer Relationship Management) software. He told me that their company is doing well with their CRM initiative while most of the other

  • Word count: 4602
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Assignment A: Analysis of Transactional Website

Assignment A: Analysis of Transactional Website ProSport is an online internet sports shop (www.prosportuk.com), it prides itself on it's commitment to sports people and supplying them with specialist equipment to perform and enjoy their sport to the maximum. There aim is to make shopping a pleasant and secure experience. ProSport has been in operation since 1986, it was started by Richard Sutton an ex-professional footballer with Norwich City and an England Youth International whose career was cut short by injury. Structure and Navigation The structure and navigation of the site is relatively easy to use and is well set out. The webpage has numerous navigation tools and links to other parts of the website, that all seem to work. The overall page has a good flow and has a good combination of text and picture that accompany each other well without clashing with each other. From the home page you will find eight sections containing all of the products. Once inside a section you will see a list of product groups on the left hand side. Once you have clicked a product group you are sent to another page, when inside click the picture of the product you are interested in, this will take you to an individual product page where you can make colour or size selection and add it to your basket. To go back at any point within a section use the list on the left hand side or the links

  • Ranking:
  • Word count: 4526
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Hardware and Network issues in e-commerce

Hardware and Network issues in e-commerce Introduction This review will discuss the issues and outline some future developments related to the three most prominent forms of network technology, broadband, m-commerce and wireless broadband. What is broadband? A good definition of broadband is: "Broadband refers to any communication technology that permits clients to play streaming video and audio files at acceptable speeds - generally anything above 100 Kbps" (Laudon and Traver, 2002). Typically, broadband is characterised by very high upload and download speeds and most interestingly it is an 'always-on' technology as opposed to narrowband where the user has to 'dial-up' to the server every time they begin a new session on the internet, whereas with broadband the user simply has to click on the internet icon on their desktop and they are instantly linked to home page of their choice. Types of broadband There are many types of broadband access available to the internet user. The most commonly used type of broadband connections made by the general consumer is via cable modem and DSL connections. Cable Modem is usually used by consumers who cannot get DSL connections in their area or who live in a cabled area and is characterised as a shared network service. Internet connection is 'piggybacked' on the television signal received by consumers who have cable television. It

  • Ranking:
  • Word count: 4519
  • Level: AS and A Level
  • Subject: ICT
Access this essay

This report examines a detailed action research process, Soft Systems Methodology (SSM) and discusses how the SSM approach might be of real help to managers in planning, resourcing, carryingout, monitoring and controlling new product development.

Contents Section Page . Introduction 2. The Need for a Methodology 3. Hard and Soft Systems 4. Overview of SSM 4.1 The 7-stage description 4.2 SSM's Strengths 3 4 6 5. How SSM can aid managers in: * Planning new product development * Monitoring new product development * Controlling new product development * Resourcing and carrying out new product development 6 6 9 0 2 6. Conclusion 3 Bibliography 4 References 4 Appendix A 5 Abstract "SSM is not usually concerned with well-defined (often technical) problems in organisations - such as how to maximise the output from a manufacturing facility, but with ill-structured problem situations with which managers of all kinds and at all levels have to cope". Checkland and Holwell (1998). This report examines a detailed action research process, Soft Systems Methodology (SSM) and discusses how the SSM approach might be of real help to managers in planning, resourcing, carryingout, monitoring and controlling new product development. Statement of originality Please note that the work presented in this report is solely the work of the candidate unless where otherwise stated. Signed _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Soft Systems Methodology (SSM) . Introduction This document investigates Soft Systems Methodology, which is a way of dealing with problem situations in which there is a high social,

  • Word count: 4479
  • Level: AS and A Level
  • Subject: ICT
Access this essay