LabExperiment2Report

Lab Experiment 2: Database Table creation, Maintenance & Views 2.3: Preparation (1) The primary key of a table is a column (or combination of columns in a table) that are used to uniquely identify rows in a table. This means that two different rows in a table may never have the same value in their primary key, and for every row in the table the primary key must have a value. Therefore, if the primary key column(s) are declared NULL, two or more rows in the primary key can have identical values and thus they will NOT be unique. Also the definition of the primary key states that a primary key must have a value and by declaring it NULL, the user has an option of leaving it empty, which is violating the primary key's rules. The primary key column(s) must be declared NOT NULL, to maintain the integrity of data which is entered in the primary key column. A NULL values is treated by mathematically operators, such as average, like any numeric value. These functions operate on the NULL without any problem, but produce an answer which has a value NULL. (4) The following are the entities that will be tested for normalisation, using the 1NF, 2NF and 3NF: SUPPLIER (CODE, NAME, CONTACT, ADDRESS 1, ADDRESS 2, POST CODE, TOWN, PHONE, FAX). INVENTORY (ITEM_CODE, STORE_LOCATION, QUANTITY). st Normalisation Form (1NF) basically states that the entity is in the 1NF if it consists of

  • Word count: 622
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

A Report On Software Quality.

A Report On Software Quality Submitted By:- << Your Name Goes Here>> Table of Contents * Introduction * More on Software Quality .. * Conclusion Introduction "Quality of software product is often described in vague and broad terms. As a consequence it makes it difficult for software engineers and users to determine how quality influences their assignment and it is almost impossible for test engineers to evaluate the quality of the software product as no concrete and quantitative reference, of what quality in that context means, exists. Hence a possible way to define and measure software product quality is required. The expert designers and system analysts in general apply several methods of quality control during the differenct stages of the development of softwares." More on Software Quality... 'Software quality' is gaining its due importance. Many people think of the phrase as an contradiction, much like 'military intelligence' and 'obedient teenager'. Flawed software is widely believed to be the reason for several spectacular mission failures. The most recent of these being NASA's Mars Observer, which became silent, just three days before it was scheduled to enter its orbit around that planet. Software quality is real. The challenge lies in measuring this intangible feature, so that it can be controlled and improved. And the smart thing to do when

  • Word count: 1288
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Designing an Information System for a Hotel Cafe.

Principles of Information Systems and Data Management Student’s Name Institution Course Professor Date Principles of Information Systems and Data Management Introduction Hotel Marina Bay is one of Singapore's largest hotels. It offers guests that visit Singapore hospitality services. Hotel Marina Bay is one of Singapore's top guesthouses. In this instance, the hotel provides services pertaining to lodging and dining experiences. The hotel has other attractions including casinos, a children's outdoor pool, and banking services. The hotel offers supervised activities for children, among others, for family-related operations. The hotel is unique in its components. There is yet one issue, which affects the hotel, such as heterogeneity, perishability, and lack of proprietorship on individual components of the hospitality industry. It means that management has to be extremely vibrant as it is one of the most essential components. The key concern of the enterprise is that global technology is expanding at a rate that adversely affects the hotel sector. The hotel was thus not smart enough for the needed technology to be introduced. The hotel is at the risk of losing its competitiveness given aspects such as rising competitiveness in the industry and the development of global aspects of information technology (Niculescu, et al 2014). The advent of the information system may

  • Word count: 2030
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Balance ScoreCard

APPLYING THE BALANCE SCORE CARD ON TITLAS VENTURES LIMITED NAME: FADERERA ADENIYI STUDENT NUMBER: 2500660 Report Submitted as a part of Assessment for the unit Office systems Year 3 BSc (Hons) Business Information Technology Faculty of Business, Computing and Information Management London South Bank University Lecturer: Mike Scott Submission Date: 14th April 2008 EXECUTIVE SUMMARY Initially the balanced scorecard was designed as a measurement device, nowadays it has become a strategic management system that enables business to clarify their vision and strategy by measuring and following up and them translates them into strategic actions across the businesses. It is an extensively recognized as an important management tool and concept for businesses as it provides managers with a management methodology to help bridge the gap between strategic objectives and their operational activates. It also provides feedback around both the internal businesses and external outcomes in order to continuously improve strategic performance. When integrated fully, the balance scorecard transforms the businesses' strategic planning into a sustainable achievement. TABLE OF CONTENTS CHAPTER PAGE . INTRODUCTION 4 2. TERMS OF REFERENCE 5 3. THE BALANCED SCORECARD 6 3.1. THE EVOLUTION OF THE CONCEPT 7 3.2. THE FOUR PERSPECTIVES OF THE BALANCED SCORECARD 8 4.

  • Word count: 3273
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Abstract This report is dedicated to demonstrating and critically reviewing new features and developments happening in Microsofts new Operation System, i.e. Windows 7.

Microsoft Windows 7 Abstract This report is dedicated to demonstrating and critically reviewing new features and developments happening in Microsoft’s new Operation System, i.e. Windows 7. The research team searches through various web resources and constructs this web site. Hopefully this web site will serve you as a one-destination date resources regarding what’s newly happening in Windows 7. The report is structured into six parts as following. . Overview The kernel of Windows 7 is largely unchanged from that of Vista. Only minor upgrade has been made. In fact, lots of Changes in Windows 7 are surface User Interface (UI) changes, which directly impact users [7]. Microsoft develops Windows 7 based on the principle of guaranteeing the compatibility of applications and devices from Vista. In this way, clients will not encounter the tortuous incompatibilities when using Vista [7]. Microsoft promises to “maximize application compatibility between Windows Vista and Window 7. The majority of applications that already work on Windows Vista will continue to work with little or no issues. [19]” Microsoft refuses to give a timetable for Windows 7 development. However, Microsoft Professional Developers Conference indicates some phases as below [3]: . Pre-Beta (M3 or Milestone 3) release to developers (those that attended the PDC and / or Windows Hardware Engineering

  • Word count: 3557
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

NTUC case study. On June 1, 2003, Income succeeded in the migration of its legacy insurance systems to a digital web-based system

Modernization of NTUC Income CASE STUDY NTUC Income (Income), one of Singapore's largest insurers, has over 1.8 million policy holders with total assets of S$21.3 billion. The insurer employs about 3,400 insurance advisors and 1,200 office staff, with the majority located across an eight-branch network. On June 1, 2003, Income succeeded in the migration of its legacy insurance systems to a digital web-based system. The Herculean task required not only the upgrading of hardware and applications, it also required Income to streamline its decade-old business processes and IT practices. Up until a few years ago, Income's insurance processes were very tedious and paper-based. The entire insurance process started with customers meeting an agent, filling in forms and submitting documents. The agent would then submit the forms at branches, from where they were sent by couriers to the Office Services department. The collection schedule could introduce delays of two to three days. Office Services would log documents, sort them, and then send them to departments for underwriting. Proposals were allocated to underwriting staff, mostly randomly. Accepted proposals were sent for printing at the Computer Services department and then redistributed. For storage, all original documents were packed and sent to warehouses where, over two to three days, a total of seven staff would log and

  • Word count: 1212
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Organisational Information Systems. In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes

In this assignment I will be discussing software used in my chosen department and the key work processes, identify and explain the key mobile devices used and how the internet used by the employees, and which would be the best methodology to improve systems. Task 1 In this assignment I have chosen the accounting department, I will be discussing key work process within this department and the software that is used for these processes. According to Z.Hussain (2009) a system ‘is a set of interrelated parts, arranged into an organized whole or orderly structure’ systems within accounting are very systematic a methodical as all decisions is made according to plans. A system contains many sub systems, these are smaller systems (departments) within the system that work to run the system effectively and efficiently, these sub-systems may be different but they are interrelated as they share data/information between each other to goals that help towards filling the larger goals of the accounting system. Figure.1 ACCOUNTS MANAGEMENT FINANCIAL Budgeting Sales Absorption Costing Cash Flow Depreciation Break Even Profit/ Loss Ratios Marginal costing Income Statements Investment Appraisal Financial statements Figure.1 – The chart above shows that accounts can be separated into two sub systems, and can further be decomposed into sub-sub systems. By decomposing a

  • Word count: 4826
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Why has database security become such an important issue for companies these days? What are the key principles that should form the basis of a corporate strategy for information security?

Why has database security become such an important issue for companies these days? What are the key principles that should form the basis of a corporate strategy for information security? In order to establish why database security has become such an important issue for companies nowadays it first needs to be established what is database security and why the protection of the aforementioned is of such critical importance to companies. As relates to security it is the protection of assets from threats. Therefore the definition of database security can be taken to be the protection of information from threats, protecting information systems, data, messages, and information processed, stored and communicated through information systems. Through database security a company ensures the protection and security of systems, media and facilities which process and maintain information vital to its operation[1]. This is the reason for the increased importance to this issue by many corporations. In an effort to protect vital information which would be within the systems of these organizations database security over the years has become more stringent. With information such as personal details on employees, customers, and other individuals, their financial information or transactions, trade information, e-mails; videos, software, and loads of other information if access by the wrong

  • Word count: 527
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

What are the legal requirements for ensuring information security relating to business organizations? How can these legal requirements for ensuring information security be met in typical modern companies? Explain your answers with reference to practical examples from your own knowledge and experience wherever possible.

The Legal requirements For data or information to be useful, at the minimum, the key principles of confidentiality, integrity and availability of data upon which the concept of information security is built must be met and this inevitably is in tandem with the legal requirements for any jurisdiction.[1] Legal requirements for most jurisdictions usually have the internal looking requirements[2] which provide for steps that an organization is required to comply with and the outward requirements which are punitive measures in cases of breach or noncompliance.[3] Internationally there is no uniform standard or approach for ensuring information security and different jurisdictions have adopted different approaches.[4] As private data has become increasing vulnerable to exposure, the focus in most jurisdictions is to ensure that the privacy of individuals during transactions is protected[5]. Smedinghoff has summarized the legal requirements generally as the duty to provide security, the legal standard upon which that duty or obligation is based and the duty of notification in case of breach.[6] Therefore in the United States, the approach initially was sector specific[7] but is now increasingly moving towards general requirements,[8] while the approach in Europe[9] for example is the general / omnibus approach. Generally all jurisdictions make provision for protection of

  • Word count: 1086
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

You will see from your reading that the EU considers cybercrime as a very serious issue for business, in and between Member States. What do you see as the main potential threats posed by the widespread use in modern business of information technology and databases of personal information? How can the law be extended to protect against these threats without stifling technical innovation and business activity more than absolutely necessary?

As the development of computers, networks and the Internet has accelerated and become part of everyday life, the new cyberspace has created an environment for criminal offences. Information security is concerned with protecting the information confidentiality, integrity and accessibility1. Cybercrime is on the rise, but its transnational character poses difficulties in implementing statutes and regulations which effectively counter the vulnerabilities. What do you see as the main potential threats posed by the widespread use in modern business of information technology and databases of personal information? The protection of privacy and data is a key challenge in today's society, characterized by extensive amounts of sensitive data being located in databases vulnerable to attacks and misuse. Threats may manifest themselves as physical and environmental, technical and people-based2. The European Convention on Cybercrime3 defines computer related crimes as (a)computer related forgery and fraud, (b)content related offences covering activities related to the distribution of illegal content and (c)infringements of intellectual property rights and related rights4. From a business perspective, forgery and fraud, as well as intellectual property breach, should both pose reasons for concern. E-commerce is reliant on building consumer trust, which would undoubting be breached if

  • Word count: 736
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay