DBM 380 (Data Base Management) Entire Course –
NEW
IF You Want To Purchase A+ Work
then Click The Link Below For Instant Down Load
DBM 380 Week 1 DQ 1
Reflect
on the textbook readings. Using the search strings listed in the Electronic
Reserve Readings for Week one search for additional information on database
systems. What information would your provide to an organization or your
employer on why database systems should be used?
DBM 380 Week 1 DQ 2
What limitations have you or someone you know encountered in the
past in using nonrelational structures (such as in a Microsoft® Excel® or Word file) to store data? What were
the advantages?
DBM 380 Week 1 Individual
Assignment DataBase Paper
Database
Systems
A
database can be defined at a shared, integrated computer structure the stores a
collections of end user or meta data (Coronel & Morris, 2013).
Databases are very important in every organization. Databases can be used
to track various information form employee data to monthly sales.
Depending on the size of your organization, can determine the best
way to store you data. Microsoft Access is wonderful program
that is suitable for a small work environment. Sometimes a Excel
spreadsheet can meet you data storage needs. But larger
organization needs to consider using a database management system(DBMS).
A DBMS can be defined as a collection of programs that manse the database
structure and controls access to the data stored in the database
(Coronel & Morris, 2013) .
DBM 380 Week 2 DQ 1
Think of a situation where null value should
be allowed and a situation where it should not be allowed. What are the
consequences of inappropriate null settings?
DBM 380 Week 2 DQ 2
Why
it is necessary to choose appropriate data types for each data column?
DBM 380 Week 2 Individual Assignment
Database Environment Paper
Database
Environment
This
paper will describe a database environment within my workplace.
Currently I am in the United States Army. We track a lot of data in
the unit level for all of soldiers. One of the most key database trackers
would be tracking training data. I chose this database because the
importance of being able to track this data. Knowing that your
soldiers are fully trained is very important in making sure they can succeed on
the battlefield. This type of database would allow supervisors to check
training stats, get physical training test average, and generate reports to
keep track who is due or behind with training requirements.
Due
to this having to be a rather large database using Microsoft Access will not be
suitable. With the amount of soldier involved you will need a DBMS
(Database Management System). This system will be a user-friendly
system that will take a short training session to learn. It
will have also have shorts cuts that will generate common reports that will be
needed on a daily, weekly, and monthly basis.
DBM 380 Week 2 Team Assignment
Service Request SR-ht-003 Change Request 2
Huffman Fleet Truck Maintenance
Database
Huffman Trucking has asked Smith Consulting to create a UML Use Case, and Class
diagram for their fleet truck maintenance database. Huffman Trucking has
provided Smith Consulting with access to their existing database. By accessing
the database Smith Consulting will determine what entities currently exist in
the database, and the attributes of each entity. Smith Consulting will then
interview Huffman employees who regularly use the database. The information
gathered during the interviews will aid in the creation of a Use Case diagram.
Entities and Attributes
Huffman’s parts catalogue is an entity of the
vehicle maintenance database. The primary key of the parts catalogue is
“PartID”. Each part in the parts catalogue has the following attributes:
·
Part type: regular maintenance part, or non-regular
·
Quantity On Hand: how many of the part are in inventory
·
Reorder Point: At what level of inventory is the part to be
replenished
·
Reorder Quantity: How many are to be reordered at a time
·
Manufacturer: Who manufactures the part
·
Description: Description of the part and its use
DBM 380 Week 3 DQ 1
A
motor vehicle maintenance center wants to improve its services by using
database management systems (DBMS) and data mining. What tables are needed in
such a database and how can it help improve their services?
DBM 380 Week 3 DQ 2
How
do you select the primary key from the candidate keys? How do foreign keys
relate to candidate keys? Provide examples from either your workplace or class
assignments.
DBM 380 Week 4 DQ 1
In
your own words, describe the nature and purpose of the normalization process.
Provide some examples from sources other than the readings.
DBM 380 Week 4 DQ 2
In
what business database environments is denormalization appropriate and why?
What would denormalization specifically involve?
DBM 380 Week 4 Team Assignment
SR-ht-003 Change Request 4 and 5
Huffman Trucking Change Request
Four and Five
Huffman Trucking’s network is only partially secure. The Missouri and Ohio
offices are the only two portions of Huffman’s network using a firewall. The
lack of separation between Huffman’s private network and the public network
need to be corrected. While portions of the Huffman network are hidden behind
routers, the lack of firewalls negates any protection they offer. Huffman can
alleviate many of their security issues by installing proper firewalls at every
Huffman location.
Access Control
Access to the Huffman network should be
attained through two part authentication. Each Huffman employee with the need
to access the network should be given credentials to do so. Commonly, user
names and passwords are used to dictate who can access specific portions of the
network. Production staff for example will need to access inventory data, but
will have no need to access accounting data. Using two part authentication and
domain will allow Huffman to control which employees can access what data.
Deploying
an application firewall on all of Huffman’s application servers will further
secure the network. Application fire walls will determine which application
may send data over the Huffman network and to where. By using such a firewall
the chances of a Huffman application being hi-jacked for malicious intent will
be greatly reduced.
DBM 380 Week 5 DQ 1
Describe
the advantages and disadvantages of DBMS-provided security. Compare it to
network or application security.
DBM 380 Week 5 DQ 2
Locate a hosted, distributed database service.
Explore its features and talk about your experiences. In what situations would
an organization consider using it?
DBM 380 Week 5 Team Assignment
Service Request SR-ht-003 Presentation
No comments:
Post a Comment