Graduate school essays
Lauder Essay Samples
Wednesday, August 26, 2020
Adam and Eve Creation Essay Example for Free
Adam and Eve Creation Essay ? The Lord God shaped man from the residue of the ground and inhaled into his noses the breath of life, and man turned into a living being.â⬠(Genesis 2:7). The Hebrew for man is articulated aw-dawm, from which Adam is inferred. Itââ¬â¢s additionally identified with aw-dawm-ah, which implies red earth, or red mud â⬠demonstrating the regular earth components that formed Adamââ¬â¢s body, and the body of each individual since. ââ¬Å"The Lord God took the man and put him in the Garden of Eden [see Where Was The Garden Of Eden?] to work it and deal with it. â⬠(Genesis 2:15). Adam wasnââ¬â¢t going to lead an inactive life â⬠he had work directly from his first day. For a brief period, Adam was the main individual in presence (envision being the main individual on a whole planet!). ââ¬Å"The Lord God stated, ââ¬Å"It isn't useful for the man to be all alone.â⬠(Genesis 2:18) ââ¬Å"So The Lord God made the man fall into a profound rest; and keeping in mind that he was dozing, He took one of the manââ¬â¢s ribs and quit for the day place with substance. At that point The Lord God made a lady from the rib. He had removed from the man, and He carried her to the man. The man stated, ââ¬Å"This is currently bone of my bones and substance of my tissue; she will be called ââ¬Ëwoman,ââ¬â¢ for she was removed from man.â⬠For this explanation a man will leave his dad and mom and be joined to his significant other, and they will become one flesh.â⬠(Genesis 2:21-24) Eveââ¬â¢s unique name, when interpreted, implied basically ââ¬Å"woman,â⬠(a ââ¬Å"female manâ⬠) similarly as Adam was referred to just as ââ¬Å"manâ⬠(a ââ¬Å"male manâ⬠). He called her ââ¬Å"woman,â⬠and she called him ââ¬Å"man.â⬠Later, ââ¬Å"Adam named his significant other Eve, since she would turn into the mother of all the living.â⬠(Genesis 3:20). Eve is gotten from the Hebrew word which implies nurturing. In the end, other than Cain And Abel, they had Seth (Genesis 5:3), and various other kids (Genesis 5:4). ââ¬Å"So God made man in His Own Image, in The Image of God He made him; male and female He made them. God favored them and said to them, ââ¬Å"Be productive and increment in number; fill the earth and curb it. Rule over the fish of the ocean and the winged animals of the air and over each living animal that proceeds onward the ground.â⬠Then God stated, ââ¬Å"I give you each seed-bearing plant on the substance of the entire earth and each tree that has organic product with seed in it. They will be yours for food. Furthermore, to all the brutes of the earth and all the feathered creatures of the air and all the animals that proceed onward the ground â⬠everything that has the breath of life in it â⬠I give each green plant for food.â⬠And it was so. God saw all that he had made, and it was generally excellent. What's more, there was night, and there was morning â⬠the 6th day.â⬠(Genesis 1:27-31). (see The Seven Days Of Creation) Adam and Eve had an ideal life in Eden. That is, until That Old Serpent crawled in. Certainty Finder: What was Godââ¬â¢s order to Adam (Eve had not yet been made) with respect to a specific two trees in the Garden of Eden? Beginning 2:16-17 Adam and Eve Creation. (2016, Nov 13).
Saturday, August 22, 2020
Behaviorism, Cognitivism and Considerativism
My perception from the homeroom exhibited that genuine distinctive learning hypotheses we had in this three meeting, for example, behaviorism, cognitivism and considerativism every one of them incorporate qualities and shortcomings. I attempted to clarify my observation through this schools of thoughts.BehaviorismIt centers around two key components improvement and respons and ignores mental exercises. Povlov, Watson, Thorndik and Skinner were the popular therapists who broadly advanced this hypothesis. In old style molding a boost introduced so as to get a reaction however in operant molding the reaction is made first then fortification follows. An observable shortcoming that I find in this technique is that it can't clarify the acknowledgment of new dialect designs by kids for which there has been no fortification systems for instance in Persian we have ââ¬Å"koshtondam or pazondamâ⬠. It dismisses the thought of hereditary qualities, heredity and individual discernment. So as to control the class along these lines instructors must apply positive and negative fortifications to change understudies conduct and debilitate troublesome behaviors.CognitivismIn psychological hypothesis the most significant thing is inner mental procedure of the student during the learning procedure. Against behaviorists that consider learning as an aloof action in this hypothesis the job of students is dynamic and looking for importance. J. piaget and L. vegotsky improved this hypothesis. In this technique instructor must make learning condition dynamic and permitting understudies to apply past knowledge.ConstructivismIn this hypothesis learning is just the way toward altering our psychological models suit new encounters in other word all new data connected to earlier information. The students start with a complax issue and exercise to find the fundamental abilities required to take care of the issue. The job of educators changes from instructor to facilitators. In this strategy scholars attempt to take out evaluations and testing. Educators must give connecting with chances to understudies to understand the data through hand-on exercises and discussions.Conclusion:There is no single best hypothesis and every hypothesis gas diverse part of instructing/learning process.
Monday, August 17, 2020
Sore Subjects
Sore Subjects Okay, so its like this, right. Pictures and backlogged entries are piling up like crazy over here. But so is work on my 8.06 term paper and analysis for the 3rd 8.14 lab (Zeeman effect in Hg). My oral presentation is friday for this lab, but with the 8.06 deadlines this week Im not sure Ill make it. Im writing my paper on the dynamical (SO(4) rotational group) symmetries of the hydrogen atom, using just symmetry and algebra of groups to derive the energy eigenvalues for a hydrogenic atom. Pretty kickass, right? Well, Im not doing this fabulous topic justice in the least. I brought Schiffs solemn-as-hell-looking Quantum Mechanics book to the Virgin Islands with me during spring break. Opened it on the beach a few times and during long walks down winding island roads. Succeeded in reading but not quite understanding two section, getting it crinkly from salt water (too close to the waves that time) and sand all between its pages. Aside from that I read about 100 pages in my Roman History text book, not quite caught up but happy about my progress. But went on to forget entirely about a 10-page term paper on Julius Caesar due this past Monday (the sort of Sunday-night realization you dont want). I was clearly expected to get a lot more done over spring break in all my classes. Consequently, I handed in the drop form for Rome this morning. Now on 42 units, though not light, is definitely by far the fewest number of units Ive stood to complete in any semester. Taking a break from work at MIT has its angry side, but losing spring break productivity to vacation in the Virgin Islands isnt really losing at all, is it? At least thats how I think of it. I have pictures from my vacation for a future entry. For now, I have more pictures from Junior Lab. The telescope pictures that I promised so many moons ago are here. I meant to post them before spring break but I had a midterm, go figure. Let me just start off by saying MIT roofs are a pretty cool place to hang out. Especially in february. What youre seeing here is the Small Radio Telescope developed by MITs Haystack Observatories used in the 21-cm Astrophysics experiment in Junior lab (8.14). This was definitely my favorite experiment all year. I guess the ultimate objective was to use the doppler shift of the ultra-sharp 21cm hydrogen line emitted by gases in distant parts of the galaxy to derive a rotation curve for the Milky Way, and use that information to map out some of its spiral arms. The control room is in this little hut on the roof. check out the little hole: Lifeline: VideoLink to the outside world in the telescope vicinity (walkie talkies if you wanna chat): A little bit of asbestos (at least they warn you): And a reminder of what youre after: But yeah what really makes this lab is not the walkie-talkies, not even the asbestos. Its not anywhere in that nasty control room. Its out here: Doing this lab forces you to be up on the roof all hours of the day and night (sorry, science doesnt care about your sleeping habits), so you see a lot of this: and this: this: and even this: Watch out for the edge, though: This lab took us through February and into March. Unfortunately, I hear the telescope is having some trouble with its preamp, so it wont be open for business for the last experiment, for those guys who would really be rocking out up there with the nice weather its no go. In case youre wondering what the experiment is actually about heres my paper with our results. I also have some gnarly optical spectroscopy pictures from the Zeeman experiment but thats for next time. Man, you really dont realize how huge a role some things play in your life until its time to blog and all you can write about is physics.
Sunday, May 24, 2020
Essay on The Growing Epidemic of Cyberbullying - 1121 Words
Cyber bullying has been around since the creation of advanced communication technology. In the last few years, however, this issue has become more common, more related to sex and most of all more dangerous. It has gotten so dangerous that children have killed each other and/or committed suicide after having been involved in a cyber bullying incident. Little attention and support from school authorities, more access to computers, and the latest cool thing (social networks) are all factors that have contributed to the rising of cyber-bullying practices. Cyber bullying is when a preteen or teen is harassed, threatened, humiliated, embarrassed or otherwise molested by another child with the use of technology such as internet,â⬠¦show more contentâ⬠¦Such audience could then turn bullying into verbal bullying or even continue the cyber bullying making it a bigger threat for the victim. By now the victim is already scared to death and psychologically abused. In a lot of cases the abu se escalates to physical abuse. Third characteristic is prevalent sexual and homophobic harassment. Sexual and homophobic harassment is emerging as one of the main reasons a person is bullied. This one not only concentrates on the sexual orientation of the person, but also touches unwanted sexual attention, and sexual coercion. A fourth aspect is that only communications have a permanence and inseparability that are very difficult to erase. For example cell phones are usually carried all the time which makes it difficult for the victim to ignore the message. Teenagers spend a lot of time in their computers which also makes it difficult to ignore emails. Emails are very powerful because they can contain defamatory material or modified pictures and it can be send to us many people as you want. In this characteristic, we can include social networking sites such as My Space, Face book, Hi 5, and many others. Online communication tools such as the ones previously mentioned for pre-teens and teenagers began to function approximately 5 years ago and became extremely popular. Especially for girls that like to engage in more social and verbal forms of communication. These sites wereShow MoreRelatedCyberbullying And Its Effect On Children Essay1497 Words à |à 6 Pagesarchives, are located, enabling data and other information to be exchanged (Internet, n.d.). This essay will identify and discuss one concern for users of the internet, which is cyberbullying. Cyberbullying is carried out through cell phones, computers, e-mails and any other electronic devices or social media sites. Cyberbullying has the potential to be devastating to children, adolescents and adults as it is being cruel to others by sending or posting harmful material or engaging in other forms of socialRead MoreHow Cyberbullying Is Affecting Teens1200 Words à |à 5 Pages How Cyberbullying Is Affecting Teens Lisa Chouinard University of Central Florida Abstract Cyberbullying is a growing problem among the teen population. The abuse that is taking place online has a much more far reaching effect than physical bullying, since it is available to a much larger audience. It has the ability to cause serious psychological effects on teens that could lead to depression and possible suicide. The reason for this, is because a teenââ¬â¢s self-esteem and self-worthRead MoreMaking Cyberbullying a Criminal Offense695 Words à |à 3 Pageshanged herself. Although cyberbullying is a vague concept to many, it should be made a criminal offense because it is causing suicides for youth, government intervention is the only solution, and the bully should be punished instead of the victim. Being a recent issue, cyberbullying has seriously been taken for granted by society. Not only is it real and hurtful, but it is also leading to suicide as a result, especially for youth. From a survey taken by the Cyberbullying Research Center, 20% of aroundRead MoreCyberbullying Is A Recent Problem Among Youths And Their Families939 Words à |à 4 PagesCyberbullying has become a recent problem among youths and their families. Children go online, and through social media are harassed, degraded, and ostracized, usually by their classmates. This is an epidemic that needs to be stopped, but demanding the schools to do the bidding of other, more qualified individuals is not the way to fix the situation. Cyberbullying is not the schoolââ¬â¢s issue to solely handle because it happens out of their jurisdiction, it causes further issues for both parties, andRead MoreCyberbullying: The New Form Of Bullying. When Sending Our1661 Words à |à 7 PagesCyberbullying: The New Form of Bullyin g When sending our children to school we expect them to be able to learn without distractions, but bullying makes that impossible. Bullying has been recognized as a problem for school children globally. In fact, school bullying has proven to be a risk factor for suicide, which has been identified as one of the top causes of death among teens (Erick Messias, 2014). Now that bullying and its importance has been acknowledged as a critical concern, several preventionRead MoreReview Of Elementary School 1894 Words à |à 8 Pagestactics are introduced to these new means of communication, ââ¬Ëcyberbullyingââ¬â¢ is create. This adds another level on top of what bullying used to be. Cyberbullying has become a nationwide epidemic, but our country has taken little to no action in dealing with cybercrimes. Therefore, in order to address cyberbullying, there must be things to take into consideration, such as knowing how serious this case is and the different ways cyberbullying can occur. I n addition, knowing SECTION 3, SECTION 4, as wellRead MorePersuasive Essay On Social Media1026 Words à |à 5 Pagesof our generationââ¬â¢s lives. As our access to these websites increases, many other problems arise. While there are also some benefits of our use and accessibility of the internet, there are also many downfalls. Loss of time, lack of privacy, and cyberbullying are examples of issues we commonly face by using social media. Countless hours of every day are wasted by spending our time on social media outlets such as Facebook, Twitter, and Instagram. With the increase of social media usage the attentionRead MoreThe Social Communication Era1478 Words à |à 6 PagesI would illustrate a few issues that I believed is a growing concern and needs to be reconsidered in the evolution of the social communication era. Facebook, Instagram and whatââ¬â¢s app are very effective and efficient social network service that is commonly used today by adults, teenagers and children. These far-reaching interaction web-based media, embeds the unethical act of cyberbullying. According to Michael J. Quinn (2012), ââ¬Å"Cyberbullying is the use of the Internet or the phone system to inflictRead MoreBullying Is Bad Traditional Or Cyber Bullying?1296 Words à |à 6 Pagesacts carried out against their persecutors and other students. Any form of bullying hurts whether it is traditional bullying or cyberbullying. Cyberbullying is the use of cell phones or other electronic communication devices to spread harmful or embarrassing information about another person. This information can be in the form of text, photos, or videos. Cyberbullying can take many forms. It may include repeatedly sending e-mails to people who have said they do not want contact with the senderRead MoreThe Negative Effects Of Cyberbullying1691 Words à |à 7 PagesCyberbullying Hurts! What is cyberbullying? ââ¬Å"Cyberbullying is intentional and repeated harm inflicted on people through the use of computers, cellular phones, and other electronic devicesâ⬠(Cyberbullying 1). The use of technology today has greatly increased, and it is causing problems within the states. Schools are becoming more technological, and some schools even provide students with electronic devices. Four in ten teens have been bullied online, and girls are more likely to be victimized, rather
Wednesday, May 13, 2020
The Purpose Of This Work Is To Explore Machiavelliââ¬â¢S...
The purpose of this work is to explore Machiavelliââ¬â¢s political philosophy through the lens of discord. In terms of discord, Machiavelli presents the two main rivals, who are the nobles and the people. He sees the two different humors of the nobles and the people as the cause of discord. He observes that conflicts caused by the two diverse humors create salutary effects. His praise of tumults has inspired scholars not only to relate the notion of humors to the discussion of political freedom, but also to find the origin of the Modern Republicanism in his political philosophy. Focusing on the irrational cause of humors, however, existing studies have slightly overlooked rational causes such as idea or reason or knowledge of politicalâ⬠¦show more contentâ⬠¦He also plays an important role in transforming detrimental results of discord to its salutary results. In this dissertation, I will categorize the one manââ¬â¢s characteristics into three features: tyrannical, prude nt, and deceitful. I will also illustrate how the one man manages discord, and even controls it having with his three characteristics. The last question is associated with the relationship between discord and regime. Conflicts take an important role in the creation of regime, its decline, and its extinction. Presenting the connection between discord and regime, this work also explores the regime types for which Machiavelli designs. In his preference of the republican regime, I will present the distinctive features of Machiavelliââ¬â¢s regime, which are tumultuous, rejuvenated, the presence of the one man. Based on that, I will conclude that the presence of the one man is crucial in terms of Machiavelliââ¬â¢s regime. In the discussion of discord, there are two main contenders of the nobles and the people defined. The one man is invisible in conflicts. However, his role is critical in conflicts between them. Like an invisible hand, he involves in competitive relationship between them by affecting the outbreak of tumults, its intensity, and its settlement. He also plays an invisible, but important role in making Machiavelliââ¬â¢sShow MoreRelatedEssay about Virtà ¹ in Machiavelliââ¬â¢s Prince1520 Words à |à 7 Pagesauthorship of one of the central works of modern political philosophy: The Prince. Given this image, it is incredibly ironic that the Italian word virtà ¹ and its derivatives appear no less than seventy-two times throughout the work. While the translator goes to great lengths to adapt this versatile word to the context of the situation, it is nevertheless clear that virtà ¹ is closely related to its English cognate virtue. This, along with the political nature of Machiavelliââ¬â¢s work, shapes the discourse aboutRead MoreAristotle And Machiavelli : A Take On The Timeless Political Issue Of Class1527 Words à |à 7 PagesAristotle and Machiavelli: A Take on the Timeless Political Issue of Class Invoking his penchant for statistics and an eye for the common man, Senator Bernie Sanders spent his campaign highlighting disparity and inequality between one percenters and the average America. Time and time again, Sanders highlighted two facts: first, that the top one-tenth of the one percent holds as much wealth as the other 99.9% of Americans, and that during the recent economic downturn, most of the new income generatedRead MoreMachiavelli and Gossip Girl1497 Words à |à 6 Pages Machiavelliââ¬â¢s The Prince is a guide written for the ruling class on how to maintain power, however, royalty is no longer a characteristic that belongs only to a monarch. In The Prince, Machiavelli targets the prince and all other royalty, but today his work may be used as a social critique of upper class society. Thus, a popular television show depicting Manhattanââ¬â¢s elite governed by social media blasts, is no coincidence. It is evident that the creators of the popular television show G ossip GirlRead MoreMachiavelli And Socrates1976 Words à |à 8 Pages both philosophers developed different views. Machiavelliââ¬â¢s concept of a Prince includes strong stances on morality and religion. Socrates would be likely to agree on the general ideas that Machiavelli believes a Prince should have but he would differ mainly in how they should be executed. I believe that Socrates would agree with Machiavelli that there needs to be a kind of ââ¬Å"political renaissanceâ⬠that changes how people organize and alter political systems as well as gives a new definition of whatRead MoreMachiavelli And The Apology Of The Prince1718 Words à |à 7 Pages However, the different time periods cause the views and purposes of Machiavelliââ¬â¢s writing to largely differ from Socrates. Machiavelli writes in a time of turmoil where Italy was a bunch of small, fragmented states and when the Mediciââ¬â¢s struggled to regain power after being expelled. This causes his views to be more cynical and pessimistic in comparison to Socrates. If Socrates were to read The Prince, he would disagree with Machiavelliââ¬â¢s beliefs and deem his portrayal of a prince as immoral. TheirRead MoreAn Unjust Society For Equality : A New Way Of Ruling Essay1648 Words à |à 7 Pagessystem of government in place did not allow for political discussion and dissent. For this reason, many philosophers of the time began to explore the true role of government and what the best form of government would be if it is to protect basic human rights. This time period is defined as the enlightenment, and it encompasses a new wave of ideologies that attempt to define basic human rights and the natural human state, as well as promote new political and social structures that better reflect theseRead More Comparing The Prince and Measure for Measure Essay1759 Words à |à 8 PagesParallels Between The Prince and Measure for Measure à à à à à The parallels between Machiavellis Prince and Shakespeares Measure for Measure are significant. à The great majority of characters in Measure for Measure - the Duke, Angelo, Claudio, Pompey and even Isabella - display Machiavellian qualities. A comparison of key passages, both of The Prince and Measure for Measure, will establish this clearly. à A study of kingship, arguably the entire premise for Measure for Measure, isRead MorePolitical Science And Political Philosophy Essay3559 Words à |à 15 PagesIntroduction Political science is a an academic discipline. It is a part of social science which discuss about government and politics. It generally analyses the methods and policies of government. It is the systematic and analytical study of political and government institutions. The procedure and process of governmental policies is explained in political science. In order to define and analyze political science many political thinkers have given different theories. They practiced political scienceRead MoreManaging Strategic Change at the Hmv Group8681 Words à |à 35 PagesManaging Strategic Change At The HMV Group | 1. Introduction HMV Group announced a three year strategic and operational review in March 2007. The primary purpose of this dissertation is to analyse the methods used to manage this strategic change and to discuss alternatives. The secondary focus is to assess the decision to change. à At a time of change, much focus is placed upon developing strategy and not enough on the implementation and management side. It is possible that a ââ¬Ëperfect strategyââ¬â¢
Wednesday, May 6, 2020
Database Solutions Free Essays
DATABASE SOLUTIONS (2nd Edition) THOMAS M CONNOLLY CAROLYN E BEGG SOLUTIONS TO REVIEW QUESTIONS Chapter 1 Introduction- Review questions 1. 1List four examples of database systems other than those listed in Section 1. 1. We will write a custom essay sample on Database Solutions or any similar topic only for you Order Now Some examples could be: â⬠¢A system that maintains component part details for a car manufacturer; â⬠¢An advertising company keeping details of all clients and adverts placed with them; â⬠¢A training company keeping course information and participantsââ¬â¢ details; â⬠¢An organization maintaining all sales order information. 1. 2Discuss the meaning of each of the following terms: (a)data For end users, this constitutes all the different values connected with the various objects/entities that are of concern to them. (b)database A shared collection of logically related data (and a description of this data), designed to meet the information needs of an organization. (c)database management system A software system that: enables users to define, create, and maintain the database and provides controlled access to this database. (d)application program A computer program that interacts with the database by issuing an appropriate request (typically an SQL statement) to the DBMS. (e)data independence This is essentially the separation of underlying file structures from the programs that operate on them, also called program-data independence. (f)views. A virtual table that does not necessarily exist in the database but is generated by the DBMS from the underlying base tables whenever itââ¬â¢s accessed. These present only a subset of the database that is of particular interest to a user. Views can be customized, for example, field names may change, and they also provide a level of security preventing users from seeing certain data. 1. 3Describe the main characteristics of the database approach. Focus is now on the data first, and then the applications. The structure of the data is now kept separate from the programs that operate on the data. This is held in the system catalog or data dictionary. Programs can now share data, which is no longer fragmented. There is also a reduction in redundancy, and achievement of program-data independence. 1. 4Describe the five components of the DBMS environment and discuss how they relate to each other. (1)Hardware:The computer system(s) that the DBMS and the application programs run on. This can range from a single PC, to a single mainframe, to a network of computers. 2)Software:The DBMS software and the application programs, together with the operating system, including network software if the DBMS is being used over a network. (3)Data:The data acts as a bridge between the hardware and software components and the human components. As weââ¬â¢ve already said, the database contains both the operational data and the meta-data (the ââ¬Ë data about dataââ¬â¢). (4)Procedures:The instructions and rules that govern the design and use of the database. This may include instructions on how to log on to the DBMS, make backup copies of the database, and how to handle hardware or software failures. 5)People:This includes the database designers, database administrators (DBAs), application programmers, and the end-users. 1. 5Describe the problems with the traditional two-tier client-server architecture and discuss how these problems were overcome with the three-tier client-server architecture. In the mid-1990s, as applications became more complex and potentially could be deployed to hundreds or thousands of end-users, the client side of this architecture gave rise to two problems: â⬠¢A ââ¬Ëfatââ¬â¢ client, requiring considerable resources on the clientââ¬â¢s computer to run effectively (resources include disk space, RAM, and CPU power). A significant client side administration overhead. By 1995, a new variation of the traditional two-tier client-server model appeared to solve these problems called the three-tier client-server architecture. This new architecture proposed three layers, each potentially running on a different platform: (1)The user interface layer, which runs on the end-userââ¬â¢s computer (the client). (2)The business logic and data processing layer. This middle tier runs on a server and is often called the application server. One application server is designed to serve multiple clients. (3)A DBMS, which stores the data required by the middle tier. This tier may run on a separate server called the database server. The three-tier design has many advantages over the traditional two-tier design, such as: â⬠¢A ââ¬Ëthinââ¬â¢ client, which requires less expensive hardware. â⬠¢Simplified application maintenance, as a result of centralizing the business logic for many end-users into a single application server. This eliminates the concerns of software distribution that are problematic in the traditional two-tier client-server architecture. â⬠¢Added modularity, which makes it easier to modify or replace one tier without affecting the other tiers. Easier load balancing, again as a result of separating the core business logic from the database functions. For example, a Transaction Processing Monitor (TPM) can be used to reduce the number of connections to the database server. (A TPM is a program that controls data transfer between clients and servers in order to provide a consistent environment for Online Transaction Pro cessing (OLTP). ) An additional advantage is that the three-tier architecture maps quite naturally to the Web environment, with a Web browser acting as the ââ¬Ëthinââ¬â¢ client, and a Web server acting as the application server. The three-tier client server architecture is illustrated in Figure 1. 4. 1. 6Describe the functions that should be provided by a modern full-scale multi-user DBMS. Data Storage, Retrieval and UpdateAuthorization Services A User-Accessible CatalogSupport for Data Communication Transaction SupportIntegrity Services Concurrency Control ServicesServices to Promote Data Independence Recovery ServicesUtility Services 1. 7Of the functions described in your answer to Question 1. 6, which ones do you think would not be needed in a standalone PC DBMS? Provide justification for your answer. Concurrency Control Services ââ¬â only single user. Authorization Services ââ¬â only single user, but may be needed if different individuals are to use the DBMS at different times. Utility Services ââ¬â limited in scope. Support for Data Communication ââ¬â only standalone system. 1. 8Discuss the advantages and disadvantages of DBMSs. Some advantages of the database approach include control of data redundancy, data consistency, sharing of data, and improved security and integrity. Some disadvantages include complexity, cost, reduced performance, and higher impact of a failure. Chapter 2 The Relational Model ââ¬â Review questions 2. 1Discuss each of the following concepts in the context of the relational data model: (a)relation A table with columns and rows. (b)attribute A named column of a relation. (c)domain The set of allowable values for one or more attributes. (d)tuple A record of a relation. (e)relational database. A collection of normalized tables. 2. 2Discuss the properties of a relational table. A relational table has the following properties: â⬠¢The table has a name that is distinct from all other tables in the database. â⬠¢Each cell of the table contains exactly one value. For example, it would be wrong to store several telephone numbers for a single branch in a single cell. In other words, tables donââ¬â¢t contain repeating groups of data. A relational table that satisfies this property is said to be normalized or in first normal form. ) â⬠¢Each column has a distinct name. â⬠¢The values of a column are all from the same do main. â⬠¢The order of columns has no significance. In other words, provided a column name is moved along with the column values, we can interchange columns. â⬠¢Each record is distinct; there are no duplicate records. The order of records has no significance, theoretically. 2. 3Discuss the differences between the candidate keys and the primary key of a table. Explain what is meant by a foreign key. How do foreign keys of tables relate to candidate keys? Give examples to illustrate your answer. The primary key is the candidate key that is selected to identify tuples uniquely within a relation. A foreign key is an attribute or set of attributes within one relation that matches the candidate key of some (possibly the same) relation. 2. 4What does a null represent? Represents a value for a column that is currently unknown or is not applicable for this record. 2. 5Define the two principal integrity rules for the relational model. Discuss why it is desirable to enforce these rules. Entity integrityIn a base table, no column of a primary key can be null. Referential integrityIf a foreign key exists in a table, either the foreign key value must match a candidate key value of some record in its home table or the foreign key value must be wholly null. Chapter 3 SQL and QBE ââ¬â Review questions 3. 1What are the two major components of SQL and what function do they serve? A data definition language (DDL) for defining the database structure. A data manipulation language (DML) for retrieving and updating data. 3. 2Explain the function of each of the clauses in the SELECT statement. What restrictions are imposed on these clauses? FROMspecifies the table or tables to be used; WHEREfilters the rows subject to some condition; GROUP BYforms groups of rows with the same column value; HAVINGfilters the groups subject to some condition; SELECTspecifies which columns are to appear in the output; ORDER BYspecifies the order of the output. 3. What restrictions apply to the use of the aggregate functions within the SELECT statement? How do nulls affect the aggregate functions? An aggregate function can be used only in the SELECT list and in the HAVING clause. Apart from COUNT(*), each function eliminates nulls first and operates only on the remaining non-null values. COUNT(*) counts all the rows of a table, regardless of whether nulls or duplicate values occur. 3. 4Explain how the GROUP BY clause works. What is the difference between the WHERE and HAVING clauses? SQL first applies the WHERE clause. Then it conceptually arranges he table based on the grouping column(s). Next, applies the HAVING clause and finally orders the result according to the ORDER BY clause. WHERE filters rows subject to some condition; HAVING filters groups subject to some condition. 3. 5What is the difference between a subquery and a join? Under what circumstances would you not be able to use a subquery? With a subquery, the columns specified in the SELECT list are restricted to one table. Thus, cannot use a subquery if the SELECT list contains columns from more than one table. 3. 6What is QBE and what is the relationship between QBE and SQL? QBE is an alternative, graphical-based, ââ¬Ëpoint-and-clickââ¬â¢ way of querying the database, which is particularly suited for queries that are not too complex, and can be expressed in terms of a few tables. QBE has acquired the reputation of being one of the easiest ways for non-technical users to obtain information from the database. QBE queries are converted into their equivalent SQL statements before transmission to the DBMS server. Chapter 4 Database Systems Development Lifecycle ââ¬â Review questions 4. 1Describe what is meant by the term ââ¬Ësoftware crisisââ¬â¢. The past few decades has witnessed the dramatic rise in the number of software applications. Many of these applications proved to be demanding, requiring constant maintenance. This maintenance involved correcting faults, implementing new user requirements, and modifying the software to run on new or upgraded platforms. With so much software around to support, the effort spent on maintenance began to absorb resources at an alarming rate. As a result, many major software projects were late, over budget, and the software produced was unreliable, difficult to maintain, and performed poorly. This led to what has become known as the ââ¬Ësoftware crisisââ¬â¢. Although this term was first used in the late 1960s, more than 30 years later, the crisis is still with us. As a result, some people now refer to the software crisis as the ââ¬Ësoftware depressionââ¬â¢. 4. 2Discuss the relationship between the information systems lifecycle and the database system development lifecycle. An information system is the resources that enable the collection, management, control, and dissemination of data/information throughout a company. The database is a fundamental component of an information system. The lifecycle of an information system is inherently linked to the lifecycle of the database that supports it. Typically, the stages of the information systems lifecycle include: planning, requirements collection and analysis, design (including database design), prototyping, implementation, testing, conversion, and operational maintenance. As a database is a fundamental component of the larger company-wide information system, the database system development lifecycle is inherently linked with the information systems lifecycle. 4. 3Briefly describe the stages of the database system development lifecycle. See Figure 4. Stages of the database system development lifecycle. Database planning is the management activities that allow the stages of the database system development lifecycle to be realized as efficiently and effectively as possible. System definition involves identifying the scope and boundaries of the database system including its major user views. A user view can represent a job role or business application area. Requirements collection and analysis is the process of collecting and analyzing information about the company that is to be supported by the database system, and using this information to identify the requirements for the new system. There are three approaches to dealing with multiple user views, namely the centralized approach, the view integration approach, and a combination of both. The centralized approach involves collating the usersââ¬â¢ requirements for different user views into a single list of requirements. A data model representing all the user views is created during the database design stage. The view integration approach involves leaving the usersââ¬â¢ requirements for each user view as separate lists of requirements. Data models representing each user view are created and then merged at a later stage of database design. Database design is the process of creating a design that will support the companyââ¬â¢s mission statement and mission objectives for the required database. This stage includes the logical and physical design of the database. The aim of DBMS selection is to select a system that meets the current and future requirements of the company, balanced against costs that include the purchase of the DBMS product and any additional software/hardware, and the costs associated with changeover and training. Application design involves designing the user interface and the application programs that use and process the database. This stage involves two main activities: transaction design and user interface design. Prototyping involves building a working model of the database system, which allows the designers or users to visualize and evaluate the system. Implementation is the physical realization of the database and application designs. Data conversion and loading involves transferring any existing data into the new database and converting any existing applications to run on the new database. Testing is the process of running the database system with the intent of finding errors. Operational maintenance is the process of monitoring and maintaining the system following installation. 4. 4Describe the purpose of creating a mission statement and mission objectives for the required database during the database planning stage. The mission statement defines the major aims of the database system, while each mission objective identifies a particular task that the database must support. 4. 5Discuss what a user view represents when designing a database system. A user view defines what is required of a database system from the perspective of a particular job (such as Manager or Supervisor) or business application area (such as marketing, personnel, or stock control). 4. 6Compare and contrast the centralized approach and view integration approach to managing the design of a database system with multiple user views. An important activity of the requirements collection and analysis stage is deciding how to deal with the situation where there is more than one user view. There are three approaches to dealing with multiple user views: â⬠¢the centralized approach, â⬠¢the view integration approach, and â⬠¢a combination of both approaches. Centralized approach Requirements for each user view are merged into a single list of requirements for the new database system. A logical data model representing all user views is created during the database design stage. The centralized approach involves collating the requirements for different user views into a single list of requirements. A data model representing all user views is created in the database design stage. A diagram representing the management of user views 1 to 3 using the centralized approach is shown in Figure 4. 4. Generally, this approach is preferred when there is a significant overlap in requirements for each user view and the database system is not overly complex. See Figure 4. 4 The centralized approach to managing multiple user views 1 to 3. View integration approach Requirements for each user view remain as separate lists. Data models representing each user view are created and then merged later during the database design stage. The view integration approach involves leaving the requirements for each user view as separate lists of requirements. We create data models representing each user view. A data model that represents a single user view is called a local logical data model. We then merge the local data models to create a global logical data model representing all user views of the company. A diagram representing the management of user views 1 to 3 using the view integration approach is shown in Figure 4. 5. Generally, this approach is preferred when there are significant differences between user views and the database system is sufficiently complex to justify dividing the work into more manageable parts. See Figure 4. 5 The view integration approach to managing multiple user views 1 to 3. For some complex database systems it may be appropriate to use a combination of both the centralized and view integration approaches to managing multiple user views. For example, the requirements for two or more users views may be first merged using the centralized approach and then used to create a local logical data model. (Therefore in this situation the local data model represents not just a single user view but the number of user views merged using the centralized approach). The local data models representing one or more user views are then merged using the view integration approach to form the global logical data model representing all user views. 4. 7Explain why it is necessary to select the target DBMS before beginning the physical database design phase. Database design is made up of two main phases called logical and physical design. During logical database design, we identify the important objects that need to be represented in the database and the relationships between these objects. During physical database design, we decide how the logical design is to be physically implemented (as tables) in the target DBMS. Therefore it is necessary to have selected the target DBMS before we are able to proceed to physical database design. See Figure 4. 1 Stages of the database system development lifecycle. 4. 8Discuss the two main activities associated with application design. The database and application design stages are parallel activities of the database system development lifecycle. In most cases, we cannot complete the application design until the design of the database itself has taken place. On the other hand, the database exists to support the applications, and so there must be a flow of information between application design and database design. The two main activities associated with the application design stage is the design of the user interface and the application programs that use and process the database. We must ensure that all the functionality stated in the requirements specifications is present in the application design for the database system. This involves designing the interaction between the user and the data, which we call transaction design. In addition to designing how the required functionality is to be achieved, we have to design an appropriate user interface to the database system. 4. 9Describe the potential benefits of developing a prototype database system. The purpose of developing a prototype database system is to allow users to use the prototype to identify the features of the system that work well, or are inadequate, and if possible to suggest improvements or even new features for the database system. In this way, we can greatly clarify the requirements and evaluate the feasibility of a particular system design. Prototypes should have the major advantage of being relatively inexpensive and quick to build. 4. 10Discuss the main activities associated with the implementation stage. The database implementation is achieved using the Data Definition Language (DDL) of the selected DBMS or a graphical user interface (GUI), which provides the same functionality while hiding the low-level DDL statements. The DDL statements are used to create the database structures and empty database files. Any specified user views are also implemented at this stage. The application programs are implemented using the preferred third or fourth generation language (3GL or 4GL). Parts of these application programs are the database transactions, which we implement using the Data Manipulation Language (DML) of the target DBMS, possibly embedded within a host programming language, such as Visual Basic (VB), VB. net, Python, Delphi, C, C++, C#, Java, COBOL, Fortran, Ada, or Pascal. We also implement the other components of the application design such as menu screens, data entry forms, and reports. Again, the target DBMS may have its own fourth generation tools that allow rapid development of applications through the provision of non-procedural query languages, reports generators, forms generators, and application generators. Security and integrity controls for the application are also implemented. Some of these controls are implemented using the DDL, but others may need to be defined outside the DDL using, for example, the supplied DBMS utilities or operating system controls. 4. 11Describe the purpose of the data conversion and loading stage. This stage is required only when a new database system is replacing an old system. Nowadays, itââ¬â¢s common for a DBMS to have a utility that loads existing files into the new database. The utility usually requires the specification of the source file and the target database, and then automatically converts the data to the required format of the new database files. Where applicable, it may be possible for the developer to convert and use application programs from the old system for use by the new system. 4. 2Explain the purpose of testing the database system. Before going live, the newly developed database system should be thoroughly tested. This is achieved using carefully planned test strategies and realistic data so that the entire testing process is methodically and rigorously carried out. Note that in our definition of testing we have not used the commonly held view that testing is the process of demonstrating that faults are not present. In fact, testing cannot show the abs ence of faults; it can show only that software faults are present. If testing is conducted successfully, it will uncover errors in the application programs and possibly the database structure. As a secondary benefit, testing demonstrates that the database and the application programs appear to be working according to their specification and that performance requirements appear to be satisfied. In addition, metrics collected from the testing stage provides a measure of software reliability and software quality. As with database design, the users of the new system should be involved in the testing process. The ideal situation for system testing is to have a test database on a separate hardware system, but often this is not available. If real data is to be used, it is essential to have backups taken in case of error. Testing should also cover usability of the database system. Ideally, an evaluation should be conducted against a usability specification. Examples of criteria that can be used to conduct the evaluation include (Sommerville, 2000): â⬠¢Learnability ââ¬â How long does it take a new user to become productive with the system? Performance ââ¬â How well does the system response match the userââ¬â¢s work practice? â⬠¢Robustness ââ¬â How tolerant is the system of user error? â⬠¢Recoverability ââ¬â How good is the system at recovering from user errors? â⬠¢Adapatability ââ¬â How closely is the system tied to a single model of work? Some of these criteria may be evaluated in other stages of the lifecycle. After testing is complete, the database sy stem is ready to be ââ¬Ësigned offââ¬â¢ and handed over to the users. 4. 13What are the main activities associated with operational maintenance stage. In this stage, the database system now moves into a maintenance stage, which involves the following activities: â⬠¢Monitoring the performance of the database system. If the performance falls below an acceptable level, the database may need to be tuned or reorganized. â⬠¢Maintaining and upgrading the database system (when required). New requirements are incorporated into the database system through the preceding stages of the lifecycle. Chapter 5 Database Administration and Security ââ¬â Review questions 5. 1Define the purpose and tasks associated with data administration and database administration. Data administration is the management and control of the corporate data, including database planning, development and maintenance of standards, policies and procedures, and logical database design. Database administration is the management and control of the physical realization of the corporate database system, including physical database design and implementation, setting security and integrity controls, monitoring system performance, and reorganizing the database as necessary. 5. 2Compare and contrast the main tasks carried out by the DA and DBA. The Data Administrator (DA) and Database Administrator (DBA) are responsible for managing and controlling the activities associated with the corporate data and the corporate database, respectively. The DA is more concerned with the early stages of the lifecycle, from planning through to logical database design. In contrast, the DBA is more concerned with the later stages, from application/physical database design to operational maintenance. Depending on the size and complexity of the organization and/or database system the DA and DBA can be the responsibility of one or more people. . 3Explain the purpose and scope of database security. Security considerations do not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database. Consequently, database security encompasses hardware, software, people, and data. To effectively implement security requires appropriate controls, which are defined in specific missi on objectives for the system. This need for security, while often having been neglected or overlooked in the past, is now increasingly recognized by organizations. The reason for this turn-around is due to the increasing amounts of crucial corporate data being stored on computer and the acceptance that any loss or unavailability of this data could be potentially disastrous. 5. 4List the main types of threat that could affect a database system, and for each, describe the possible outcomes for an organization. Figure 5. 1 A summary of the potential threats to computer systems. 5. 5Explain the following in terms of providing security for a database: authorization; views; backup and recovery; integrity; encryption; RAID. Authorization Authorization is the granting of a right or privilege that enables a subject to have legitimate access to a system or a systemââ¬â¢s object. Authorization controls can be built into the software, and govern not only what database system or object a specified user can access, but also what the user may do with it. The process of authorization involves authentication of a subject requesting access to an object, where ââ¬Ësubjectââ¬â¢ represents a user or program and ââ¬Ëobjectââ¬â¢ represents a database table, view, procedure, trigger, or any other object that can be created within the database system. Views A view is a virtual table that does not necessarily exist in the database but can be produced upon request by a particular user, at the time of request. The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users. The user is not aware of the existence of any columns or rows that are missing from the view. A view can be defined over several tables with a user being granted the appropriate privilege to use it, but not to use the base tables. In this way, using a view is more restrictive than simply having certain privileges granted to a user on the base table(s). Backup and recovery Backup is the process of periodically taking a copy of the database and log file (and possibly programs) onto offline storage media. A DBMS should provide backup facilities to assist with the recovery of a database following failure. To keep track of database transactions, the DBMS maintains a special file called a log file (or journal) that contains information about all updates to the database. It is always advisable to make backup copies of the database and log file at regular intervals and to ensure that the copies are in a secure location. In the event of a failure that renders the database unusable, the backup copy and the details captured in the log file are used to restore the database to the latest possible consistent state. Journaling is the process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure. Integrity constraints Contribute to maintaining a secure database system by preventing data from becoming invalid, and hence giving misleading or incorrect results. Encryption Is the encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. If a database system holds particularly sensitive data, it may be deemed necessary to encode it as a precaution against possible external threats or attempts to access it. Some DBMSs provide an encryption facility for this purpose. The DBMS can access the data (after decoding it), although there is degradation in performance because of the time taken to decode it. Encryption also protects data transmitted over communication lines. There are a number of techniques for encoding data to conceal the information; some are termed irreversible and others reversible. Irreversible techniques, as the name implies, do not permit the original data to be known. However, the data can be used to obtain valid statistical information. Reversible techniques are more commonly used. To transmit data securely over insecure networks requires the use of a cryptosystem, which includes: â⬠¢an encryption key to encrypt the data (plaintext); â⬠¢an encryption algorithm that, with the encryption key, transforms the plain text into ciphertext; â⬠¢a decryption key to decrypt the ciphertext; a decryption algorithm that, with the decryption key, transforms the ciphertext back into plain text. Redundant Array of Independent Disks (RAID) RAID works by having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. The hardware that the DBMS is running on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails. This suggests having redundant components that can be seamlessly integrated into the working system whenever there is one or more component failures. The main hardware components that should be fault-tolerant include disk drives, disk controllers, CPU, power supplies, and cooling fans. Disk drives are the most vulnerable components with the shortest times between failures of any of the hardware components. One solution is the use of Redundant Array of Independent Disks (RAID) technology. RAID works by having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. Chapter 6 Fact-Finding ââ¬â Review questions 6. Briefly describe what the process of fact-finding attempts to achieve for a database developer. Fact-finding is the formal process of using techniques such as interviews and questionnaires to collect facts about systems, requirements, and preferences. The database developer uses fact-finding techniques at various stages throughout the database systems lifecycle to capture the necessary facts to build the required databa se system. The necessary facts cover the business and the users of the database system, including the terminology, problems, opportunities, constraints, requirements, and priorities. These facts are captured using fact-finding techniques. 6. 2Describe how fact-finding is used throughout the stages of the database system development lifecycle. There are many occasions for fact-finding during the database system development lifecycle. However, fact-finding is particularly crucial to the early stages of the lifecycle, including the database planning, system definition, and requirements collection and analysis stages. Itââ¬â¢s during these early stages that the database developer learns about the terminology, problems, opportunities, constraints, requirements, and priorities of the business and the users of the system. Fact-finding is also used during database design and the later stages of the lifecycle, but to a lesser extent. For example, during physical database design, fact-finding becomes technical as the developer attempts to learn more about the DBMS selected for the database system. Also, during the final stage, operational maintenance, fact-finding is used to determine whether a system requires tuning to improve performance or further developed to include new requirements. 6. 3For each stage of the database system development lifecycle identify examples of the facts captured and the documentation produced. . 4A database developer normally uses several fact-finding techniques during a single database project. The five most commonly used techniques are examining documentation, interviewing, observing the business in operation, conducting research, and using questionnaires. Describe each fact-finding technique and identify the advantages and disadvantages of each. Examining documentation can be useful when youââ¬â¢re trying to gain some insight as to how the need for a database arose. You may also find that documentation can be helpful to provide information on the business (or part of the business) associated with the problem. If the problem relates to the current system there should be documentation associated with that system. Examining documents, forms, reports, and files associated with the current system, is a good way to quickly gain some understanding of the system. Interviewing is the most commonly used, and normally most useful, fact-finding technique. You can interview to collect information from individuals face-to-face. There can be several objectives to using interviewing such as finding out facts, checking facts, generating user interest and feelings of involvement, identifying requirements, and gathering ideas and opinions. Observation is one of the most effective fact-finding techniques you can use to understand a system. With this technique, you can either parà ¬ticipate in, or watch a person perform activities to learn about the system. This technique is particularly useful when the validity of data collected through other methods is in question or when the complexity of certain aspects of the system prevents a clear explanation by the end-users. A useful fact-finding technique is to research the application and probà ¬lem. Computer trade journals, reference books, and the Internet are good sources of information. They can provide you with information on how others have solved similar probà ¬lems, plus you can learn whether or not software packages exist to solve your problem. Another fact-finding technique is to conduct surveys through questionnaires. Questionnaires are special-purpose documents that allow you to gather facts from a large number of people while maintaining some control over their responses. When dealing with a large audience, no other fact-finding technique can tabulate the same facts as efficiently. 6. 5Describe the purpose of defining a mission statement and mission objectives for a database system. The mission statement defines the major aims of the database system. Those driving the database project within the business (such as the Director and/or owner) normally define the mission statement. A mission statement helps to clarify the purpose of the database project and provides a clearer path towards the efficient and effective creation of the required database system. Once the mission statement is defined, the next activity involves identifying the mission objectives. Each mission objective should identify a particular task that the database must support. The assumption is that if the database supports the mission objectives then the mission statement should be met. The mission statement and objectives may be accompanied with additional information that specifies, in general terms, the work to be done, the resources with which to do it, and the money to pay for it all. 6. 6What is the purpose of the systems definition stage? The purpose of the system definition stage is to identify the scope and boundary of the database system and its major user views. Defining the scope and boundary of the database system helps to identify the main types of data mentioned in the interviews and a rough guide as to how this data is related. A user view represents the requirements that should be supported by a database system as defined by a particular job role (such as Manager or Assistant) or business application area (such as video rentals or stock control). 6. How do the contents of a usersââ¬â¢ requirements specification differ from a systems specification? There are two main documents created during the requirements collection and analysis stage, namely the usersââ¬â¢ requirements specification and the systems specification. The usersââ¬â¢ requirements specification describes in detail the data to be held in the database and how the data is to be used. The systems specification describes any features to be i ncluded in the database system such as the required performance and the levels of security. 6. Describe one approach to deciding whether to use centralized, view integration, or a combination of both when developing a database system for multiple user views. One way to help you make a decision whether to use the centralized, view integration, or a combination of both approaches to manage multiple user views is to examine the overlap in terms of the data used between the user views identified during the system definition stage. Itââ¬â¢s difficult to give precise rules as to when itââ¬â¢s appropriate to use the centralized or view integration approaches. As the database developer, you should base your decision on an assessment of the complexity of the database system and the degree of overlap between the various user views. However, whether you use the centralized or view integration approach or a mixture of both to build the underlying database, ultimately you need to create the original user views for the working database system. Chapter 7 Entity-Relationship Modeling ââ¬â Review questions 7. 1Describe what entities represent in an ER model and provide examples of entities with a physical or conceptual existence. Entity is a set of objects with the same properties, which are identified by a user or company as having an independent existence. Each object, which should be uniquely identifiable within the set, is called an entity occurrence. An entity has an independent existence and can represent objects with a physical (or ââ¬Ërealââ¬â¢) existence or objects with a conceptual (or ââ¬Ëabstractââ¬â¢) existence. 7. 2Describe what relationships represent in an ER model and provide examples of unary, binary, and ternary relationships. Relationship is a set of meaningful associations among entities. As with entities, each association should be uniquely identifiable within the set. A uniquely identifiable association is called a relationship occurrence. Each relationship is given a name that describes its function. For example, the Actor entity is associated with the Role entity through a relationship called Plays, and the Role entity is associated with the Video entity through a relationship called Features. The entities involved in a particular relationship are referred to as participants. The number of participants in a relationship is called the degree and indicates the number of entities involved in a relationship. A relationship of degree one is called unary, which is commonly referred to as a recursive relationship. A unary relationship describes a relationship where the same entity participates more than once in different roles. An example of a unary relationship is Supervises, which represents an association of staff with a supervisor where the supervisor is also a member of staff. In other words, the Staff entity participates twice in the Supervises relationship; the first participation as a supervisor, and the second participation as a member of staff who is supervised (supervisee). See Figure 7. 5 for a diagrammatic representation of the Supervises relationship. A relationship of degree two is called binary. A relationship of a degree higher than binary is called a complex relationship. A relationship of degree three is called ternary. An example of a ternary relationship is Registers with three participating entities, namely Branch, Staff, and Member. The purpose of this relationship is to represent the situation where a member of staff registers a member at a particular branch, allowing for members to register at more than one branch, and members of staff to move between branches. Figure 7. 4 Example of a ternary relationship called Registers. 7. 3Describe what attributes represent in an ER model and provide examples of simple, composite, single-value, multi-value, and derived attributes. An attribute is a property of an entity or a relationship. Attributes represent what we want to know about entities. For example, a Video entity may be described by the catalogNo, title, category, dailyRental, and price attributes. These attributes hold values that describe each video occurrence, and represent the main source of data stored in the database. Simple attribute is an attribute composed of a single component. Simple attributes cannot be further subdivided. Examples of simple attributes include the category and price attributes for a video. Composite attribute is an attribute composed of multiple components. Composite attributes can be further divided to yield smaller components with an independent existence. For example, the name attribute of the Member entity with the value ââ¬ËDon Nelsonââ¬â¢ can be subdivided into fName (ââ¬ËDonââ¬â¢) and lName (ââ¬ËNelsonââ¬â¢). Single-valued attribute is an attribute that holds a single value for an entity occurrence. The majority of attributes are single-valued for a particular entity. For example, each occurrence of the Video entity has a single-value for the catalogNo attribute (for example, 207132), and therefore the catalogNo attribute is referred to as being single-valued. Multi-valued attribute is an attribute that holds multiple values for an entity occurrence. Some attributes have multiple values for a particular entity. For example, each occurrence of the Video entity may have multiple values for the category attribute (for example, ââ¬ËChildrenââ¬â¢ and ââ¬ËComedyââ¬â¢), and therefore the category attribute in this case would be multi-valued. A multi-valued attribute may have a set of values with specified lower and upper limits. For example, the category attribute may have between one and three values. Derived attribute is an attribute that represents a value that is derivable from the value of a related attribute, or set of attributes, not necessarily in the same entity. Some attributes may be related for a particular entity. For example, the age of a member of staff (age) is derivable from the date of birth (DOB) attribute, and therefore the age and DOB attributes are related. We refer to the age attribute as a derived attribute, the value of which is derived from the DOB attribute. 7. 4Describe what multiplicity represents for a relationship. Multiplicity is the number of occurrences of one entity that may relate to a single occurrence of an associated entity. 7. 5What are business rules and how does multiplicity model these constraints? Multiplicity constrains the number of entity occurrences that relate to other entity occurrences through a particular relationship. Multiplicity is a representation of the policies established by the user or company, and is referred to as a business rule. Ensuring that all appropriate business rules are identified and represented is an important part of modeling a company. The multiplicity for a binary relationship is generally referred to as one-to-one (1:1), one-to-many (1:*), or many-to-many (*:*). Examples of three types of relationships include: â⬠¢A member of staff manages a branch. A branch has members of staff. â⬠¢Actors play in videos. 7. 6How does multiplicity represent both the cardinality and the participation constraints on a relationship? Multiplicity actually consists of two separate constraints known as cardinality and participation. Cardinality describes the number of possible relationships for each participating entity. Participation determines whether all o r only some entity occurrences participate in a relationship. The cardinality of a binary relationship is what we have been referring to as one-to-one, one-to-many, and many-to-many. A participation constraint represents whether all entity occurrences are involved in a particular relationship (mandatory participation) or only some (optional participation). The cardinality and participation constraints for the Staff Manages Branch relationship are shown in Figure 7. 11. 7. 7Provide an example of a relationship with attributes. An example of a relationship with an attribute is the relationship called PlaysIn, which associates the Actor and Video entities. We may wish to record the character played by an actor in a given video. This information is associated with the PlaysIn relationship rather than the Actor or Video entities. We create an attribute called character to store this information and assign it to the PlaysIn relationship, as illustrated in Figure 7. 12. Note, in this figure the character attribute is shown using the symbol for an entity; however, to distinguish between a relationship with an attribute and an entity, the rectangle representing the attribute is associated with the relationship using a dashed line. Figure 7. 12 A relationship called PlaysIn with an attribute called character. . 8Describe how strong and weak entities differ and provide an example of each. We can classify entities as being either strong or weak. A strong entity is not dependent on the existence of another entity for its primary key. A weak entity is partially or wholly dependent on the existence of another entity, or entities, for its primary key. For example, as we can distinguish one actor from all other actors an d one video from all other videos without the existence of any other entity, Actor and Video are referred to as being strong entities. In other words, the Actor and Video entities are strong because they have their own primary keys. An example of a weak entity called Role, which represents characters played by actors in videos. If we are unable to uniquely identify one Role entity occurrence from another without the existence of the Actor and Video entities, then Role is referred to as being a weak entity. In other words, the Role entity is weak because it has no primary key of its own. Figure 7. 6 Diagrammatic representation of attributes for the Video, Role, and Actor entities. Strong entities are sometimes referred to as parent, owner, or dominant entities and weak entities as child, dependent, or subordinate entities. 7. 9Describe how fan and chasm traps can occur in an ER model and how they can be resolved. Fan and chasm traps are two types of connection traps that can occur in ER models. The traps normally occur due to a misinterpretation of the meaning of certain relationships. In general, to identify connection traps we must ensure that the meaning of a relationship (and the business rule that it represents) is fully understood and clearly defined. If we donââ¬â¢t understand the relationships we may create a model that is not a true representation of the ââ¬Ëreal worldââ¬â¢. A fan trap may occur when two entities have a 1:* relationship that fan out from a third entity, but the two entities should have a direct relationship between them to provide the necessary information. A fan trap may be resolved through the addition of a direct relationship between the two entities that were originally separated by the third entity. A chasm trap may occur when an ER model suggests the existence of a relationship between entities, but the pathway does not exist between certain entity occurrences. More specifically, a chasm trap may occur where there is a relationship with optional participation that forms part of the pathway between the entities that are related. Again, a chasm trap may be resolved by the addition of a direct relationship between the two entities that were originally related through a pathway that included optional participation. Chapter 8 Normalization ââ¬â Review questions 8. 1Discuss how normalization may be used in database design. Normalization can be used in database design in two ways: the first is to use ormalization as a bottom-up approach to database design; the second is to use normalization in conjunction with ER modeling. Using normalization as a bottom-up approach involves analyzing the associations between attributes and, based on this analysis, grouping the attributes together to form tables that represent entities and relationships. However, this approach becomes difficult with a large number of attributes, where itââ¬â¢s difficult to establish all the important associations between the attributes. Alternatively, you can use a top-down approach to database design. In this approach, we use ER modeling to create a data model that represents the main entities and relationships. We then translate the ER model into a set of tables that represents this data. Itââ¬â¢s at this point that we use normalization to check whether the tables are well designed. 8. 2Describe the types of update anomalies that may occur on a table that has redundant data. Tables that have redundant data may have problems called update anomalies, which are classified as insertion, deletion, or modification anomalies. See Figure 8. 2 for an example of a table with redundant data called StaffBranch. There are two main types of insertion anomalies, which we illustrate using this table. Insertion anomalies (1)To insert the details of a new member of staff located at a given branch into the StaffBranch table, we must also enter the correct details for that branch. For example, to insert the details of a new member of staff at branch B002, we must enter the correct details of branch B002 so that the branch details are consistent with values for branch B002 in other records of the StaffBranch table. The data shown in the StaffBranch table is also shown in the Staff and Branch tables shown in Figure 8. 1. These tables do have redundant data and do not suffer from this potential inconsistency, because for each staff member we only enter the appropriate branch number into the Staff table. In addition, the details of branch B002 are recorded only once in the database as a single record in the Branch table. (2)To insert details of a new branch that currently has no members of staff into the StaffBranch table, itââ¬â¢s necessary to enter nulls into the staff-related columns, such as staffNo. However, as staffNo is the primary key for the StaffBranch table, attempting to enter nulls for staffNo violates entity integrity, and is not allowed. The design of the tables shown in Figure 8. 1 avoids this problem because new branch details are entered into the Branch table separately from the staff details. The details of staff ultimately located at a new branch can be entered into the Staff table at a later date. Deletion anomalies If we delete a record from the StaffBranch table that represents the last member of staff located at a branch, the details about that branch are also lost from the database. For example, if we delete the record for staff Art Peters (S0415) from the StaffBranch table, the details relating to branch B003 are lost from the database. The design of the tables in Figure 8. 1 avoids this problem because branch records are stored separately from staff records and only the column branchNo relates the two tables. If we delete the record for staff Art Peters (S0415) from the Staff table, the details on branch B003 in the Branch table remain unaffected. Modification anomalies If we want to change the value of one of the columns of a particular branch in the StaffBranch table, for example the telephone number for branch B001, we must update the records of all staff located at that branch. If this modification is not carried out on all the appropriate records of the StaffBranch table, the database will become inconsistent. In this example, branch B001 would have different telephone numbers in different staff records. The above examples illustrate that the Staff and Branch tables of Figure 8. 1 have more desirable properties than the StaffBranch table of Figure 8. 2. In the following sections, we examine how normal forms can be used to formalize the identification of tables that have desirable properties from those that may potentially suffer from update anomalies. . 3Describe the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF. The rule for first normal form (1NF) is a table in which the intersection of every column and record contains only one value. In other words a table that contains more than one atomic value in the intersection of one or more column for one or more records is not in 1NF. The non 1NF table can be converted to 1NF by restructuring original table by removing the column with the multi-values along with a copy of the primary key to create a new table. See Figure 8. 4 for an example of this approach. The advantage of this approach is that the resultant tables may be in normal forms later that 1NF. 8. 4What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form. Only first normal form (1NF) is critical in creating appropriate tables for relational databases. All the subsequent normal forms are optional. However, to avoid the update anomalies discussed in Section 8. 2, itââ¬â¢s normally recommended that you proceed to third normal form (3NF). First normal form (1NF) is a table in which the intersection of every column and record contains only one value. 8. 5Describe an approach to converting a first normal form (1NF) table to second normal form (2NF) table(s). Second normal form applies only to tables with composite primary keys, that is, tables with a primary key composed of two or more columns. A 1NF table with a single column primary key is automatically in at least 2NF. A second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can be worked out from the values in all the columns that makes up the primary key. A table in 1NF can be converted into 2NF by removing the columns that can be worked out from only part of the primary key. These columns are placed in a new table along with a copy of the part of the primary key that they can be worked out from. 8. 6Describe the characteristics of a table in second normal form (2NF). Second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can only be worked out from the values in all the columns that make up the primary key. 8. Describe what is meant by full functional dependency and describe how this type of dependency relates to 2NF. Provide an example to illustrate your answer. The formal definition of second normal form (2NF) is a table that is in first normal form and every non-primary-key column is fully functionally dependent on the primary key. Full functional dependency indicates that if A and B are columns of a table, B is fully functionally dependent on A, if B is not dependent on a ny subset of A. If B is dependent on a subset of A, this is referred to as a partial dependency. If a partial dependency exists on the primary key, the table is not in 2NF. The partial dependency must be removed for a table to achieve 2NF. See Section 8. 4 for an example. 8. 8Describe the characteristics of a table in third normal form (3NF). Third normal form (3NF) is a table that is already in 1NF and 2NF, and in which the values in all non-primary-key columns can be worked out from only the primary key (or candidate key) column(s) and no other columns. 8. 9Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer. The formal definition for third normal form (3NF) is a table that is in first and second normal forms and in which no non-primary-key column is transitively dependent on the primary key. Transitive dependency is a type of functional dependency that occurs when a particular type of relationship holds between columns of a table. For example, consider a table with columns A, B, and C. If B is functionally dependent on A (A ? B) and C is functionally dependent on B (B ? C), then C is transitively dependent on A via B (provided that A is not functionally dependent on B or C). If a transitive dependency exists on the primary key, the table is not in 3NF. The transitive dependency must be removed for a table to achieve 3NF. See Section 8. 5 for an example. Chapter 9 Logical Database Design ââ¬â Step 1- Review questions 9. 1Describe the purpose of a design methodology. A design methodology is a structured approach that uses procedures, techniques, tools, and documentation aids to support and facilitate the process of design. 9. 2Describe the main phases involved in database design. Database design is made up of two main phases: logical and physical database design. Logical database design is the process of constructing a model of the data used in a company based on a specific data model, but independent of a particular DBMS and other physical considerations. In the logical database design phase we build the logical representation of the database, which includes identification of the important entities and relationships, and then translate this representation to a set of tables. The logical data model is a source of information for the physical design phase, providing the physical database designer with a vehicle for making tradeoffs that are very important to the design of an efficient database. Physical database design is the process of producing a description of the implementation of the database on secondary storage; it describes the base tables, file organizations, and indexes used to achieve efficient access to the data, and any associated integrity constraints and security restrictions. In the physical database design phase we decide how the logical design is to be physically implemented in the target relational DBMS. This phase allows the designer to make decisions on how the database is to be implemented. Therefore, physical design is tailored to a specific DBMS. . 3Identify important factors in the success of database design. The following are important factors to the success of database design: â⬠¢Work interactively with the users as much as possible. â⬠¢Follow a structured methodology throughout the data modeling process. â⬠¢Employ a data-driven approach. â⬠¢Incorporate structural and integrity considerations into the data models. â⬠¢Use normal ization and transaction validation techniques in the methodology. â⬠¢Use diagrams to represent as much of the data models as possible. â⬠¢Use a database design language (DBDL). Build a data dictionary to supplement the data model diagrams. â⬠¢Be willing to repeat steps. 9. 4Discuss the important role played by users in the process of database design. Users play an essential role in confirming that the logical database design is meeting their requirements. Logical database design is made up of two steps and at the end of each step (Steps 1. 9 and 2. 5) users are required to review the design and provide feedback to the designer. Once the logical database design has been ââ¬Ësigned offââ¬â¢ by the users the designer can continue to the physical d How to cite Database Solutions, Essay examples
Monday, May 4, 2020
Little field free essay sample
In early January 2006, Littlefield Technologies (LT) opened its first and only factory to produce its newly developed Digital Satellite System (DSS) receivers. Littlefield Technologies mainly sells to retailers and small manufacturers using the DSSââ¬â¢s in more complex products. Littlefield Technologies charges a premium and competes by promising to ship a receiver within 24 hours of receiving the order, or the customer will receive a rebate based on the delay. The product lifetime of many high-tech electronic products is short, and the DSS receiver is no exception. LT managers have decided that, after 268 days of operation, the plant will cease producing the DSS receiver, retool the factory, and sell any remaining inventories. As this is a short life-cycle product, managers expect that demand during the 268 day period will grow as customers discover the product, eventually level out, and then decline. In the initial months, demand is expected to grow at a roughly linear rate. Demand is then expected to stabilize. Eventually, demand should begin to decline at a roughly linear rate. Although orders arrive randomly to LT, management expects that, on average, demand will follow the trends outlined above. Managementââ¬â¢s main concern is managing the capacity of the factory in response to the complex demand pattern. Delays resulting from insufficient capacity undermine LTââ¬â¢s promised lead times and ultimately force LT to turn away orders. In particular, if an orderââ¬â¢s lead time exceeds the quoted lead time, then the revenue for that order decreases linearly, from $1000 for the quoted lead time (24 hours) to $0 for the maximum lead time (72 hours). Assignment It is now mid-February 2006, and LT has started to notice that a few of their receivers have been delivered after their due dates. In response, management has installed a high-powered operations team (your team) to manage the factoryââ¬â¢s capacity. For the next 168 simulated days (one week in real-time), your team must buy and/or sell machines to maximize the factoryââ¬â¢s overall cash position after the 268 days. Currently, the factory has one board stuffing machine (at Station 1), one tester machine (at Station 2), and one tuning machine (at Station 3). The number of machines can be changed at each station by clicking on a station, and then clicking on ââ¬Å"Edit Dataâ⬠in the menu that pops up. You may also change the way testing is scheduled. Currently, jobs at the tester are scheduled First-In-First-Out (FIFO), but you can give priority status either to the short initial tests (Step 2) or to the long final tests (Step 4). When the assignment begins, there will already be 50 days of history available for your review, representing the period from early January through mid February. The factory simulator will run at a rate of 1 simulated day per 1 real hour for the next week. After the assignment window ends, an additional 50 days of simulation will be executed at once. Thus, there will be a total of 268 days of simulation corresponding to a product life time of about 9 months. Full control of the Littlefield Technologies factory will be turned over to your capable hands at 2pm on Thursday, February 9, 2006. For three days prior to that time (from Monday, February 6 through the start time on Thursday), you will be allowed to access the Littlefield factory in order to observe, download and analyze data from the first 50 days of operations. After this simulation is over, you can check the status of your factory, but the factory will no longer be running. You can (and should) use your teamââ¬â¢s knowledge of forecasting and capacity management, including the concepts and tools from your textbook, to help LT managers maximize their profit. Your data analyses do not have to be super-sophisticated ââ¬â in fact, simpler is often better â⬠¦ sometimes even a graph will do ââ¬â you just need to demonstrate that your data analysis supports the actions you take within the factory. Case Questions to Answer in Your Deliverable As part of their contract with you, Littlefield managers want your team to perform data analyses supporting the actions you take in their factory. Managers want you to answer the following: 1Using data from the period prior to Day 50, estimate the capacity of the machine at Station 1. Can you do the same for the machines in Station 2 and Station 3? (Hint: What seems to be the maximum number of jobs processed by a machine in one day during this period? ) 2. Using demand data, forecast (i) total demand on Day 100, and (ii) capacity (machine) requirements for Day 100. (Hint: Assume demand was very close to zero on Day 1. Also, see Appendix 1 for some helpful hints on forecasting using Excel. ) 3. Around Day 100, create forecasts for (i) total demand on Days 130, 150, and 170, and (ii) related capacity (machine) requirements. Choose your own data periods. List any assumptions you made to create your forecasts. ) How well did you do with these forecasts? 4. Predict on which days (i) demand levels out, and (ii) demand starts to decrease? (Hint: Use a moving average (MA) to track the demand over time. See Appendix 2 for helpful hints. ) Team Deliverable Your team should turn in a 2-3 page summary of what actions you took during the week you had access to the factory, why you took those actions, and in retrospect whether you think your team did the right thing. Show analysis to justify your conclusions. The top-performing team in each class will be invited to present their capacity management approach during a subsequent class session. Report Guidelines Your report should be single-spaced, and should be written as a memo to the managers of Littlefield Technologies. Your summary should be about 2-3 pages in length. A structure for a good report will include the following sections: Introduction Problem Statement Recommendations/Actions Taken This section may include data analysis, equations, etc. Resulting Outcomes Evaluation of Outcomes Appendix (optional, but highly recommended)* Up to 2 pages of data analysis, equations, etc. *You are allowed to include an appendix (up to two additional pages) that presents regressions, forecast equations, or any other data analysis you perform during your control of the factory. Grading Your teamââ¬â¢s grade will be based on the content of your report. The top performing team in each class will receive 10 points extra credit added to their case score, which includes credit for their class presentation. The second and third best performing teams in each class will receive 4 and 2 points extra credit added to their case score, respectively. Grading on your written report will be at the instructorââ¬â¢s discretion. Note that insightful, in-depth analyses of why your team did or did not do well can bring up your grade, regardless of your actual simulation performance. Helpful Resources ââ¬â Statistical Analysis/Forecasting/Capacity Analysis If you are unsure about how to perform a regression analysis or other data analysis using the data from the Littlefield Technologies system, stop by during office hours and ask your MD021 instructor. He/she can show your team how to perform useful data analysis using Excel or SPSS. Helpful Resources ââ¬â Littlefield System MBA student Kevin Phillips will hold office hours in Fulton 413 on Monday, February 6 and Wednesday, February 8, 12-4pm, and on Friday, February 10, 9am-1pm. Teams and/or team leaders will be able to ask Kevin questions about using the Littlefield Technologies online website, how to log into it, how to buy/sell machines, how to download data to Excel, and any other question related to the Littlefield Technologies website. Kevin will not answer any questions about how to solve the case ââ¬â he doesnââ¬â¢t know the answer. Appendix 1 ââ¬â Forecasting With Excel Since you have been told that demand is increasing linearly on average, and demand will be increasing during the forecast period, you will need to construct a trend forecast (see Stevenson, p. 77). Thus, your forecast equation will be: Yt = ? + ? t In order to construct this forecast, we need to estimate the slope (? ) and the intercept (? ). Since demand is 0 on Day 0 and still very close to 0 on Day 1, assume that ? = 0. Then, you only need to calculate the slope (? ). In Excel, you can calculate the slope for a trend forecast using the regression SLOPE(known_yââ¬â¢s, known_xââ¬â¢s) function. Create a column of integers from 1 to X (representing Days 1 to X) ââ¬â these will be your known_x values. Download the observed customer demand data (i. e. , customer job arrivals) from the Littlefield simulation for these same days. Place them in a column next to your known_x values. You should now have two columns of the same length. The column of demand data is your known_y values. Put the ranges into the function, and viola, it will calculate an estimate of the slope (? ) for you. You can then plug into the above forecasting equation. Remember that the estimated value of ?should become more accurate as you collect more data during the simulation (at least while demand is still moving in the same direction), so you may want to update your forecasts as you go along. For more information on using these in Excel, search for the terms ââ¬Å"slopeâ⬠or ââ¬Å"regressionâ⬠in the Excel Help window. Appendix 2 ââ¬â Tracking Data Using Moving Averages Sometimes operati ons analysts want to track historical data sets, and smooth out the data. Smoothing data helps to remove the randomness, and thus, provides a better idea of the underlying direction of the data on individual days. Moving average indexes can help one do this, by averaging out the randomness on an individual day. A common index to use is a centered moving average. For example, a 3-period centered moving average of demand for Tuesday would be calculated as: Moving_Average_DemandTuesday = (DemandMonday + DemandTuesday + DemandWednesday)/3 In the Littlefield simulation, where demand is known to be increasing and/or decreasing throughout certain long periods during the simulation, such an index helps to average out the increases/decreases before and after acertain day, leaving the analyst with a better estimate of average demand on each day. In your analysis, you may want to try out a few different centered moving averages ââ¬â Iââ¬â¢ve found that longer centered moving averages (e. g. 9 period or 11 period centered moving averages, or even longer) tend to work better on the Littlefield data. Once you calculate such moving averages, you can then simply examine the average values by eye to det ermine where the demand data seems to level off and where it starts to decrease.
Subscribe to:
Posts (Atom)