ddd (2)
TRANSCRIPT
MARKER’S COMMENT:
MODERATOR’S COMMENT:________________________________
_______________________________________________________
_______________________________________________________
CANDIDATE NAME :
CANDIDATE NO :
AWARD : IADCS
MODULE TITLE : DDD
PROJECT TITLE :
Statement and Confirmation of Own work
Programme Qualification Name: International Diploma in Computer Studies
All submitted work must have this form as the cover page/ first page. Please include this form as part of a standard format when submitting an assignment.
Student Declaration
I have read and understood NCC Education’s regulations on plagiarism. I can confirm the following details:
Student ID/ Registration Number :
Name :
Module Name : SAD
Title of Work : DOCUMENT MANAGEMENT PROFFESSIONAL SERVICES
Module leader : MR Courage
Number of Words :
I confirm that this work is my own work and that I have not plagiarized any part of it. I have also noted the grading criteria and pass mark for assignments.
Due Date : 13 November 2009
Student Signature :
Submitted Date : 12 November 2009
Task 1
Entity relation Data Model
Task 2
Consultant Table
*Consultant ID Primary key
Project ID* Foreign key
Name
Address
Telephone number Project name(s),
Consultancy fee per hour
Project Table
*Project ID - primary key field
Company ID * - foreign Key
Project name,
Duration
Start date
End date
Academic name
Roles
External consultants
Company name
Cost of project
Outcome
Company Table
*Company id Primary Key
Company name
Address,
Contact person,
Contact telephone
Project name(s).
Academic Table
*Academic ID Primary Key
Full name
Age
Address
Nationality
Qualifications
Department
Current post
Grade
Starting date
Current consultancy rate
Salary
TASK 3: Normalisation
normalization (also spelled normalisation) is any process that makes something more normal, which typically means conforming to some regularity or rule, or returning from some state of abnormality
INF
2NF
3NF
ProjectsProjectIdProjectName
AcademicprojectsProjectIdAcademicIdAcademicNameAcademicRoleAcademicTimeAcademicSalaryStartDateEndDateCompleteOutcome
ProjectsProjectIdProjectName
AcademicsAcademicIdAcademicNameAcademicAddressContactPhone
ProjectsundertakenProjectIdAcademicIdAcademicRoleAcademicTimeAcademicSalaryStartDateEndDateStatusOutcome
AcademicsalaryAcademicIdAcademicGradeAcademicSalary
ProjectsProjectIdProjectName
AcademicsAcademicIdAcademicNameAcademicAddressContactPhone
ProjectsundertakenProjectIdAcademicIdAcademicRoleAcademicTimeStartDateEndDateStatusOutcome
3NF
UNF2
ConsultantsprojectsProjectId ConsultantId ConsultantName ProjectNameConsultantTypeCompanyIdCompanyNameContactPersonConsultantRate
AcademicsalaryAcademicIdAcademicGradeAcademicSalary
ProjectsProjectIdProjectName
AcademicsAcademicIdAcademicNameAcademicAddressContactPhone
ProjectsundertakenProjectIdAcademicIdAcademicRoleAcademicTimeStartDateEndDateStatusOutcome
1NF
2NF
3NF
ProjectsProjectIdProjectName
ConsultantsprojectsProjectIdConsultantIdConsultantNameConsultantTypeCompanyIdCompanyNameContactPersonConsultantRate
ProjectsProjectIdProjectName
CompanyCompanyIdCompanyNameAddressPhone
ConsultantsprojectsProjectIdConsultantIdConsultantNameConsultantTypeCompanyIdContactPersonConsultantRate
ProjectsProjectIdProjectName
CompanyCompanyIdCompanyNameAddressPhone
ProjectsundertakenProjectIdConsultantIdCompanyIdContactPersonConsultantRate
BCNF
ConsultantsConsultantIdConsultantNameConsultantTypeAddressPhone
ConsultantsConsultantIdConsultantNameConsultantTypeAddressPhone
ProjectsProjectIdProjectName
CompanyCompanyIdCompanyNameAddressPhone
ProjectsundertakenProjectIdConsultantIdCompanyIdContactPersonConsultantRate
UNF3
1NF
2NF
DepartmentDepartmentIdDepartmentNameAcademicIdAcademicNameNationalityAcademicAddressQualifications
DepartmentDepartmentIdDepartmentName
AcademicdepartmentDepartmentIdAcademicIdAcademicNameNationalityAcademicAddressQualifications
DepartmentDepartmentIdDepartmentName
AcademicAcademicIdAcademicNameNationalityAcademicAddressQualifications
AcademicdepartmentDepartmentIdAcademicId
3NF
BCNF
DepartmentDepartmentIdDepartmentName
AcademicAcademicIdAcademicNameNationalityAcademicAddressQualifications
AcademicdepartmentDepartmentIdAcademicId
DepartmentDepartmentIdDepartmentName
AcademicAcademicIdAcademicNameNationalityAcademicAddressQualifications
AcademicdepartmentDepartmentIdAcademicId
TASK 4
After normalization, Using Ms Access 2007 I created the database below with the following tables.
Database tables and the populated data:
PM – Project Manager, D – Developer, PR – Principal Researcher
TASK 5
5a) The SQL statement
SELECT Projectsundertaken.ProjectId, Projects.ProjectName, Academics.AcademicName, Projectsundertaken.AcademicRole, Projectsundertaken.StartDate, Projectsundertaken.EndTime, Projectsundertaken.Status
FROM Projects RIGHT JOIN (Academics RIGHT JOIN Projectsundertaken ON Academics.AcademicId = Projectsundertaken.AcademicId) ON Projects.ProjectId = Projectsundertaken.ProjectId
WHERE (((Projectsundertaken.Status)="Incomplete"));
Results of the SQL statement
5b) The SQL statement
SELECT Projectsundertaken.ProjectId, Projects.ProjectName, Academics.AcademicName, Projectsundertaken.AcademicRole, Projectsundertaken.AcademicTime, Projectsundertaken.StartDate, Projectsundertaken.EndTime
FROM Projects RIGHT JOIN (Academics RIGHT JOIN Projectsundertaken ON Academics.AcademicId = Projectsundertaken.AcademicId) ON Projects.ProjectId = Projectsundertaken.ProjectId
WHERE (((Projectsundertaken.AcademicRole)="PM"));
Output of the SQL Statement
Database assumptions
Each table to be edited has a one column primary key field which is an auto-incremented
integer field. It is possible to manually override this assumption, but it will require some
hand coding by the developer.
Tables have one primary key and foreign key.
Tables have relationships where referential integrity has been enforced.
There are no duplicate records in the database.
Whenever a field is updated a related record will be automatically updated.
The tables have the same layout and every field has been set to its proper data type will full
validation and verification.
Validation rules have been defined
Alternative approaches which could have been used in design, analyzing and implementing the
database.
The approaches which I could have used include DSD, PSD, Flow charts, Pseudo code and UML
(Unified Modeling Language) which have quite a number of advantages to offer in the development
of programs and they are as follows:
Graphical hence easy to understand
Easy to write or present
The UML development tool allows code to be exported.
Offers a ready made modeling language which helps developers to communicate.
The language is graphical and capable of expressing ideas.
It enables the modeling of systems and software using object oriented concepts.
It is also independent of programming language and development process.
Provides a formal basis of understanding the modeling language.
It supports higher level development such as collaborations, frameworks, patterns and
components.
Provides a means of extending the core concepts of a language
A standard model means easier communication between development teams
Provides a method for systems analysts to check that the program will achieve its goal.
TASK 5 NET
AIM
To create a report describing the network recommendations.
In this recommendation report, I compares several models of laptop against specific requirements
and then recommends one.
Introduction
This report gives an overview of why it is crucial for the organization to set up a network. If
the organization set up a network this will bring itself with other advantages and benefits to
the organization which includes the following:
Increased Communication Capabilities
Networks provide several different collaboration tools that can be used to
communicate between network users. Online collaboration tools include e-mail,
forums and chats, voice and video, and instant messaging.
Avoid File Duplication and Corruption
A server manages network resources. Servers store data and share it with users on a
network. Confidential or sensitive data can be protected and shared with the users
who have permission to access that data. Document tracking software can be used to
prevent users from overwriting files, or changing files that others are accessing at the
same time.
Lower Cost Licensing
Application licensing can be expensive for individual computers. Many software
vendors offer site licenses for networks, which can dramatically reduce the cost of
software. The site license allows a group of people or an entire organization to use the
application for a single fee.
Centralized Administration
Centralized administration reduces the number of people needed to manage the
devices and data on the network, reducing time and cost to the company. Individual
network users do not need to manage their own data and devices. One administrator
can control the data, devices, and permissions of users on the network. Backing up
data is easier because the data is stored in a central location.
Conclusion
Having taken into account the position of the organization I have concluded that the
organization needs this network since this will assist the organization in that computers which
are connected through a network can share resources as hard drives, printers, scanners etc
with each other, information, an connect all the computers which are connected through a
network to the internet by using a single line. So it means that you can save the connection
cost for each computer but you internet connection must be fast.