Table of Contents
Part A: Database Analysis and Design
Entity Relationship Diagram
Relationship Schema
Supplementary Design Requirements
Assumptions
Figure 1: Entity Relationship Diagram using Crows Foot Notation
(Source: created by Learner)
Figure 2: Relationship Schema
(Source: created by Learner)
|
Field Name |
Date Type |
Description |
|
Core Database entities |
Text |
Full text |
|
QO Website |
Text |
Abbreviations |
|
Produce Item |
Text |
Full text |
|
Produce Entity |
Text |
Full text |
|
Message Entity |
Text |
Full text |
Table 1: Supplementary Design Requirements
(Source: created by Learner)
The above mentioned diagram and tables are showing the interrelationship between customer data, message entities and other data. It can be mentioned that the current set-up is demanding development of a proper database and website which is effective to attract the customers. In case of Sarah’s firm, the website is required to provide the address or location of the firm and warehouse. Apart from this, proper presentation and visual lucrativeness of the website to the customers by providing relevant pictures of the owner, firm, farming process and others. It can be stated that, with the help of this Entity Relationship diagram, database designing can be effectively done by Jack by determining the requirements of information system. Within the organisation, with the help of the above mentioned process, the website will be designed.
In this website, the entry of customer details will be developed. Apart from this, this will also include the details of product details by which the customers can choose the product details and order it online. A high level of logical data model is effective for develop a conceptual design of Sarah’s database. The previously mentioned chart and tables are demonstrating the interrelationship between client information, message substances and other information. It very well may be referenced that the present set-up is requesting improvement of an appropriate database and site which is powerful to pull in the clients. If there should arise an occurrence of Sarah's firm, the site is required to give the location or area of the firm and distribution centre. Aside from this, appropriate introduction and visual benefit of the site to the clients by giving significant photos of the proprietor, firm, cultivating procedure and others.
It very well may be expressed that, with the assistance of this Entity Relationship outline, database planning can be adequately done by Jack by deciding the prerequisites of data framework. Inside the association, with the assistance of the previously mentioned process, the site will be structured. In this site, the passage of client subtleties will be created. Aside from this, this will likewise incorporate the subtleties of item subtleties by which the clients can pick the item subtleties and request it on the web. A significant level of coherent information model is successful for build up a theoretical plan of Sarah's database.
References
McWhirter, P. R., Kifayat, K., Shi, Q., & Askwith, B. (2018). SQL injection attack classification through the feature extraction of SQL query strings using a gap-weighted string subsequence kernel. Journal of information security and applications, 40, 199-216. https://www.sciencedirect.com/science/article/pii/S2214212617303691
Johnson, N., Near, J. P., & Song, D. (2018). Towards practical differential privacy for SQL queries. Proceedings of the VLDB Endowment, 11(5), 526-539. https://dl.acm.org/doi/abs/10.1145/3187009.3177733
Zhang, Y., Genkin, D., Katz, J., Papadopoulos, D., & Papamanthou, C. (2017, May). vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 863-880). IEEE. https://ieeexplore.ieee.org/abstract/document/7958614/
Tian, Y., Sun, W., Tong, S. J., Xu, E. L., Pirahesh, M. H., & Zhao, W. (2019). Synergistic graph and SQL analytics inside IBM Db2. Proceedings of the VLDB Endowment, 12(12), 1782-1785. https://dl.acm.org/citation.cfm?id=3352063.3360381
Wang, C., Cheung, A., & Bodik, R. (2017, June). Synthesizing highly expressive SQL queries from input-output examples. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation (pp. 452-466). https://dl.acm.org/doi/pdf/10.1145/3062341.3062365
Kamara, S., & Moataz, T. (2018, December). SQL on structurally-encrypted databases. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 149-180). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-030-03326-2_6
Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Information Retrival Assignment Help
1,212,718Orders
4.9/5Rating
5,063Experts
Turnitin Report
$10.00Proofreading and Editing
$9.00Per PageConsultation with Expert
$35.00Per HourLive Session 1-on-1
$40.00Per 30 min.Quality Check
$25.00Total
FreeGet
500 Words Free
on your assignment today
Get
500 Words Free
on your assignment today
Request Callback
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....
Speak directly with a qualified subject expert.
Get clarity on your assignment, structure, and next steps.
In this free session, you can: