Database systems
The need for database systems, which are properly designed, is a major priority in all modern-day institutions. All the company information, plans, operations, as well as staff data, are contained in the database system. Properly designed systems provide accurate, up-to-date information hence boosting the smooth flow of company operations. Additionally, user interaction, data storage process, as well as data extraction processes, is user friendly. The security feature, on the other, allows the company staff, stakeholders, and clients to interact with the system as per their approval levels. Moreover, additional security features protect the system from hackers.
Numerous issues have faced database management systems. According to Abadi et al. (2016), insecurity, interdependency, as well as redundancy of database systems were serious issues facing organizations. Coronel & Morris (2016) noted that redundancy was a significant issue affecting databases in many companies, which has to be overcome to have accurate data. Di et al. (2016), on the other hand, stated consistency was vital in ensuring that data available was valid. The accessibility of data is enhanced when a data management system is employed, according to Dimitrieski et al. (2015). He further stated that the ability of the noted that it was praised the capabilities of modern database systems to enable staff to have multiple access to the required information remotely. This paper discussed the use of an Access database system (ADS).
The information in ADS is organized in tables. The structure of rows and columns in ADS resemble those in an excel spreadsheet. The rows are referred to as records. Data is normally organized meaningfully and consistently in the records. The columns, on the other hand, are referred to as fields. Field refers to a single item, which appears in every record. Therefore, records hold comprehensive information about a product while field only reveals a particular data about the product in question.
The project for this paper majored in preparation for database for a business course institution X using ms access 2016. The target, in this case, was to prepare a database system where administrators, lecturers, and students could be able to access information as per their level of approval. The data were categorized into four tables, namely, course table, course details table, lecturer database table, and student database table. The lecture details table contained details on the Cost of the course, Number of hours, Number of practical lessons, Number of CATs, Number of Assignments, Assignment Overall score, CATs overall Score, Main Exam overall score in its fields. The fields of the course table listed Course ID, Student ID, Lecturer ID, Date of Lecture, Length of Lecture, Start Time, Meeting Point, and Course Details. Thirdly, the student database spreadsheet fields listed the following details Student ID, Title, First Name, Last Name, Address, DOB, Contact details, and Email. Finally, the field of the lecturer database table listed Lecturer ID, Title, First Name, Last Name, Address, Contact, City, Pay Grade, and Employment Status. The snapshots of the tables are listed in Figure 1, Figure 2, Figure 3, and Figure 4.
Figure 1: Lecturers database table
Figure 2: Student database table
Figure 3: Course database table
Figure 4: Course details database table
The logical details in the four tables were then linked in the physical model, as illustrated in Figure 5. To boost the accuracy of the database system, the physical model tabs on enforcing referential integrity, cascade update related fields, and cascade delete tabs were ticked (Figure 6). This was done to ensure the data in the system was accurate, consistent, up-to-date, and accessible.
Figure 5: Physical model of school X business course database
Figure 6: Physical modeling tabs used during modeling
In order to enhance the security system of the ADB system, the administrators were allowed to have full access to the entire data. The lectures, on the other hand, were allowed to access details on students, courses, and their details in the system. However, each lecturer could only access the names, Title, and course details of his colleagues. This was aimed at promoting privacy. The students, on the other hand, could only access the course table and course details fully of their respective courses. In the lecturer details table, they could only access the name, title, and course details of their lectures. The security was further enhanced by ensuring each student, administrator, and lecturer had a unique access password. Moreover, the three had only read-only powers. Adjusting the database was only assigned to the chief IT expert with the approval of the school principal.
Reference List
Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management.
Cengage Learning.
Abadi, D., Bajda-Pawlikowski, K., Abouzied, A., & Silberschatz, A. (2016). U.S. Patent No.
9,495,427. Washington, DC: U.S. Patent and Trademark Office.
Di Pasquale, V., Miranda, S., Neumann, W. P., & Setayesh, A. (2018). Human reliability in
manual assembly systems: a Systematic Literature Review. IFAC-PapersOnLine, 51(11),
675-680.
Ristić, S., Kordić, S., Čeliković, M., Dimitrieski, V., & Luković, I. (2015, September). A model-
driven approach to data structure conceptualization. In 2015 Federated Conference on
Computer Science and Information Systems (FedCSIS) (pp. 977-984). IEEE.