This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Employment

Database systems

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Database systems

The need for database systems, which are properly designed, is a major priority in all modern-day institutions. All the company information, plans, operations, as well as staff data, are contained in the database system.  Properly designed systems provide accurate, up-to-date information hence boosting the smooth flow of company operations. Additionally, user interaction, data storage process, as well as data extraction processes, is user friendly. The security feature, on the other, allows the company staff, stakeholders, and clients to interact with the system as per their approval levels. Moreover, additional security features protect the system from hackers.

Numerous issues have faced database management systems.  According to Abadi et al. (2016), insecurity, interdependency, as well as redundancy of database systems were serious issues facing organizations. Coronel & Morris (2016) noted that redundancy was a significant issue affecting databases in many companies, which has to be overcome to have accurate data. Di et al. (2016), on the other hand, stated consistency was vital in ensuring that data available was valid. The accessibility of data is enhanced when a data management system is employed, according to Dimitrieski et al. (2015). He further stated that the ability of the noted that it was praised the capabilities of modern database systems to enable staff to have multiple access to the required information remotely.   This paper discussed the use of an Access database system (ADS).

The information in ADS is organized in tables. The structure of rows and columns in ADS resemble those in an excel spreadsheet. The rows are referred to as records. Data is normally organized meaningfully and consistently in the records. The columns, on the other hand, are referred to as fields. Field refers to a single item, which appears in every record. Therefore, records hold comprehensive information about a product while field only reveals a particular data about the product in question.

The project for this paper majored in preparation for database for a business course institution X using ms access 2016. The target, in this case, was to prepare a database system where administrators, lecturers, and students could be able to access information as per their level of approval. The data were categorized into four tables, namely, course table, course details table, lecturer database table, and student database table. The lecture details table contained details on the Cost of the course, Number of hours, Number of practical lessons, Number of CATs, Number of Assignments, Assignment Overall score, CATs overall Score, Main Exam overall score in its fields. The fields of the course table listed Course ID, Student ID, Lecturer ID, Date of Lecture, Length of Lecture, Start Time, Meeting Point, and Course Details. Thirdly, the student database spreadsheet fields listed the following details Student ID, Title, First Name, Last Name, Address, DOB, Contact details, and Email. Finally,   the field of the lecturer database table listed Lecturer ID, Title, First Name, Last Name, Address, Contact, City, Pay Grade, and Employment Status. The snapshots of the tables are listed in Figure 1, Figure 2, Figure 3, and Figure 4.

Figure 1: Lecturers database table

Figure 2: Student database table

Figure 3: Course database table

Figure 4: Course details database table

The logical details in the four tables were then linked in the physical model, as illustrated in Figure 5. To boost the accuracy of the database system, the physical model tabs on enforcing referential integrity, cascade update related fields, and cascade delete tabs were ticked (Figure 6). This was done to ensure the data in the system was accurate, consistent, up-to-date, and accessible.

 

Figure 5: Physical model of school X business course database

Figure 6: Physical modeling tabs used during modeling

In order to enhance the security system of the ADB system, the administrators were allowed to have full access to the entire data. The lectures, on the other hand, were allowed to access details on students, courses, and their details in the system. However, each lecturer could only access the names, Title, and course details of his colleagues. This was aimed at promoting privacy.  The students, on the other hand, could only access the course table and course details fully of their respective courses. In the lecturer details table, they could only access the name, title, and course details of their lectures. The security was further enhanced by ensuring each student, administrator, and lecturer had a unique access password. Moreover, the three had only read-only powers. Adjusting the database was only assigned to the chief IT expert with the approval of the school principal.

 

 

 

 

 

 

 

 

 

 

 

 

Reference List

Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management.

Cengage Learning.

Abadi, D., Bajda-Pawlikowski, K., Abouzied, A., & Silberschatz, A. (2016). U.S. Patent No.

            9,495,427. Washington, DC: U.S. Patent and Trademark Office.

Di Pasquale, V., Miranda, S., Neumann, W. P., & Setayesh, A. (2018). Human reliability in

manual assembly systems: a Systematic Literature Review. IFAC-PapersOnLine, 51(11),

675-680.

Ristić, S., Kordić, S., Čeliković, M., Dimitrieski, V., & Luković, I. (2015, September). A model-

driven approach to data structure conceptualization. In 2015 Federated Conference on

            Computer Science and Information Systems (FedCSIS) (pp. 977-984). IEEE.

 

 

 

 

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask