Database Techniques and Applications Report
User Needs
==========
My database will be designed for a major florist company called ‘FuNkY
FlOwErS’, the company has requested for me to design a database, which
will enable all records of customers, the flower package they’ve
chosen, and the sales, to be recorded in one document. The database
will enable the staff operating the database to store and retrieve
information, which is relevant to the sales. In order for the
information in my database to remain secure, reliable and private.
Information to be processed
===========================
I have included three tables in my database and their names are as
follows:
· Tbl Employees
· Tbl Flowers
· Tbl Suppliers
Customers
---------
Field Name
Data type
Field size
Customer ID
Auto Number
Surname
Text
20 Characters
Forename
Text
20 Characters
Gender
M/F
1 Character
D.O.B
Date/Time
Medium date
House number
Number
5 Characters
Post Code
Text
10 Characters
Tel. 1
Number
20 Characters
Tel. 2
Number
20 Characters
Mobile number
Number
20 Characters
Email address
Text
20 Characters
Member
Yes/No
3 Characters
Date Joined
Date/Time
Medium Date
Above I have shown the contents of the first table I created in
Microsoft Access, this was the first step of creating my database as I
was labelling the column headings for each table. The reason why I
chose the particular headings was so that it is easily accessible to
my client as all my client needs to do to select information or edit
information is select the corresponding table e.g. if a new customer
had decided to become a member then my client would need to select the
For all individuals in Tables 1 and 2 labeled as a parent or grandparent identify
== == == == ==
Looking at the different data storage models, this is the most simple to implement. This is a way to have a schema-less design for storing data. In essence, the store will act as a large hash table that is separated into keys and values (Data Access ref). To the DBMS, the values are opaque – a random assortment of 1’s and 0’s – and the application sitting on top of the database will then translate the binary to useful information. Hash functions are then used to determine where the values will be physically stored.
In this experiment, we took a detailed look at Edward Bloom's Big Fish. In particular, we sampled 10 pages of the book, and from each of those pages, examined the number of lines starting with various types of words, and types of letters as well. In order to randomly select 10 pages from the book, we used the Vasser Stats randomizer to generate 10 random page numbers. We then went through each of the 10 randomly selected pages and recorded the number of lines that started with a noun, a verb, an adjective, a vowel, and a consonant. When recording the number of lines starting with nouns and verbs, we also made sure to divide the results into those that began with vowels and those began with consonants. The data was entered into a spreadsheet in Excel and then transferred to JMP IN. In dealing with the data, we treated each of the ten pages as an individual and so we had 10 values for the number of lines starting with each of our different word and letter types. Once the data was entered into JMP IN, we constructed 5 histograms to show the frequency distribution for the number of lines starting with each of our word and letter types. Once our histograms were created, we took a look at the descriptive statistics for each of our histograms and summarily grouped the 5 sets of data in a table. The descriptive statistics we chose to include were; the mean, median, maximum, minimum, upper quartile, lower quartile, 95% confidence intervals, and sample size. The histograms and statistics were calculated and created, respectively, in JMP. We then entered the number of noun and verb lines that started with vowels and consonants in JMP. From this spreadsheet, we used JMP to produce a contingency table. This was done to determine whether or not there exists a statistically significant relationship between the type of word and the type of letter that word begins with. Once the contingency table was created, JMP performed a Pearson chi-square test on the data.
== == == == ==
may have had a form that is made up of lots of little boxes that you
Data administration is a form of data resource management that is an organizational task, it requires working in specific areas of information systems to create plans, diagrams, organize, designate and relate various controls over data resources. The various data resources are most often stored in databases and are part of a database management system or software like excel or access or an open source spreadsheet. In many organizations the data administration, which is operated by the database administrator, involves many duties such as what follows in this quote. “In order to reduce errors, improve performance, and enhance the ability of one is worker to understand the work done by another, it is important for the data administration function to set standards regarding data and its use. One example of standards is controlling the way that attribute names, table names, and other data-related names are formed. Attribute names must be meaningful and consistent” (Gillenson,
Database Systems has a practical, hands-on approach that makes it uniquely suited to providing a strong foundation in good database design practice. Database design is more art than science. While it's true that a properly designed database should follow the normal forms and the relational model, you still have to come up with a design that reflects the business you are trying to model. This paper shows describes design process of database project.