Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

DatabaseDesign

Instructions are posted.

CMIS 320 Project 2

Introduction

This assignment allows students to demonstrate their skills in designing relational databases to
satisfy specific business rules and requirements. The deliverables for this assignment include an
Entity Relationship Diagram (ERD) and the associated detailed documentation describing the
database design and structure.

In this assignment you will be provided with a description of an application (below) to create an
ERD and design accompanying table layout using sound relational modeling concepts and
practices. The relationships between the entities and the attributes for the entities will be
identified and described. This database will provide the foundation for the follow-on assignment.
The following paragraphs provide the background and summary of the business requirements.

Scenario

You are a database consultant with Ace Software, Inc. and have been assigned to develop a
database for the Mom and Pop Johnson Video Store in old-town. Mom and Pop have been
keeping their records of videos and DVDs purchased from distributors and rented to customers in
stacks of invoices and piles of rental forms for years. They have finally decided to automate their
record keeping with a relational database.

You sit down with Mom and Pop to discuss their business and watch their operation for about a
week. Mom and Pop rent legacy video/DVDs and discuss their need to move away from
maintaining their rental records on paper. You discover for 1 title, they typically (but not always)
offer two formats including a video (VCR) and DVD format. Both formats of a movie are kept in a
separate plastic case when rented out. They have several copies of each rental movie. There are
several videos and DVDs for each movie title. You learn that in their inventory, they have several
thousand videos and DVDs, which they get wholesale from about a half dozen distributors. The
video and DVD prices to them are based on the quantity of their shipment and the past business
they have done with each company.

The cost of a DVD rental might be different than the price of a video rental for the same movie,
even from the same distributor. Each distributor provides different types of movies (e.g.,
suspense, horror, mystery, comedy, etc.). A single distributor may provide several different types
of movies in both video and DVD format. It is possible to obtain the same movie from multiple
distributors, and at different wholesale prices.

Each video and DVD has a unique identification number that Mom and Pop assign in their
inventory, in addition to the distributor’s serial number for the item. Each movie also has a
unique identification number Mom and Pop assign in addition to the title, and any movie IDs the
distributors use in their electronic catalogs. Distributors provide electronic catalogs to Mom and
Pop and the information from these catalogs must be included in the database.

Mom and Pop need to record when a video or DVD is rented, when a video or DVD is returned,
and all customer charges such as late and damaged fees, failure to rewind fees, and taxes. They
need a report of which videos are returned late because there are standard and late charges.

On occasion there are discount prices for certain movies or types of movies. Customers want to
rent movies based on actors or actresses, running length, type of movie, rating, year released, the
director, and the academy awards won (by the movie, the actors, the actresses and/or the
directors). Customers also want to know how many videos they have rented in the last month,
year, and so forth. Mom and Pop need to keep only basic information on customers in their
database, such as name, address, telephone numbers, etc.

There must be no limit to the number of video and/or DVD copies of a movie that Mom and Pop
can have in their inventory. Video/DVD ID numbers, movie ID numbers, and distributor ID
numbers for videos, DVDs, and movies are all different. Also, each movie must be able to have an
unlimited number of actors, actresses, directors, and academy awards (i.e., Oscars). Other types
of awards (e.g., Golden Globe, People’s Choice, etc.) are not of interest for this application. The
rental of equipment, sale of videos, DVDs, popcorn, etc., is not to be kept in the database.

Directions for this assignment

Using this information, you should:

1. Review the course content that contains information about:
• Review the difference between a Conceptual Model and a Logical Model (keep in mind

that for this assignment, we are not addressing a Physical Model).
• Review the readings about entities (e.g. tables), their attributes (e.g. fields), and the

relationships that provide the linkage between pairs of entities (tables).
• Review what a key attribute is for an entity, as this is the main mechanism that can

associate one entity to another, as a primary way of doing this in an RDBMS.

2. For your data model:
• First, determine a list of entities needed for the Mom and Pop database.
• Second, determine a list of ‘preliminary’ attributes for each of your entities. These are

noted as ‘preliminary’ as you may decide to later change/modify the list of attributes in
each entity. Be sure to also identify a key field for each entity.

• Third, create relationship sentence pairs between those entities that are related. You
should not have any many-to-many relationships. Hint: If you do have any many-to-many
relationships in your preliminary design, you will need to break these down and use an
association/intersection entity.

3. Draw an ER model using an ER tool.
• Use either ERAssistant or Visio to create an entity/relationship diagram (ERD) showing all

your entities, attributes, and relationships.

• You will find ERAssistant and Visio in the virtual Lab Broker.
• Keep in mind that all entities should be related to at least one other entity.
• Your ERD should have all one-to-many relationships and must not have any many-to-many

relationships.
• Develop the ERD and save your work. This may take a few revisions before you get the

model to your perfection. Shown below is an Example ERD using the ‘crows foot’ notation.
Please note that the following model DOES NOT FULLY represent the Mom & Pop video
store. This example shows you a model that contains (a) entities, (b) attributes, (c) key
fields/attributes for each entity, and (d) the relationships that exist between each pair of
entities. For this assignment, create either an ERAssistant or Visio model that represents
YOUR Mom & Pop video store. Note that the model below does not show the Foreign
Keys. For your model, be sure to include the FKs in the related entity.

Figure 1: Example ERD

4. Create ‘metadata’ (e.g., data about data) that describes each entity (table) along with the

attributes (field/column) in the ERD. While this information can be done in the comments
section of ERAssistant or denoted in Visio, consider using a spreadsheet to identify your
metadata for the database. Keep in mind that metadata is typically kept in a “data dictionary”
for a given project in the organization, but we’ll simply use a spreadsheet for this assignment.
Please pay particular attention to the description of all primary key (via “PK”) and foreign key
(via “FK”) columns, as these support the relationships that are designed between tables. A
‘starter’ example of the meta data is shown below. EXPAND on this example to fully describe
the entities, attributes, and relationships in your database. (See the readings for this week).

Example (starter) Meta Data

Mom & Pop Database

Entity Name Attributes PK/FK? Data Type Description
Producer ID PK integer Primary Key for Producer entity
CompanyName no varchar (255) Producer Company Name
Country no varchar (255) Producer Country
Movie ID PK int Primary key for Movie

ProducerID

FK

int

This is the FK that points to
Producer

Title no varchar (255) Title of Movie
Duration no int Length of Movie
Rating no char(1) Customer rating of Movie
Customer_Movie xxx
xxx

Customer xxx
xxx

Figure 2: Example (partial) meta data for the database

5. Submit a Word document that contains two parts:

(a) A screenshot of the ERD (completed in ERAssistant or Microsoft Visio). Name the file your
last name, followed by Project 2. For example: Smith_Project_2.ERD. It is recommended
to also submit a print the ERD diagram into PDF format and submit the PDF file, if
possible.

(b) Your metadata file.

Assignment-2’s grading rubric:

Attributes Meets Does Not Meet

Entities and attributes

45 points
Student identifies a large
potential set of entities and their
attributes for the application.

0 points
Major problems with
identification of entities and their
attributes.

Relationship sentence pairs

45 points
Student properly formats all
required relationship sentence
pairs to describe one-to-many
relationships.

0 points
Major problem with
development of relationship
sentences.

ERD

90 points
ERD properly includes and
depicts all entities, attributes
and relationships identified.

0 points
ERD is missing many items
and/or has major problems with
relationships.

Metadata

45 points
Spreadsheet of table
specification metadata properly
includes all tables, their
columns, and all required
details for the columns.

0 points
Major omissions for table
specification metadata.

Resources that you might explore:

Note: If the videos are no longer available on YouTube, do a search for other relevant content.

1. Difference between conceptual logical and physical data model:

2. ER Diagramming using ERAssistant:

3. ER Diagramming using Visio:

  • CMIS 320 Project 2
  • Assignment-2’s grading rubric:
  • Resources that you might explore:

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Network Design and Plan Purpose

Please review attachment Mod 4 Project: Network Design and Plan Purpose In this module, we will introduce a course design project that will be completed in four parts during the course. This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation

Memecoins & Stablecoins Development

Please take a look at the attachment. Lab #3: Blockchain-Based Ecosystems: Memecoins & Stablecoins Development, Attack Simulation, and Auditing Lastname: ______________ First name:____________Date_______ TA_Prove_ Yes/No 1. Overview This lab guides students through designing, implementing, deploying, testing, and auditing a simple memecoin (ERC‑20) and a minimal ecosystem around it (liquidity pool,

Blockchain Presentation

presentation about a blockchain Term Project CIS 5730- Blockchain Application Project Guideline Part ii–Presentation Along with the project you will present what you did to the class in a short presentation. If you want, you can demonstrate the project, or just present an overview of what you did. Presentations should

Network Threats

  Questions: Below is a list of common network attacks: Distributed Denial of Service (DDoS) DNS poisoning ARP poisoning Domain hijacking MAC flooding MAC cloning Man-in-the-Middle Explain two of these network attacks and discuss methods/techniques for protecting the network against them.

Best Practices for Role-Based Privilege Management in Databases

  Research the best practices for managing and securing role-based privileges in databases and address the following questions in your discussion post:  What are the key challenges in managing role-based privileges, and how do they impact database security? Can you provide a real-world scenario where poor role-based privilege management led

Computer Science Cloud Computing assignment

Please see attachment for details 4 [ Note: To complete this template, replace the bracketed text with your own content. Remove this note before you submit your paper.] Cloud Computing Evaluation Paper 1 Cloud Computing [Differentiate between cloud computing models and their uses. What are the different types of deployment

Computer Science- Python Python Programming Assignment

Computer Science Python Programming Lab assignment help. Design a Python program that calculates a credit card customer’s minimum payment based on their balance. Please use If Else and elif statements in your code. You must add comments in your code. Please round the minimum payment to two decimal places using

Blockchain Application

I need help with my coursework project. Let me know if you need any help from me.  Lab 2: Blockchain-Based Academic Credentials Lab Lastname: ______________ Firstname:________________ 1. Overview AETHELRED UNIVERSITY Registrar’s Office wants to start issuing a digital transcripts and diploma for graduating students. You are called to build the

LOREM, IPSUM

The ability to develop a risk register is a skill needed by all cybersecurity leaders when assessing cybersecurity risks. A risk register provides a detailed listing of known risks as well as quantitative or qualitative assessments of those risks, resulting in the prioritization of action.

Virtual LANs

  Questions: A VLAN allows different devices to be connected virtually to each other as if they were in a LAN sharing a single broadcast domain. 1. Why a network engineer would want to deploy VLANs? 2. How do VLANs improve network security?

compliance and rules to follow in cybersecurity.

Follow the attached instructions to complete this work. Note: Make sure to follows rubric or aligns with Rubric. Unit 8 Assignment Directions: Case Study Review the following hypothetical case study. Consider the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in

Discussion on data ( computer science)

Follow the attached direction to complete this work Unit 7 Discussion   Overview Consider this scenario: PQR Corporation provides facial recognition technology to customers. Its products include customer access to consumer electronics as well as mass surveillance capabilities through networked camera systems. While operating legally, PQR has maintained a low

Computer Science – Machine Learning Python Programming Assignment

Assignment Help. Please don’t forget to add comments in the code Page 1 of 3 NorQuest College – CMPT 1011: Lab Assignment 5 CMPT 1011: Introduction to Computing Lab Assignment 2: Variables, mathematical operations and data types Value This coding challenge is worth 3% of your final grade. Background In

Public safety Communications

Subscribe The Communications and Cyber Resiliency Toolkit provides guidance for establishing resiliency measures, public safety communications can better withstand potential disruptions to service. This toolkit, developed by CISA, describes networks and systems critical to successful communication and cyber resiliency and possible threats while providing many resources and additional links for

Case Study 4 o Data (computer)

Follow the attached instructions to complete this work Unit 4 Case Study Directions Review the following case study. Consider both the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in your written responses to the questions below. The case study paper

Discussion 5 and 6

Follow  the attached instructions to complete this work Unit 5 Discussion   Overview In this discussion, you will be considering the emphasis on aspects such as privacy and safety. You will reflect on the significance of the legal concerns and goals of public-private partnerships to address cybersecurity. You will also

SQL injection

Hey! ????  I need an expert in SQL injection, DDOS attack, Code injection attack, XSS attack! To talk further please contact me on discord at mara411 so we can talk more freely and then I will hire you on here! Thanks ????