. QUESTION
Building a Database for your favorite local band.
Assignment 4: Term Paper
Due Week 10 and worth 200 points
You were talking to members of your favorite local band after a recent show. The topic of software came up, and the leader said she has a love-hate relationship with it. She loves the recording software they use and is okay with QuickBooks for the band’s financial records. But, she does not like the available options to track bookings and create setlists that draw from their entire repertoire.
In addition to their regular weekly gigs, the band performs for many school assemblies and community events. They have to pick music that’s appropriate for the audience and the theme without being repetitive. They are constantly adding new songs to their catalog, and putting others on hiatus. The band likes to take requests, so they frequently update the setlist after a gig. The band does not want to bother entering chords or lyrics because they don’t use computers or phones on stage.
You offer to put together a system design to address the band’s needs. It’s okay to collect ideas by looking at off-the-shelf solutions, but the design must be your own for this assignment. Include the following in your design:
1. A list and a short explanation of each function to manage:
the band’s song catalog,
bookings,
setlists, and
any other category you believe is important for this application.
2. A logical data design that supports all of these functions. Use either an entity-relationship or a UML class diagram, which should be in third normal form. Indicate all primary keys, relationships, and cardinalities.
3. Recommend a system architecture that identifies the hardware and software components and how they interact. Include a short (not more than 500 words) description and rationale. Illustrate using your choice of a static functional decomposition or object-oriented diagram.
4. Identify security concerns and other nonfunctional requirements for this system.
5. Propose at least three distinct and measurable criteria to evaluate the quality of the finished software
Subject | Computer Technology | Pages | 6 | Style | APA |
---|
Answer
Building a Database for your Favorite Local Land
The formation of different designs typically characterizes the process of data management in an organization. On the other hand, Database design describes the organization of information in a model with specifications on stored data together with elements considerations according to organizational activities. In this brief, building a database for a local favorite band will be provided. Consequently, the paper will outline different database design functions that support these functions and recommend system architecture that identifies software and hardware parts together with their interaction. Security concerns will also be analyzed, followed by the provision of three ideal measurable criteria to determine the completed software quality.
Explanation of Functions
There are four functions for considerations, from the concerns of the bandleader’s love-hate relationship to the database system. First, data dictionary management offers data component structure and connection to the target listeners of music. The second function is data storage management that provides definitions, validations, and rules that will be applied according to customer requests collected from the field. The third function for consideration is data transmission and presentation. The presentation function will offer variation between physical and logical formats to provide a presentation platform under this function.
Logical Data Design
The data model offers accuracy in the data presented and the definition of rational tables. The logical data design is presented by Entity-Relationship (E-R) model and Unified Modeling Language (UML) (Kavanagh et al., 2020). The E-R model offers a description of a database using a diagrammatic presentation. Figure 1 below illustrates a simple ER diagram that can be used by the band.
Diagram 1.1
Unified modeling language defines customized ways to visualize database system. Under this system, the primary key will be offered to present how language can be applied in the model. The following table shows a sample construction of UML primary keys access.
Table 1.1
Recommended Architecture
Database designs can be constructed based on centralization, decentralization, and hierarchical considerations. Under this system’s function and band leader concerns, the most recommended architecture for this system is the Three Level ANSI-SPARC Architecture. Under this system, the band will be presented to external, conceptual, and internal levels that allow collecting public views and organizing the collected information at internal organizational functions. The following diagram illustrates the architectural design.
Diagram 1.2
Security Concerns
Although database design has the advantages of enhancing the band activities during the performance, there are underlying risks that need to be considered. The management of risks in a database will entail considerations to security management functions. Security can be provided by defining authorized system users who are virtually issued with user names and passwords through biometric authentication of fingerprints or eye scans (Nuccetelli et al., 2020). Since the security function is expensive, there will be a need to reduce the number of individuals authorized to access the system. Additional considerations for security management in the database will be to prepare for data restrains in the system during its operations.
Measurable Criteria
Having constructed a database from the above recommendation, measurable criteria for the database’s efficiency will evaluate three aspects. The first aspect is on reliability to analyze system stability to meet user needs. This will be tested by meeting user preferences and the accessibility of essential files when there is a need. The second measurement is on system performance. The performance brings into consideration the loading, stress, and soaking tests. Lastly, the security aspect will evaluate available system vulnerability, resolution time, and the possibility to deploy security aspects. In conclusion, the above description outlines how the band can successfully use the database while addressing the band leader’s concerns.
Kavanagh, J., Cherney, S., Reininger, H., & Griffin, N. (2020). Fighting Disinformation Online: Building the Database of Web Tools. RAND Corporation.
Nuccetelli, C., Leonardi, F., & Trevisi, R. (2020). Building material radon emanation and exhalation rate: Need of a shared measurement protocol from the European database analysis. Journal of Environmental Radioactivity, 225, 106438.
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...