Learning Outcome 001 Flashcards

1
Q

Determine end-user views, outputs, and transaction processing requirements.

A

Understand what data users need to view, what outputs (reports, dashboards) they require, and how transactions (e.g., insert, update, delete) will be processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Determine entity types.

A

Identify the main objects or concepts (e.g., Customer, Product, Order) that will be represented in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify relationship types.

A

Define how entities are related (e.g., a Customer places an Order, an Order contains Products).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identify attributes.

A

List the properties or details of each entity (e.g., Customer attributes: Name, Address, Phone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Determine attribute domains.

A

A ‘Domain Attribute’ in Computer Science refers to an attribute used to reference another entity, particularly a member within that entity. It helps establish relationships between different entities in a database system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Determine candidate key.

A

A minimal set of attributes that can uniquely identify each record in a table, ensuring data integrity and allowing for efficient data retrieval.

•Example: In a Customer table, both CustomerID and Email could be candidate keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine Primary Key

A

The primary key is the candidate key chosen to uniquely identify each record in a table.

•Example: In a Customer table, CustomerID is selected as the primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine Alternate Key

A

Alternate keys are candidate keys that are not selected as the primary key but still uniquely identify records.

•Example: In a Customer table, Email could be an alternate key if CustomerID is the primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steps to Determine Keys

A
  1. Identify Candidate Keys:
    • Look for attributes or combinations of attributes that can uniquely identify records.
    • Example: In a Student table, StudentID and SocialSecurityNumber might both be candidate keys.
  2. Select the Primary Key:
    • Choose the most appropriate candidate key based on:
      • Stability: The key should not change (e.g., StudentID is better than Email).
      • Simplicity: Prefer single-attribute keys over composite keys.
      • Usage: Consider how the key will be used in queries and relationships.
    • Example: Select StudentID as the primary key.
  3. Designate Alternate Keys:
    • Identify other candidate keys that can serve as unique identifiers if needed.
    • Example: Designate SocialSecurityNumber as an alternate key.
  4. Implement Constraints:
    • Apply unique constraints to alternate keys to ensure data integrity.
    • Example: Ensure no two students have the same SocialSecurityNumber.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Check model for redundancy.

A

Ensure no unnecessary duplication of data exists in the model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Validate the Conceptual Model Against User Transactions

A

Validation: Ensure that the model supports all required user transactions and outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Review the Conceptual Data Model with User

A

Review: Present the model to users for feedback and make necessary adjustments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.2 Identify an Appropriate DBMS

Evaluate Database Models

A

Database Models: Consider relational, NoSQL, object-oriented, etc., based on the application requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Choose a DBMS Based on

A

Choose a DBMS Based on:

-Pricing: Consider the cost of the DBMS, including licensing, maintenance, and support.

-Existing Database Migration: Evaluate the ease of migrating existing data to the new DBMS.

-Functionality and Business Needs: Ensure the DBMS meets the functional requirements of the business.

-Scalability: Consider the ability of the DBMS to handle growth in data volume and user load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.3 Normalize Database Relations

Define Database Normalization

A

Normalization: The process of organizing data to reduce redundancy and improve data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline the objectives of database normalization.

A

Eliminate duplicate data, ensure data dependencies make sense, and simplify data maintenance.

17
Q

Outline the levels of normalization (up to 5NF):

A
  • 1NF: Eliminate duplicate columns and ensure atomicity.
    • 2NF: Remove partial dependencies.
    • 3NF: Remove transitive dependencies.
    • BCNF: Strengthen 3NF to handle overlapping candidate keys.
    • 4NF: Eliminate multi-valued dependencies.
    • 5NF: Handle join dependencies.
18
Q

Produce Logical Design Model

A
  1. Identify and create relations for strong and weak entities.
    • Strong entities have independent existence (e.g., Customer), while weak entities depend on others (e.g., Order depends on Customer).
  2. Map multivalued attributes.
    • Convert attributes with multiple values (e.g., Phone numbers) into separate tables.
  3. Map binary relations:
    • One-to-one: A customer has one unique profile.
    • One-to-many: A customer can place many orders.
    • Many-to-many: Many customers can buy many products.
  4. Map ternary relations.
    • Handle relationships involving three entities (e.g., Supplier supplies Product to Customer).
  5. Map supertype relationships.
    • Represent inheritance (e.g., Employee as a supertype with subtypes like Manager and Staff).
  6. Validate integrity constraints:
    • Domain constraints: Ensure data falls within valid ranges (e.g., Age > 0).
    • Entity integrity constraints: Ensure primary keys are unique and not null.
    • Referential integrity constraints: Ensure foreign keys reference valid primary keys.
  7. Create a data dictionary.
    • Document all entities, attributes, relationships, and constraints for reference