proyecto 13-17

19
Chapter 13 1. Use Microsoft Visio or Visible Analyst to view the unnormalized and first normal form entity- relationship diagrams for the computer system. Double click on the entities to view the repository information (in both Microsoft Visio and Visible Analyst. In Microsoft Visio the repository entry is in an area on the bottom of the display. You may have to drag the border separating the diagram from the repository upward. Click the Columns entry in the Categories area on the left side of the repository to view the entity attributes.). The diagram name is COMPUTER SYSTEMUNNORMALIZED. These diagrams are illustrated in the text he Visible Analyst and Visio names are: Computer SystemUnnormalized Computer SystemFirst Normal Form 2. Use Microsoft Visio or Visible Analyst to view the entity-relationship diagram for the computer system. Double click on the entities to view the repository information (in both Microsoft Visio and Visible Analyst). The diagram name is COMPUTER. The diagram is illustrated in the text the Visible Analyst and Visio name is: Computer System 3. Add the VENDOR entity to the diagram. The vendor warrants the computers, and the relationship between VENDOR and COMPUTER is that one VENDOR can warrant many COMPUTER(s). Add primary keys. Microsoft Visio will automatically create foreign keys. In Visible Analyst, select Key Synchronization from the Repository menu. The diagram is illustrated below. The Visible Analyst and Visio name is: Computer System with Vendor

Upload: davisjonathan87

Post on 16-Apr-2015

274 views

Category:

Documents


19 download

TRANSCRIPT

Page 1: PROYECTO 13-17

Chapter 13

1. Use Microsoft Visio or Visible Analyst to view the unnormalized and first normal form entity-relationship diagrams for the computer system. Double click on the entities to view the repository information (in both Microsoft Visio and Visible Analyst. In Microsoft Visio the repository entry is in an area on the bottom of the display. You may have to drag the border separating the diagram from the repository upward. Click the Columns entry in the Categories area on the left side of the repository to view the entity attributes.). The diagram name is COMPUTER SYSTEM—UNNORMALIZED.

These diagrams are illustrated in the text he Visible Analyst and Visio names are:

Computer System—Unnormalized Computer System—First Normal Form

2. Use Microsoft Visio or Visible Analyst to view the entity-relationship diagram for the computer system. Double click on the entities to view the repository information (in both Microsoft Visio and Visible Analyst). The diagram name is COMPUTER.

The diagram is illustrated in the text the Visible Analyst and Visio name is:

Computer System

3. Add the VENDOR entity to the diagram. The vendor warrants the computers, and the relationship between VENDOR and COMPUTER is that one VENDOR can warrant many COMPUTER(s). Add primary keys. Microsoft Visio will automatically create foreign keys. In Visible Analyst, select Key Synchronization from the Repository menu.

The diagram is illustrated below. The Visible Analyst and Visio name is:

Computer System with Vendor

Jonathan Davis
Texto escrito a máquina
Realizado por: Idaliz Morales, Franklin Luciano, Jonathan Davis.
Page 2: PROYECTO 13-17

4. Add the MAINTENANCE entity to the diagram. Maintenance repairs are performed on computers, and the relationship between MAINTENANCE and COMPUTER(s) is such that one COMPUTER may have many MAINTENANCE records. Use the repository to define MAINTENANCE ORDER NUMBER. Set this attribute as the primary key for MAINTENANCE entity and generate the foreign key.

The diagram is illustrated below. The Visible Analyst and Visio name is:

Computer System With Maintenance

Page 3: PROYECTO 13-17

5. Describe the SOFTWARE CATEGORY entity in the repository. Include the elements found on the entity-relationship diagram below SOFTWARE CATEGORY in the Composition area.

The Software Category entity is listed below:

6. Describe the MAINTENANCE entity in the repository. The elements are as follows: a. MAINTENANCE ORDER NUMBER

b. HARDWARE INVENTORY NUMBER

c. MAINTENANCE DATE

d. TYPE OF MAINTENANCE

e. COST OF MAINTENANCE

f. MAINTENANCE COVERED BY WARRANTY

Maintenance Entity Description: Describes maintenance work done on a computer. Composition: [PK]Maintenance Order Number + [FK]Hardware Inventory Number + Maintenance Date + Type Of Maintenance + Cost Of Maintenance + Maintenance Covered By Warranty Foreign Key(s):

Computer “Have Periodic” Maintenance Hardware Inventory Number -> Hardware Inventory Number On Delete Restrict On Update Restrict On Insert of Child Row Restrict

Software Category Attributive Entity

Description:

Contains information about the category of software.

Composition:

[PK]Software Category Code +

Software Category Description

Page 4: PROYECTO 13-17

7. Describe the VENDOR entity. The elements are as follows:

a. VENDOR NUMBER

b. VENDOR NAME

c. STREET

d. CITY

e. STATE

f. ZIP CODE

g. TELEPHONE NUMBER

h. DATE LAST ORDER SENT

i. TOTAL AMOUNT PURCHASED FROM VENDOR

j. TOTAL NUMBER OF ORDERS SENT TO VENDOR

Vendor Entity Description: A company that supplies us with either hardware, software, or supplies. Composition: Vendor Number + Vendor Name + Street + City + State + Zip Code+ Telephone Number + Date Last Order Sent + Total Amount Purchased From Vendor + Total Number Of Orders Sent To Vendor [FK] Hardware Inventory Number Foreign Key(s): Computer “Warranted By” Vendor Hardware Inventory Number -> Hardware Inventory Number

8. Each computer may have more than one operating system, and each operating system may be installed on more than one computer. Add an associative entity called COMPUTER OPERATING SYSTEM between COMPUTER and OPERATING SYSTEM. Include the primary and foreign keys in the repository in either Microsoft Visio or Visible Analyst.

The diagram is called Computer System with Operating System in both Visible Analyst and Visio and is illustrated on the next page.

Page 5: PROYECTO 13-17

9. Explain in a paragraph the relationship between a foreign key and a primary key,

and why it is necessary to have them on separate entities when there is a relationship

between the entities.

A foreign key on one file is the primary key of another file and is necessary because it provides a means of reading the second matching file (containing the primary key) when a record has been read on the first file (containing the foreign key).

Page 6: PROYECTO 13-17

Chapter 14

1. Use Microsoft Access to view the menu options for the computer system.

2. Examine the HARDWARE INQUIRY. Explain the inquiry type using the value, entity, and attribute

(V, E, A) notation.

Inquiry type: Type 4, all V (E, all A) 3. In a paragraph, explain why a data entry display should emphasize accuracy, whereas an inquiry

display emphasizes how fast results may be displayed.

If an inquiry program obtains a bad number, an error message or the wrong record is displayed. The data on the files is still intact. However, on a data entry program, when the wrong data is input and goes undetected, it is stored on the files and makes the information incorrect on screens and reports that use the field.

4. Modify and print the hierarchy chart representing the Update Hardware menu. The file name in

Visio is Update Hardware. Add rectangles to represent the following menu options:

CHANGE COMPUTER DELETE COMPUTER RECORD UPDATE INSTALLED COMPUTER

Page 7: PROYECTO 13-17

5. Use the Program Structure diagram of Visio or the Functional Decomposition feature of Visible Analyst to draw a hierarchy chart representing the options found on the Update Software menu. Start with the top rectangle representing the Update Software menu.

ADD SOFTWARE PACKAGE CHANGE SOFTWARE RECORD DELETE SOFTWARE RECORD UPGRADE SOFTWARE PACKAGE

The menu hierarchy chart is illustrated below.

6. Chip and Anna realize that the menu that has been designed is for the users involved in the

installation and maintenance of computer hardware and software. This menu would not be

suitable for general faculty and staff members, because they should not have the ability to

Computer UpdateHardware Menu

Add ComputerChange ComputerRecord

Delete ComputerRecord

Update InstalledComputer

Computer UpdateSoftware Menu

Add SoftwarePackage

Change SoftwareRecords

Delete SoftwareRecords

Upgrade SoftwarePackage

Page 8: PROYECTO 13-17

update the records. Design a menu, either on paper or using software with which you are

familiar, that would provide the general user with the ability to perform inquiries and reports.

The menu is illustrated below.

7. Discuss in a paragraph why the users would need to move to another page (by pressing the Next Record button) to display the correct record for the SOFTWARE LOCATION inquiry.

Users may only enter a partial title for the software (for example, the letter D), and the first record matching that partial title (Dreamweaver) would display. They would have to move to subsequent records to display the desired package.

8. Design the SOFTWARE DETAILS inquiry display. The entry field is SOFTWARE INVENTORY

NUMBER, and all software information, with the exception of EXPERT and MACHINES INSTALLED

ON, should be displayed. Refer to the Visible Analyst (or Repository Web page) SOFTWARE

DETAILS data flow repository entry.

MAIN MENU

1. MICROCOMPUTER CONTAINING SOFTWARE

2. SOFTWARE BY CATEGORY

3. SOFTWARE BY ROOM

4. SOFTWARE EXPERT

5. SOFTWARE LOCATION

6. SOFTWARE TRAINING CLASSES

7. HARDWARE CHARACTERISTICS INQUIRY

8. SOFTWARE CROSS-REFERENCE REPORT

9. NEW SOFTWARE INSTALLED REPORT

$CHOICE

Page 9: PROYECTO 13-17

9. When scheduling classrooms for student use, Cher Ware needs to know all the software

packages in a given room. She would like to enter the CAMPUS LOCATION and the ROOM on an

inquiry display. The fields would be TITLE, VERSION, SITE LICENSE, and NUMBER OF COPIES.

Design the SOFTWARE BY ROOM inquiry, which is described as a data flow in the Visible Analyst

repository.

Page 10: PROYECTO 13-17

10. Every so often, Hy Perteks receives a request for help concerning a given software package. Staff members and students need to perform advanced options or transfer data to and from different packages, and they are having difficulties. Hy would like to enter the software TITLE and VERSION NUMBER. The resulting display would show the SOFTWARE EXPERT NAME and his or her CAMPUS LOCATION and ROOM NUMBER. Design the screen for the LOCATE SOFTWARE EXPERT inquiry. Describe the logic and files needed to produce the inquiry. Use value, entity, and attribute (V, E, A) notation for this inquiry. The details for this inquiry are included in the Visible Analyst SOFTWARE EXPERT data flow repository entry.

Inquiry type: Type 1, V (E, A)

Page 11: PROYECTO 13-17

11. Hy receives a number of requests for training classes. He would like to plan training and place

the upcoming classes on the intranet so that faculty would have an adequate amount of lead time to

schedule a class. Design the SOFTWARE TRAINING CLASSES inquiry. The details may be found in the

Visible Analyst data flow repository (or the Repository Web page) entry called SOFTWARE TRAINING

CLASSES.

Page 12: PROYECTO 13-17

Chapter 15

1. Modify and print the following elements with edit criteria in the Notes (or Values and Meanings for specific codes) area. These may be found in the Repository Web page or in the Visible Analyst repository.

Element Edit Criteria

a. SOFTWARE CATEGORY Table of codes: Software Category Code b. COURSE TRAINING B: Beginning; I: Intermediate;

LEVEL CODE A: Advanced c. OPERATING SYSTEM W: Windows Vista Ultimate;

B: Windows Vista Business; U: Unix

a.

Date: 12/07/2012 Project: CPU Page: 1 Time: 12:44:27 AM Single Entry Listing Whole Repository ______________________________________________________________________________

___________________

Software Category Data Element Description: The category of software (e.g. Word Processing). This is a coded entry, stored as an Access table. Alias: Type Of Software Values & Meanings: Software Software Category Type Description -------- -------------------- ACCN Accounting CAD Computer Aided Design CASE CASE toolset COM Communications DB Database DPUB Desktop Publishing EDUC Educational FNCL Financial GRPH Graphics Package INDS Internet Site Design INTG Integrated

Page 13: PROYECTO 13-17

INTN Internet Web Page Design PERS Personal Organizer PGM Programming Languages PGMT Project Management STE Software Suite TRNG Training UTIL Utilities Data element attributes Storage Type: Char Length: 4 Picture: X(4) Display Format: X(4) Null Type: NotNull Notes: Table of codes: Software Category Code The code must be alphabetic.

b.

Course Training Level Code Data Element Description: A code to determine the level of training. Values & Meanings: B: Beginning I: Intermediate A: Advanced X: Expert Data element attributes Storage Type: Char Length: 1 Picture: X Display Format: X Default: B Null Type: NotNull

Page 14: PROYECTO 13-17

c.

Operating System Data Element Description: A code used to store the type of operating system installed on a computer or the operating system required by a software package. Values & Meanings: Operating Operating System System Code Meaning L Linux M Mac OS X Leopard N Ubuntu U Unix B Window Vista Business W Window Vista Ultimate 7 Windows 7 V Windows Vista X Windows XP P Windows XP Pro Data element attributes Storage Type: Char Length: 1 Picture: X Null Type: NotNull Notes: Table of Codes: Operating System Names

2. Modify and print the following elements with edit criteria placed in the Notes area:

a. Element: SOFTWARE INVENTORY NUMBER

Notes: A modulus-11 check digit must be verified when entering the number. The ADD SOFTWARE program creates the check digit. The ADD SOFTWARE program should also check the SOFTWARE MASTER file to ensure that a record with the same inventory number does not already exist.

b. Element: DATE PURCHASED Notes: Verify that the DATE PURCHASED is less than or equal to the current date.

c. Element: QUANTITY RECEIVED Notes: Verify that the QUANTITY RECEIVED is less than or equal to the QUANTITY ORDERED.

d. Element: SOFTWARE UPGRADE VERSION Notes: Ensure that the software UPGRADE VERSION is greater than the current version.

e. Element: HARD DRIVE Notes: SECOND HARD DRIVE may exist only if there is an entry for HARD DRIVE.

Page 15: PROYECTO 13-17

a.

Software Inventory Number Data Element Description: Unique software identification number. Alias: Software Primary Key Data element attributes Storage Type: Char Length: 8 Picture: 9(8) Null Type: NotNull Notes: A modulus-11 check digit must be verified when entering the number. The ADD SOFTWARE program should also check the SOFTWARE MASTER to ensure that a record with the same inventory number does not already exist. b.

Date Purchased Data Element Description: Date that the machine was purchased. Alias: Acquisition Date Data element attributes Storage Type: Date Length: 8 Picture: Z9/99/9999 Null Type: NotNull Notes: Editing should verify that the date purchased is less than or equal to the current date.

c. Quantity Received Data Element Description: Quantity of hardware items received for a purchase order. Alias: Quantity Shipped Data element attributes Storage Type: Integer 4 Length: 6 Picture: 9(6) Null Type: NotNull Notes: Verify that the QUANTITY RECEIVED is less than or equal to the QUANTITY ORDERED.

Page 16: PROYECTO 13-17

d.

Software Upgrade Version Data Element Description: The software version number, e.g. 6.01, 10.21, 7.01B, 8.01+ Data element attributes Storage Type: Char Length: 6 Picture: X(6) Null Type: NotNull

e.

Hard Drive Data Element Description: The size of the computer hard drive in gigabytes (GB). Data element attributes Storage Type: Integer 4 Length: 5 Picture: 9(5) Display Format: ZZZZ9 Null Type: NotNull Notes: The second hard drive may exist only if the hard drive exists.

3. After speaking with Dot Matricks and Mike Crowe, it has become apparent that the campus

codes must be sortable for installing hardware and software, as well as for creating inventory sheets. Use Microsoft Access to modify and print the CAMPUS LOCATION CODES table. The first digit represents the campus location. Values are as follows:

1 Central Campus 2 Waterford Campus 3 Hillside Campus The next three digits represent buildings in the campus, with the following building codes:

001 Administration 010 Environmental Studies 002 Admissions 011 Geology 003 Agricultural 012 Law 004 Astronomy 013 Library 005 Business 014 Mathematics 006 Chemical Engineering 015 Medicine 007 Computer Science 016 Physics 008 Education 017 Psychology 009 Engineering 018 Zoology Use a combination (your choice) of campus and building codes to build the final

Page 17: PROYECTO 13-17

table of codes. Include the meaning of the code.

Student results will vary. A sample of the table is illustrated below.

Campus Location Codes

Campus Code Campus Description

1001 Central Administration

1004 Central Astronomy

1007 Central Computer Science

1018 Central Zoology

2002 Waterford Admissions

2005 Waterford Business

2014 Waterford Mathematics

3001 Hillside Administration

3004 Hillside Astronomy

3010 Hillside Environmental Studies

3015 Hillside Medicine

3016 Hillside Physics

Page 18: PROYECTO 13-17

Chapter 16 E Use a paragraph to speculate on why the star network configuration was used. Does it matter

that users are in several different rooms?

The star network was chosen for a number of reasons:

a. Computers are located in several rooms, not all in the same proximity, rather than the same room. The star network makes cabling them easier than a ring network.

b. The star network allows the data files to be located on the central node, the host

computer. All updating and inquiries are processed using one set of files that may be locked in a secure area. Backup becomes an easy task, using removable hard disks or streamer tape.

c. A computer may be disconnected for repairs or upgrading without disrupting other

computers.

d. Message passing is not a requirement of the system. 1. Describe procedures that should be designed to create automatic backup files. In a paragraph,

be sure to consider the pros and cons of these procedures.

Backup will be performed on two levels.

a. All transactions entering the system from online screens will be placed on log (or journal) transaction files. These are located on a smaller, second hard disk within the server computer. If there is a head crash or other problem on the main hard disk, the backup files would still exist. The format of the log files is:

System Date

System Time

Computer ID User ID Screen data. The format of this portion of the log record varies from screen to screen.

b. All database files are copied to tape every night. These are removed to one of the other

campus locations and stored in a vault.

Advantages:

i. Backup of all major files ii. Faster backup because major files do not have to be backed up before each

update iii. Continual backup using the log files

Disadvantages:

i. Programs must be written to restore database records in a batch mode from the

log files.

Page 19: PROYECTO 13-17

ii. Streamer tape units may be initially expensive. 2. List security measures that should be taken to prevent unauthorized persons from using the

computer system.

Security measures are:

a. The server computer is locked in an area only accessible to authorized personnel. b. User IDs and passwords are used to access menus and programs. Coded user IDs restrict

access to update and inquiry functions. 3. Outline a disaster recovery plan for the new computer system you have created for CPU. In

particular focus on the teams that will be responsible for managing a crisis.

The disaster plan should focus on the following:

A. Physical security and facilities will ensure power backup of equipment. B. Physical security will devise a plan to evacuate or otherwise protect students and

employees. It will include various methods of communication, such as text messaging, calling, sending system messages, and notification using room speakers.

C. Information Systems will plan for all backup and duplicate facilities for running systems. D. An interdepartmental team will analyze and determine single points of failure. E. The disabilities coordinator will ensure all disabled individuals will be protected and be

part of all evacuation plans. 4. Explain in a paragraph why a phased conversion would be used to install the computer system.

A phased conversion is the best method because the system has several major subsystems. Hardware records and programs must be installed first because software records reference them. The phased conversion provides data entry personnel time to update records with additional data elements not stored in the old system.