DeVry University
Team Case Study: Database Design
BIS245
DeVry University
Team Case Study: Database
... [Show More] Design
BIS245
Primary Keys and Attributes
The primary keys will include, Doctor’s ID, Patients ID, and procedures ID, and Appointment ID.
Data types for each entity
Patients entity – patients first and last names, name of kin, date of birth, postal address, social security number, sex, contact number.
Doctor entity – Name of doctor, doctor work ID, specialty.
Appointment entity – Appointment, name of doctor ID, patient ID, Date, Time.
Medical Procedure entity – Medical procedure ID, Order Number, Patient ID, doctor ID,
Entity relationships explained
The patient can have many doctors representing a many to many to one relationship. The doctor can order several tests representing a one to many relationship. One doctor performs a single procedure per patient making it a one to one relationship.
The best way to describe the impact on databases in the workplace to that they are used to run both small and large businesses. They are used to organize information that can be stored just about anywhere, they also sort this information, so it can be delivered as needed. They can also be used to track customers their inventory and employees. The customer relationship management (CRM) is the lifeline for small businesses. The most important part of the CRM is it, customers. This type of database is responsible for all aspects of the business such as its accounts, contacts, leads and any opportunities. Because of the way this system is designed it holds customers records which would include their contact information, date and amount of last order, a total amount that was spent for the year and even a list of their favorite products or even if they had any returns. On the inventory tracking side of this database, it would be able to show you what inventory was in the stores and even the warehouse. With the integrated barcode system, it provides even a better tracking system because is show exactly where the product is at any given time. An example of this would be it could show you when it left the warehouse when it arrived at the store or even where it’s at in transit. Because of this type of system, you would never have to count what’s in the warehouse because the system already knows, it also has the possibility to alert you when the product is running low and it can be reordered before you run out of essential items.
When it comes to personnel database system run a little different because they are responsible for managing the employee. It simplifies the scheduling process and every help prevents payroll errors. This type of database would be responsible for information such as yearly salaries, hourly wages, year to date income and if they have accrued any vacation time. There are many more benefits to this type of system which would also include health insurance coverages, retirement accounting information and what contribution the employee has made to the play.
Before we can discuss the benefits or why a business will use queries we first need to know what a query is. It can be defined as a question that is expressed in a formal way. There are two types query either select or action. Depending on the requirement would determine which to use. If you wanted to retrieve data, it would be select but if you want additional operations it would be action. Business’s use queries as the primary mechanism for retrieving information that is stored in the database. This is accomplished by a consist of questions presented in a predefined format. When is come to querying this information the majority of database’s us structured query language (SQL) to perform this operation. The primary use for queries is to find specific data by filtering specific criteria. This enables businesses to find the needed information quickly. There are many other functions that query provides to businesses such as calculating and summarizing data. They can also be used to set parameters, totals, make tables and append the information already in the database by updating or deleting information. This essentially provided the business with up to date records.
The best with to describe form and report is that a form is used to enter, modify and review records. More than likely we fill out forms every day such as if you have a visit the doctor if you apply for a job or even when you register for school. There are many more reason that we fill out a form I have given you a few. This information is used when someone enters this into a database. When you enter this information using Access it goes directly where the database designer wants it to go. Whereas report, on the other hand, is the printed data from the database. These reports are useful because they allow you to present the information from the database in an easy to read format. They can even be customized to can their appearance to make it more visually appealing.
There are numerous security concerns that should be discussed with mitigation of systems, but I will only discuss a few. The first one is Database injection attacks. There are only two major types of database injection attacks. One is SQL injections and this one just targets traditional database systems. The other is called a NoSQL injection that target and this one normally just target big data platforms. But a very important thing to remember here is that, although it is technically true that big data solutions are impervious to SQL injection attacks because they don’t use any SQL-based technology, they are, in fact, still susceptible to the same fundamental class of attack. In either case, an injection attack will give the attacker unrestricted access to your database.
On the other, there is Exploitation of vulnerable databases. Because of the length of time, it takes some organizations months to patch databases this leave them even more vulnerable. Attackers that have the technical knowledge know how to exploit the flaw in the in this database. Unfortunately, this has become a problem because organizations often struggle to stay on top of maintaining their database configurations even when they know that patches are available. Some of these issues may include high workloads, or it could be too complex and time-consuming for testing patches. Another thing could be the amount of time that’s needed to take down the system to install patches which would occur during the business days.
References
Database Uses in Business. (n.d.). Retrieved March 18, 2018, from
http://smallbusiness.chron.com/database-uses-business-64298.html
Exploring Microsoft Office Access 2016 Comprehensive. (2016). Pearson College Div.
Kroenke, D. M., Auer, D. J., Vandenberg, S. L., & Yoder, R. C. (2018). Database processing:
Fundamentals, design, and implementation. Boston: Pearson.
Top Database Security Threats and How to Mitigate Them. (2017, May 19). Retrieved March 18,
2018, from https://www.shrm.org/resourcesandtools/hr-topics/risk-management/pages/top-database-security-threats.aspx
What is query? - Definition from WhatIs.com. (n.d.). Retrieved March 18, 2018, from
http://searchsqlserver.techtarget.com/definition/quer [Show Less]