Week 4 Discussion 1
“Optimizing Database Design” Please respond to the following:
•Many legacy systems require normalization. Identify at least two factors that should be considered in order to produce an optimal normalized set of tables when performing normalization. Include in your discussion a detailed example on how each factor would eliminate data redundancy.
•Optimal database design recognizes proper organization of table structures and relationships. Suggest at least two methods that can be used to improve the design of a database system.
Week 4 Discussion 2
“Denormalization Functionality” Please respond to the following:
•Having an adequate data model to serve specific business needs of an organization is important. Evaluate the need for denormalization within an organization. Provide at least three examples that prove denormalization is useful to data consumers.
•Using a data-modeling checklist can help database developers design efficient data repositories. Suggest at least two possible scenarios that could take place if one of the steps in the data-modeling checklist is missed.
Week 5 Discussion 1
“Relational Set Operators”
•A relational Database Model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as UNION and INTERSECT may be used. Describe a business scenario where a UNION relational set operator may be used to merge two similar data sets. Within the context of your business scenario, analyze the analysis and data consistency advantages of using a UNION operator rather than simply merging two data sets into one result table.
•Suppose you are tasked with finding common data elements amongst various data sets. Specify how an INTERSECT operator may assist you in accomplishing this task. Construct a query that can perform the same function as the INTERSECT operator without using the “INTERSECT” syntax within the query. Note: The Strayer Oracle Server may be used to test and compile the SQL Queries developed.
Week 5 Discussion 2
“Advanced SQL and PL / SQL” Please respond to the following:
•Extracting and interpreting data can be very valuable to an organization. Describe the importance of using sub queries in a database system. Provide at least two business case scenarios to support your response.
•A good IT professional is able to be versatile in SQL programming styles. Identify at least two possible advantages of utilizing PL / SQL instead of standard SQL Syntax. Explain whether either syntax provides enhanced code processing capabilities with examples. Note: The Strayer Oracle Server may be used to test and compile the SQL Queries developed.
Week 6 Discussion 1
“Planning the DBLC” Please respond to the following:
•The development of a database requires thorough methodology that ensures quality within the solution. Imagine you have been contracted to develop a finance database that will help an organization track monthly expenditures by departments. Using the DBLC, discuss the various activities that you would have to achieve each phase. Assess possible challenges that may exist within each phase. Suggest actions that one can perform in order to overcome these possible challenges.
•In order to mitigate risks associated with a database, it is essential to consider common sources of database failures. Describe at least two possible database failures that may occur once a database is placed into operation. Suggest actions that may be performed in order to avoid or mitigate these possible failures.
Week 6 Discussion 2
“Logical and Physical Design” Please respond to the following:
•In order to ensure optimal database performance, the logical and physical design should consider the user requirements thoroughly. Suppose you have been hired to transform a conceptual model into a logical model for a sales database. Describe the specific steps that you must perform in order to appropriately construct the database model. For each step mentioned, speculate the risks that would take place and how you would avoid or mitigate those risks.
•Suggest at least three activities that are required in the physical design process of a database to ensure adequate physical storage and data access. Analyze why user, security groups, and role definitions are essential to maintain the integrity of the database.