Database Essays (Examples)

1000+ documents containing “database”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Database Differentiation
Pages: 5 Words: 1805

Database Differentiation
Description of the data models

A detailed description of all the tables that a database consists of is referred to as a data dictionary. A data dictionary will contain all the attribute characteristics and names for every table found within a database system. A data dictionary can also be referred to as a metadata repository. This is because it contains information like relationships with other data, meaning, usage, format, and origin. According to Coronel, Morris, and ob (2011)

the data dictionary is a vital component for any database management systems as it is used for determining the database structure.

Data fragmentation is a characteristic of database management systems which allows for the breaking of a single object into two or more fragments or segments. The object being broken down might be a system or user database. Each of the broken fragments can then be stored at any location on a computer network.…...

mla

References

Abdelhak, M., Grostick, S., & Hanken, M.A. (2012). Health Information: Management of a strategic resources. St. Louis, MO: Elsevier Saunders.

Cohen, R., Elhadad, M., & Elhadad, N. (2013). Redundancy in electronic health record corpora: analysis, impact on text mining performance and mitigation strategies. [Article]. BMC Bioinformatics, 14(1), 1-15. doi: 10.1186/1471-2105-14-10

Coronel, C., Morris, S.A., & Rob, P. (2011). Database Systems: Design, Implementation, and Management (with Bind-in Printed Access Card). Boston, MA: Course Technology Cengage Learning.

Hebda, T.L., & Patricia Czar, R. (2009). Handbook of Informatics for Nurses and Healthcare Professionals. Upper Saddle River, NJ: Pearson Education, Limited.

Essay
Database Presentation
Pages: 5 Words: 1460

Database Presentation
The objective of this study is to present a new database to be implemented in the clinical setting to increase quality and safety of patient care.

The database at focus in this work in writing is that of the Targeted Therapy Database (TTD) in a Cancer unit in a hospital. The work of Mocellin, et al. (2010) relates that the "efficacy of current anticancer treatments is far from satisfactory and many patients still die of their disease. A general agreement exists on the urgency of developing molecularly targeted therapies, although their implementation in the clinical setting is in its infancy. In fact, despite the wealth of preclinical studies addressing these issues, the difficulty of testing each targeted therapy hypothesis in the clinical arena represents an intrinsic obstacle. As a consequence, we are witnessing a paradoxical situation where most hypotheses about the molecular and cellular biology of cancer remain clinically untested…...

mla

Bibliography

Zhu, Feng, et al. (2010) Update of TTD: Therapeutic Target Database. Nucleic Acids Res 2010, Jan; 38. Retrieved from:  http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2808971/ 

Mocellin, S. (2010) Targeted Therapy Database (TTD): A Model to Match Patient's Molecular Profile with Current Knowledge on Cancer Biology. PLoS. Retrieved from:  http://www.plosone.org/article/citationList.action;jsessionid=9668016174E6CACB8CFBBB1BD64BC81B?articleURI=info%3Adoi%2F10.1371%2Fjournal.pone.0011965 

Chen, ZL and Chen, YZ (2002) TTD: Therapeutic Target Database. Nucl. Acids Res. 39 (1). Retrieved from:  http://nar.oxfordjournals.org/content/30/1/412.full

Essay
Database Technology Administration Database Technology
Pages: 15 Words: 4402

"
"STUDENT INFOMATION TABLE" (

"STUDENT ID" CHAACTE (4) NOT NULL,

NAME CHAACTE (25) NOT NULL,

"STEET NUMBE" CHAACTE (10) NOT NULL,

"STEET NAME" CHAACTE (25) NOT NULL,

CITY CHAACTE (25) NOT NULL,

STATE CHAACTE (10) NOT NULL,

EMAIL CHAACTE (25) NOT NULL,

"PHONE NUMBE" CHAACTE (15) NOT NULL );

CONNECT ESET;

SQL FO Book_Information

CONNECT TO LIBAY;

CEATE TABLE "USE";

CEATE TABLE BookInformation (

"BookISBN" CHAACTE (10) NOT NULL;

"AUTHO" CHAACTE (25) NOT NULL;

"TITLE" CHAACTE (50) NOT NULL;

"PICE" CHAACTE (10) NOT NULL;

CONNECT ESET;

SQL STATEMENT FO CD

CONNECT TO LIBAY;

CEATE TABLE "USE";

CEATE TABLE CD (

"CD-Id" CHAACTE (25) NOT NULL;

"AUTHO" CHAACTE (25) NOT NULL;

"TITLE" CHAACTE (25) NOT NULL;

"PICE" CHAACTE (25) NOT NULL;

CONNECT ESET;

Experience Gained from this Assignment

The assignment has enhanced my greater understanding on the method to use IBM DB2 Express to develop database. Although, it takes me several hours to download the software; however; I have learned several techniques to develop the database. Although, I have already developed the method to create database from the classroom note,…...

mla

References

Allen, S. And Terry, E. (2005), Beginning Relational Data Modeling. Chapter 2. Introducing Relational Theory . Springer. USA.

Johnson, R. (2011).Functional dependencies, decompositions, normal forms. University of Toronto.

Litwin, P. Getz, K. & Gunderloy, M. (2002).Fundamentals of Relational Database Design. Microsoft Access 2 Developer's Handbook. USA. Sybex Inc.

Orr, N.(2007). Understanding and using the Database Design Report - Part 1. Goya Pty Ltd.

Essay
Database Administrator for Department Store
Pages: 13 Words: 3901

Database Administrator for Department Store
Scenario

The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will assist the organization to support the new marketing strategy, and align with the product initiatives.

Identification of the Potential Departmental and Sales Transaction to be Store within the Database

In the United States, the enterprise-wide relational database is very critical for the retail bookstore envisaging increasing sales within the contemporary business environment. To design a database to support the accuracy of the business information for the departmental store, there is a need to identify the potential sales transaction. This identification will avoid…...

Essay
Database Design for SPA Hotel Booking System
Pages: 12 Words: 3480

Database Design for Spa/Hotel Booking System
The W (Woodlands etreat) is a medium sized organization currently intending to build a database system to integrate modern IT (information systems) in its business operation to enhance its dynamic and innovative business operations. Although, the Woodlands etreat has an IT system, however, the current systems are not capable of keeping book records as well as not capable of managing all data for the company new added facilities.

Objective of this project is to build a relational database for the Woodlands etreat using a SQL database methodology. The project provides the important assumption, and business constraints related to the project.

: Assumptions and Business Constraints

The document provides the assumption and business constraints on the baseline up which the project will be accepted. The methodology used to complete the project is SQL methodology. Moreover, the database will be designed to enforce the restriction and business rule in order…...

mla

Reference

Caprita, D.A. & Mazilescu, V.(2005). Web-Based Database Distributed Systems. Economy Informatics.127-131.

Connolly T & Carolyn B, (2010). Database Systems (5th Edition), Addison Wesley. UK.

Hellerstein, J.M. Stonebraker, M. & Hamilton, J.(2007). Architecture of a Database System, Foundations and Trends in Databases.1,(2): 141 -- 259.

Hernandez, M.J. (2003), Database Design for Mere Mortals: A Hands-on Guide to Relational Database Design, Chicago, Addison-Wesley Professional,

Essay
Database What Is a Database
Pages: 5 Words: 1421

These factors further accelerate the value and TCO of databases over time.
Describe the features, tools, and utilities of Structured Query Language (SQL). How can tasks be automated with SQL?

SQL has specifically been designed with features, tools and utilities to enable programmers to support nth-tier data architectures in addition to legacy client-server computing scenarios. The development and continual improvement of the features, tools and utilities of SQL for automating tasks have also been augmented to include auditing of programming tasks as well (Dadashzadeh, 2003). The functionality, features, tools and utilities of SQL have also been specifically designed to measure and improve performance as well (Mercioiu, Vladucu, 2010). The specific tools included in nearly all SQL language platforms include support for data migration via the ODBC interface (Melton, 1996), support for enhanced multi-table and data modeling support, and enterprise-wide migration of databases across diverse computing platforms (Melton, 1996). In addition to…...

mla

References

Ahlswede, R., & Aydinian, H. (2011). On security of statistical databases. SIAM Journal on Discrete Mathematics, 25(4), 1778-14.

Dadashzadeh, M. (2003). A simpler approach to set comparison queries in SQL. Journal of Information Systems Education, 14(4), 345-348.

Jadhao, P.P., & Bamnote, G.R. (2012). Query translation from sql-xml environment. Software Engineering, 3(1), 14-16.

Kinsley, K.C., & Hughes, C.E. (1988). Evaluating database update schemes: A methodology and its applications to distributive systems. IEEE Transactions on Software Engineering, 14(8), 1081-1089.

Essay
Database Management Today Nearly Everyone in Across
Pages: 3 Words: 807

Database Management
Today, nearly everyone in across the world would love to store their information in the database to keep track of everyday activities. Organizations are also not left behind in operating their businesses by storing their information on databases. Databases are designed in a way they offer organized mechanisms for storage, managing and retrieving information. The data are stored and organized in different tables by the use of Microsoft Excel or using Structured Query Languages (SQL). Most people have implemented systems that are integrated with databases since they have recognized databases to be the best method of storing and retrieving information that may be of help in the future. For that case, this paper will analyze how energy auditing database can be created and how it will keep track of personal workout history for fitness focused individual using Visio or Entity relationship assistant to create Entity Relationship Diagram (ERD).

How Energy…...

Essay
Database Modeling and Normalization
Pages: 3 Words: 940

Database Modeling and Normalization
Entity elationship Model (EM) Diagram is a data model used to describe the database in an abstract method. The relational database stores data in table. The entity in the database could point to several entries. For example, employee is an entity in the relationship database, and a diagram used to create the entity in the database is called entity-relationship diagrams or E diagrams. (Silberschatz, Korth, 2006).

Objective of this report is to develop an entity relationship diagram for a consulting firm that offers information technology and database services. The firm attempts to create a relationships database to optimize and offer streamline solution efficiently in order to satisfy the government's requirements. The firm will create an EM database to optimized data repository that will allow the firm to perform human resources (H) functions effectively, which include as policy enforcement, benefits management, hiring, promotions, and training.

The paper provides the steps…...

mla

Reference

Silberschatz, A. Korth, S. (2006). Database System Concepts (5th ed.). McGraw-Hill. USA.

Rob, P. & Corone, C.(2009). Database Systems: Design: Design, Implementation, and Management. Cengage learning.

Essay
Databases and Data Management Every Day Nurses
Pages: 4 Words: 1498

Databases and Data Management
Every day, nurses health care practitioners challenged managing large quantities data information. Unless data information translated knowledge, meaningful . Databases data management techniques, designed effectively, present health care organizations

Epic database is designed for large health care organizations. The database captures data related to patient care in a health care organization. The database facilitates patient registration, treatment scheduling, lab test results, radiology information, and billing. The database is able to schedule for any tests that a patient needs in the course of treatment. The information is used across the health care facility to assist in decision making. Having a centralized system for capturing and storing patient information and records is vital for a quick decision making especially for the nurses. This is because the nurses are able to follow up on a patient's treatment from a central place Burton, Anderson, & Kues, 2004.

The nurses are also able to…...

mla

References

Burton, L.C., Anderson, G.F., & Kues, I.W. (2004). Using Electronic Health Records to Help Coordinate Care. The Milbank Quarterly, 82(3), 457-481. doi: 10.2307/4150507

Kidd, M.R. (2008). Personal Electronic Health Records: MySpace or HealthSpace? BMJ: British Medical Journal, 336(7652), 1029-1030. doi: 10.2307/20509688

Laxmisan, A., Sittig, D.F., Pietz, K., Espadas, D., Krishnan, B., & Singh, H. (2012). Effectiveness of an Electronic Health Record-based Intervention to Improve Follow-up of Abnormal Pathology Results: A Retrospective Record Analysis. Medical Care, 50(10), 898-904. doi: 10.2307/41714592

Pagliari, C., Don, D., & Singleton, P. (2007). Potential of electronic personal health records. BMJ: British Medical Journal, 335(7615), 330-333. doi: 10.2307/25690019

Essay
Database Development
Pages: 3 Words: 814

Database Development
The objective of this study is to recommend three specific tasks that could be performed to improve the quality of datasets using the Software Development Life Cycle (SDLC) methodology and to recommend the actions that could be performed to optimize record selections and to improve database performance from a quantitative data quality assessment. Finally, this work will suggest three maintenance plans and three activities that could be performed in order to improve data quality. The second part of this study involves the evaluation of which method would be efficient for planning proactive concurrency control methods and lock granularities and assessment of how the selected method can be used to minimize the database security risks that may occur within a multiuser environment. Secondly, this work will analyze how the verify method can be used to plan system effectively and ensure that the number of transactions do not produce record-level locking…...

mla

Works Cited

Development Methodologies. ACM Computing Surveys, Vol. 40, No. 1, Article 3, Publication date: February 2008.

Even, A. And Shankaranarayanan (2009) Dual Assessment of Data Quality in Customer Databases. ACM Journal of Data and Information Quality, Vol. 1, No. 3, Article 15, Pub. date: December 2009.

Locks and concurrency control (2013) IBM. Retrieved from:  http://publib.boulder.ibm.com/infocenter/db2luw/v9r5/index.jsp?topic=%2Fcom.ibm.db2.luw.admin.perf.doc%2Fdoc%2Fc0005266.html 

Loshin, D. (2013) Five Fundamental Data Quality Practices. Pitney Bowes. Retrieved from:  http://www.pbinsight.com/files/resource-library/resource-files/five_fundamental_data_quality_practices_WP.pdf

Essay
Database Security Backup or Recovery
Pages: 7 Words: 2090

Part 1: Concurrency Issues in the Database 1. Considering that these various transactions use some of the same tables and fields in the database, explain why it is important for the changes made by each of these transactions to be atomic. (2 pts)
Answer: The necessity of an atomic transaction, in this case, is to maintain state consistency in the database system. Since various transactions require the use of the same fields/data within the database, a sequential update to each field (prioritized based on order of transactions conducted) could lead to an imbalance in the overall system. For example: assuming a few items are sold to a customer and the sales information is updated. There is a need for an immediate update to the “QuantityOnHand” field (a reduction, since a certain unit of items have been sold), along with an update to the “total sales”, “Profit” and other relevant fields. Also, atomic…...

Essay
Database Administration Today in Evaluating
Pages: 11 Words: 3489


Design citeia exist at the levels of the technical, system integation aspects of the database to othe systems though XML. This integation is citically impotant to ensue that the applications ceated can be effectively used ove time and not have any scalability issues. Thee is also the need fo designing the databases at the pesentation laye to povide fo scalability and flexibility of being able to ceate applications elatively quickly at the potal level. This is especially impotant fom a Business Pocess Management (BPM) standpoint as databases must be able to suppot the vaious pocess wokflows as defined as pat of business pocess e-engineeing effots ove time. Thee is also the need fom a design standpoint to have a continued development initiative going to captue use needs ove time and include them into the next geneation of database updates. The use of councils to ceate update plans and define the…...

mla

references and real-time workload in information services. Information Systems Research, 11(2), 177-196.

Pangalos, George (1994). A tutorial on secure database systems. Information and Software Technology, 36(12), 717.

Gerald Post & Albert Kagan (2001). Database management systems: Design considerations and attribute facilities. The Journal of Systems and Software, 56(2), 183-193.

Ji Ma, Mehmet A Orgun. (2008). Formalising theories of trust for authentication protocols. Information Systems Frontiers, 10(1), 19-32.

Reagan, J., & Rowlands, I.. (2007, January). Key Technologies Enabling a Seismic Shift in Enterprise Data Management. Business Intelligence Journal, 12(1), 17-25.

Essay
Databases Some of the Many
Pages: 4 Words: 1158


Microsoft supports distributed component objects via distributed COM (DCOM). DCOM use remote procedure calls to organize data between processes and computers so that components appear to have the same word size, bit orientation, and address space. DCOM is a direct competitor to CORA, discussed next.

V. Common Object Request roker Architecture (CORA)

CORA is OMG's open, vendor-independent architecture and infrastructure that computer applications use to work together over networks (CORA asics). Using a standard protocol, a CORA-based program from any vendor, on almost any computer, operating system, programming language, and network, can interoperate with a CORA-based program from the same or another vendor, on almost any other computer, operating system, programming language, and network.

The core foundation of CORA is the Object Request roker (OR) that provides an interface between requesting objects and receiving objects (CORA, TechTarget). OR support in a network of clients and servers on different computers means that a client…...

mla

Bibliography

Chand, M. (2000, June 25). What is ADO? Retrieved from Web site:  http://www.mindcracker.com/mindcracker/c_cafe/ado/ado1.asp 

Comparing OLE DB and ODBC. SAS. Retrieved October 11, 2004 from Web site:  http://64.233.167.104/search?q=cache:SG8oogJgknEJ:ftp.sas.com/techsup/download/v8papers/odbcdb.pdf+ODBC+and+%22OLE+DB%22+differences&hl=en 

CORBA, TechTarget. Retrieved October 11, 2004 from Web site:  http://searchdatabase.techtarget.com/sDefinition/0,sid13_gci213865,00.html 

CORBA Basics. Object Management Group. Retrieved October 11, 2004 from Web site:  http://www.omg.org/gettingstarted/corbafaq.htm

Essay
Database Administrator Manager of it and the Value of a College Education
Pages: 6 Words: 1972

Database Administrator, Manager of IT, and the value of a college education
As a result of swift distribution of computers and information technology, a necessity for well trained workers to design and promote new hardware and software systems and to integrate new technologies. These workers comprises of computer systems analysts, database administrators, and computer scientists. Based on the choices and procedures of employers and on development of new areas of specialization or alterations in technology, the job responsibilities and professional titles relating these workers change quickly. An ever-increasing level of talent and education from the employees is demanded by the speedily shifting technology. Organization's expectation on professionals is broadening from wholesome technical knowledge to communication and other interpersonal skills. Hence, workers who can manage various tasks are in great need.

Though employers favor workers with technical degrees, persons with degrees in a range of majors also get employment in these computer jobs.…...

mla

References

Allen, Gemmy. (1998) "Managerial Roles" retrieved from Accessed on 7 May 2005http://ollie.dcccd.edu/mgmt1374/book_contents/1overview/managerial_roles/mgrl_roles.htm

"Career guide for Database Administrator" retrieved from Accessed on 7 May 2005http://jobs.state.va.us/careerguides/DataBaseAdmin.htm

"Computer Database Analysts & Administrators" (5 May, 2005) Retrieved from Accessed on 7 May 2005http://www3.ccps.virginia.edu/career_prospects/briefs/A-D/DatabaseAdmin.shtml

"Computer Systems Analysts, Database Administrators, and Computer Scientists" (May 18, 2004) U.S. Department of Labor: Bureau of Labor Statistics. Retrieved from   Accessed on 7 May 2005http://www.bls.gov/oco/ocos042.htm 

Essay
Database Shadowing or Mirroring What
Pages: 5 Words: 2137

This would also mean that the shadowing process goes on behind the scenes, and one need not even be aware that the process is in fact going on at any point of time; it can go on without creating any sort of disturbance to the user of the application, at any point of time. (Shadow Files)
Another important advantage of using the shadowing of a database is that data would be immediately available, even when the primary database has failed due to some reason or another. Non-exclusive usage of the primary database is also permitted, and this means that the database will not be locked, and this in turn means that it can be updated and changed during the process of its creation. Computer resource can be conserved, and this is because of the fact that shadowing does not use any separate process; the database process gives the shadow database…...

mla

References

Database Shadowing System with data tags that select an operation of the save command"

Retrieved at   Accessed 4 October, 2005http://www.freepatentsonline.com/5230075.html .

Data Recovery without data loss" Retrieved at 4 October, 2005http://www.enet.com/enet.com.nsf/PAGES_RRDF_Recov.html?OpenPage&charset=iso-8859-1Accessed

Eng, Audra. (July, 2004) "Sygate Secure Enterprise, 4.0" Retrieved at Accessed 4 October, 2005http://www.sygate.com/solutions/datasheets/wp/WP-Sygate-Secure-Enterprise.pdf.

Q/A
Can you provide me with some sample essay titles, essay topics, and outline for paper on health informatics?
Words: 570

Health informatics, also known as healthcare informatics or biomedical informatics, refers to a discipline that is a hybrid of science and engineering and involves the application of informatics fields to medicine.  There are number of different topics that fall under the healthcare informatics umbrella, though the creation of electronic health records for patients is probably the most widely used application.   

Essay Titles and Essay topics for Health Informatics

Tallying the Tests: How Monitoring COVID-19 Test Results Has Helped Track the Pandemic in the U.S. and Abroad

Vaccine Records and Privacy Concerns: How Do State....

Q/A
need a research proposal and outline for a college paper on educational reform?
Words: 722

Sure! Here is a sample research proposal and outline for a college paper on educational reform:

Research Proposal: Exploring the Impact of Educational Reform on Student Achievement and Equity

I. Introduction
A. Background of the study
1. Briefly discuss the current state of the education system
2. Highlight the need for educational reform
B. Problem statement
1. Identify the key problems within the system that require reform
2. Discuss the negative consequences of these problems on student achievement and equity
C. Research question
- How does educational reform impact student achievement and promote equity in the education system?
D. Objectives
1. Investigate....

Q/A
Could you help me draft an essay outline about Court room technology?
Words: 389

I. Introduction
A. Importance of technology in the courtroom
B. Historical evolution of courtroom technology
C. Thesis statement: Courtroom technology has revolutionized the legal system, improving efficiency, accuracy, and access to justice.

II. Efficiency Enhancements
A. Electronic Case Management Systems (ECMS)
1. Paperless filing and storage
2. Streamlined docket management
3. Automated reminders and notifications
B. Real-Time Transcription and Recording
1. Instantaneous transcription of proceedings
2. Increased accuracy and completeness of records
3. Time-saving and efficiency gains
C. Audiovisual Aids
1. Multimedia presentations and demonstrations
2. Enlarged exhibits and documents
3. Enhanced understanding and engagement of jurors

III. Improved Accuracy
A. Digital....

Q/A
Need help refining my The Pros and Cons of Facial Recognition Technology thesis statement. Fresh perspectives welcome!?
Words: 605

Original Thesis Statement:

Facial recognition technology offers both advantages and disadvantages, impacting privacy concerns and raising questions about the potential for misuse.

Refined Thesis Statement:

The proliferation of facial recognition technology presents a double-edged sword, balancing potential benefits such as enhanced security and convenience with profound ethical implications and privacy concerns.

Introduction:

Facial recognition technology has emerged as a ubiquitous tool in modern society, transforming various aspects of our lives. While it offers undeniable advantages, the concerns surrounding its potential for misuse and ethical implications cannot be overlooked. This paper aims to critically examine the pros and cons of facial recognition technology, exploring both its....

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now