Skip to main content

Understand and apply c

Deakin’s Bachelor of Commerce and MBA are internationally EPAS accredited.
Deakin Business School is accredited by
AACSB.
MIS761 – Enterprise Info. Management & Security
Trimester 2, 2018
Assessment 1 (Individual) – A formal business report

DUE DATE AND TIME:
PERCENTAGE OF FINAL GRADE:
WORD LIMIT:
7th of September 2018, 11:59PM Melbourne Time
40
%
2500 words max

Any text beyond the word limit will not be assessed, Table of contents, EER diagrams,
SQL code, appendices and any references are not included in the word limit.
Learning Outcome Details

Unit Learning Outcome (ULO) Graduate Learning Outcome (GLO)
ULO 1: Understand and apply current information management
and security approaches in business contexts.
GLO1: Discipline-specific knowledge
and capabilities
ULO 2: Learn about the technologies methodologies and concepts
surrounding different types of data management and information
security.
GLO1: Discipline-specific knowledge
and capabilities
GLO3: Digital literacy
ULO 3: Be able to use data management technologies to create
and critically evaluate data management solutions.
GLO3: Digital literacy
GLO4: Critical thinking

Assessment Feedback
Students who submit their work by the due date will receive their marks and feedback on CloudDeakin 15 business days
after the due date.
Extensions
No extensions will be considered unless a written request is submitted and negotiated with the Unit Chair before the
due date and time
. Extensions will only be considered if a draft assignment is attached with your request for an
extension which shows progress has been made, and documentary evidence for the extension. Applications after this
date will not be accepted, and submissions after the due date/time without an approved extension will be considered
late.
Extensions are only granted in extreme circumstances, such as ongoing health, personal hardship or work-related
problems. Temporary illnesses, normal work pressures, multiple assignments due at the same time, failure to keep
backups, technology failure, etc are
not reasons for an extension.
Page 2 of 7
Assignment Learning Objectives and Graduate Learning Outcomes
This is an individual assignment. The aim of the assignment is for you to develop understanding of information
management and security concepts and approaches and apply them to a realistic business context (ULO1, and GLO1)
by:
Designing a simple database the business can use to manage information, which includes basic security
controls to protect access to the information (ULO1/ULO2, and GLO1/GLO3);
Designing SQL queries capable of producing specific reports required by the business relating to information
management and information security (ULO3, and GLO3); and
Evaluating critically the security threats posed by the proposed database (ULO3 and GLO3).
Starting the Assignment
You are strongly encouraged to make a start on this assignment by the end of the 5th week of
trimester, and you should progress thoughtfully through the steps. Hasty decisions made early in
the design process may result in much more work later.
Feel free to discuss concepts and ideas with peers but remember your submission must be your
own work.
Be careful not to allow others to copy your work.
(EER diagrams should use crow’s foot notation as per lecture notes. Under no circumstances will the ‘quaint’ diagrams produced from
Microsoft Access be acceptable, nor will its curious and unique form of SQL be acceptable. Such submissions will attract zero marks.)
Business brief
Kevin’s Music is a small, but rapidly growing business operating out of Burwood. The business
began as a means for Kevin to book his band into venues for live performances. Live music is not a
very profitable occupation, so Kevin also started to teach music.
Within a year of beginning his operation Kevin was approached by other musicians for help in
getting bookings at live music venues. At the same time, some music venues were also asking him
for help in getting bands for them. While the musicians are mostly from Victoria, the venues he
deals with include all Australian states and territories.
Three years later, Kevin finds he has become an agent, the go-between for over 50 musicians or
bands and over 100 venues and is making a reasonable income from the 5% commission that he
charges from individuals and 10% from businesses.
The music school side of the business has also expanded and he has 20 musicians who are teaching
music into groups of students organised into classes; and the demand is still increasing.
Approximately two thirds of the classes are for school age children, and one third is for adults. The
music school keeps track of which musicians have a “Working with Children Check” card and its
expiry date, and the age of musicians to ensure that only adults can teach children.

Page 3 of 7
Kevin’s Music is now:
Acting on behalf of musicians to arrange venue bookings
Acting on behalf of venues to book musicians
Booking students into classes that music teachers teach
Booking music teachers to teach classes of students
So far, his business has been run with a ledger book and a calendar (a paper-based process). But
these tools are becoming inefficient means of managing the business. A transition to an
information system is urgently needed so that the booking process could be automated online.
You are employed as a business analyst at
Deakin Innovative Solutions, a business consulting firm.
You are assigned to investigate and develop an EER model for the system.
Note: The design of any payments system is outside the scope of this project.
Operations
The system needs to be able to provide the following outputs:
Assume that Oracle is used as the DBMS of choice to implement the database. Only Oracle SQL commands should be
used to generate the reports below. NOTE: Not all MySQL functions are supported by Oracle.
A list of Oracle SQL functions:
https://ift.tt/2C5X29I

i.
ii.
iii.
Count of all new students who have joined Kevin’s music after the 1st of July 2018.
List of all underage male musicians and their age sorted by the first name.
List of all teachers who have an expired Working With Children Check (WWCC), with names,
expiry date and their age, sorted by date.
List of all current lesson bookings sorted by the style of music and the booking date (Most
recent first). Hint: You may have to join various tables in SQL to achieve the desired output,
lookup
join command.
iv.

v. (Research Required) A report on the students enrolled, the style of music and the teacher
for the current calendar month. Current calendar month refers to the month in which this
SQL query is run.

Page 4 of 7
Tasks
You are required to perform the following tasks in this assignment.

Task Marks
1. Construct an Enhanced Entity-Relationship (EER) model for thedatabase. Make
sure you include in your model details of entities, relationships, attributes, keys
and cardinality of the relationships. Ensure the EER model supports basic
security (e.g. staff logins information, the type of security access they require).
a. List any assumptions made and ensure that you give adequate
justification.
18 Marks
ULO1, ULO2
GLO1, GLO3
2. Show by providing SQL statements, that all of the reports listed in the
“Operations” section above can be produced from your EER diagrams.
NOTE: No need to actually create a database. This is a thought exercise to
demonstrate that the queries are possible based on your EER diagram.
8 marks
ULO1, ULO2
GLO1, GLO3
3. Research Task
After being alarmed by the recent security incidents reported in the media,
Kevin decides to employ a part-time System Administrator to manage system
security.
a) Identify 6 security threats to the proposed system (Choose a mix of
internal/external, deliberate/unintentional threats).
b) Classify each threat on a probability-impact matrix and explain your
reasoning for the classification.
c) For each threat which of the risk controls would you recommend? Justify
your choice. If you have opted for avoidance or mitigation of risk, clearly
explain the policies, measures or strategies that need to be put in place
to achieve the desired outcome.
As part of the justification, researching into risk control measures and
providing a critical analysis of the strategy employed here would ensure
optimal marks.
14 marks
ULO1, ULO3
GLO1, GLO4

EER Diagram
EER diagram should contain the following components: Entities, named relationships, attributes
(keys) and cardinality for relationships.
A faster way of doing the EER diagram is to sketch it up on a blackboard, take a digital photograph
and paste it into your report. Alternatively, you may use any software tools at your disposal. If
hand-drawn make sure your EER diagram is legible.

Page 5 of 7
Submission Instructions
The assignment must be submitted as soft copy in the form of a PDF document via CloudDeakin by
the due date. File should be named your firstname_lastname (e.g. John_smith.pdf).
You do not
have to submit an actual database!
You must keep a backup copy of every assignment you submit, until the marked assignment has
been returned to you. In the unlikely event that one of your assignments is misplaced, you will
need to submit your backup copy.
Any work you submit may be checked by electronic or other means for the purposes of detecting
collusion and/or plagiarism.
When you are required to submit an assignment through your CloudDeakin unit site, you will
receive an email to your Deakin email address confirming that it has been submitted. You should
check that you can see your assignment in the Submissions view of the Assignment dropbox folder
after upload, and check for, and keep, the email receipt of the submission.
Notes
Penalties for late submission: The following marking penalties will apply if you submit an assessment task
after the due date without an approved extension: 5% will be deducted from available marks for each day up
to five days, and work that is submitted more than five days after the due date will not be marked. You will
receive 0% for the task. ‘Day’ means working day for paper submissions and calendar day for electronic
submissions. The Unit Chair may refuse to accept a late submission where it is unreasonable or impracticable
to assess the task after the due date.
For more information about academic misconduct, special consideration, extensions, and assessment
feedback, please refer to the document
Your rights and responsibilities as a student in this Unit in the first
folder next to the Unit Guide of the Resources area in the CloudDeakin unit site.
Building evidence of your experiences, skills and knowledge (Portfolio) – Building a portfolio that evidences
your skills, knowledge and experience will provide you with a valuable tool to help you prepare for interviews
and to showcase to potential employers. There are a number of tools that you can use to build a portfolio.
You are provided with cloud space through OneDrive, or through the Portfolio tool in the Cloud Unit Site, but
you can use any storage repository system that you like. Remember that a Portfolio is YOUR tool. You should
be able to store your assessment work, reflections, achievements and artefacts in YOUR Portfolio. Once you
have completed this assessment piece, add it to your personal Portfolio to use and showcase your learning
later, when applying for jobs, or further studies. Curate your work by adding meaningful tags to your artefacts
that describe what the artefact represents.

Page 6 of 7
Appendix – EER Diagram Symbols
(adapted from Lucid Charts, https://ift.tt/2PK9o9Y)
ENTITIES
Entities are objects or concepts that represent important data. They are typically nouns,
e.g.
customer, supervisor, location, or promotion.
Strong entities exist independently from other entity types. They always possess one or
more attributes that uniquely distinguish each occurrence of the entity.
Weak entities depend on some other entity type. They don’t possess unique attributes
(also known as a primary key) and have no meaning in the diagram without depending on
another entity. This other entity is known as the owner.
Associative entities are entities that associate the instances of one or more entity types.
They also contain attributes that are unique to the relationship between those entity
instances. (we’ll cover this in week 3)
RELATIONSHIPS
Relationships are meaningful associations between or among entities. They are usually
verbs, e.g.
assign, associate, or track. A relationship provides useful information that
could not be discerned with just the entity types.
Weak relationships, or identifying relationships, are connections that exist between a
weak entity type and its owner.

Page 7 of 7
ATTRIBUTES
Attributes are characteristics of either an entity, a many-to-many relationship, or a oneto-one relationship.
Multivalued attributes are those that are capable of taking on more than one value.
Derived attributes are attributes whose value can be calculated from related attribute
values.
Crows-foot Notation
Cardinality (limits of participation or sometimes called multiplicity) refer to the
maximum number of times an instance in one entity can be associated with instances in
the related entity, and the minimum number of times an instance in one entity can be
associated with an instance in the related entity. Cardinality represented by the styling of
a line and its endpoint, as denoted by the chosen notation style.

The post Understand and apply c appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom

Do violent video games encourage players to become violent in real life?

 Write an outline for Speech 3, the persuasive belief speech, following the outline guidelines and formatting requirements (Do violent video games encourage players to become violent in real life?).  1000-1200 WORDS https://virtualspeech.com/blog/persuasive-speech-outline-structure-delivery Topics: https://blog.prepscholar.com/good-persuasive-speech-topics Do violent video games encourage players to become violent in real life? https://www.youtube.com/watch?v=YKKWOx43pIY WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU GET SOLUTION FOR THIS ASSIGNMENT,  Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER   on Do violent video games encourage players to become violent in real life? Are You looking for Assignment and Homework Writing help?  We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism. TO BE RE-WRITTEN FROM THE SCRATCH