HI5033 Database Systems Paper Individual Assessment Assessment Weight: 40% (3 deliverables) Due: Sessions 4, 7, 13 Objective(s) This assessment item relates to the unit learning outcomes as in the...

1 answer below »
HI5033 Database Systems Paper Individual Assessment Assessment Weight: 40% (3 deliverables) Due: Sessions 4, 7, 13 Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student research and writing skills and to give students experience in researching the literature on a specific topic relevant to the Unit of Study subject matter. Students will be expected to complete a literature review to discuss a contemporary Database storage, access, design or Information design issue which an IS professional may experience. Students will critically analyze current academic papers then present their work in a detailed literature review and analysis. Instructions This assessment will be completed individually. All students must have a different topic. Students can choose to write about the same technology, but the approach and the thrust of each paper must be different. To ensure this uniqueness, each student must decide on a topic and email their topic and title to their tutor within the first 2 weeks. Your tutor will respond with an approval or with a message that you will either need to choose a different topic or to change the thrust of your paper. You tutor may decide to do this for you. Once it has been approved you should begin by working towards the first deliverable. This assessment is worth 40% of the units grade is is a major assessment. Students are advised to begin working on this assessment as soon as you have your topic approved There are three (3) deliverables for this assessment Deliverable Weight Week Due Outline Submission 5% Week 4 Draft Submission 15% Week 7 Final Submission 20% Week 13 Note: It is important to realize, that you must have prior approval for a topic before you can submit. If you submit something for assessment without approval for the specific topic, it will not be graded. Once you have a topic approved, you cannot change it without consent from your subject lecturer. The day and time of the due week that the assessment must be submitted will be announced by your subject coordinator. ________________________________________________________________________________ 1 Deliverable Descriptions Below is a description of the different deliverables and the requirements Outline Submission The outline deliverable is due in week 4 and is the outline of the paper you intend to write. The outline will consist of: the title, your name and a list of the section headings that will be included in your Literature Review. You should include at least 5 section headings which are relevant to the topic you have been allocated, (this list should not include either 'Introduction' or 'Conclusion', though these can be included apart from the 5 others). You need to include at least five preliminary references and indicate in which section they will be included. The references must be relevant to the topic assigned. Thus once allocated your topic, you need consider how you will structure the literature review so you can devise a list or headings. You must have access the full-text article of any reference you use. You cannot use a reference where you only have access to the abstract and title, or a small section of the paper. Draft Submission The draft submission is due in week 7 and continues on from the outline submission above with the same topic your group was allocated. For the draft submission you are to write an Introduction, consisting of at least 2 paragraphs, and you are to write one major paragraph for each of the five sections that you identified in the outline submission. Your introduction and other paragraphs should cite references from your reference list, and your reference list for this submission should include your previous references and at least another 5 references which are relevant to the topic allocated. So your reference list should contain at least 10 references at this stage. All references must be in Harvard format including the in-text citations. For each reference you must include a link to the full text of the reference. This link must be working and cannot be to just an abstract and title, or only a section of the paper you are referencing. This must be a direct link, we will not follow multiple links trying to find the paper. If for some reason you decide to change one of the headings from the outline submission, you need to write why this has changed, and are to follow the rules above by providing one major paragraph for the new section. The section needs to be relevant to the topic and of course your associated references need to be relevant. ________________________________________________________________________________ 2 Final Submission The final submission of your paper is due in week 13 and continues on from the outline and draft submission above with the same topic your group was allocated. The final submission should be no less than 2500 words and include the work you have already done in the draft submission (including any changes based on feedback). You need to extend the work already performed in the draft The final version of your paper is the polished version, the approach should follow the same plan as your draft, but obviously some change may have occurred from the draft. You should not use a lot of small sections and bullet points in the final version. Your literature review should be presenting the state of current knowledge in the specific area of your topic, and as such, should have a narrative that flows from one paragraph to another. You cannot achieve this with bullet points and small disjoint sections. All references included with your paper must be cited within the paper and be appropriate to the context of the citation. I would expect at east 12 references in the final submission, and as well as providing the links to the full-text articles, you are required to use an adapted Harvard referencing scheme for the in-text citations. This adapted Harvard citation requires you to provide the page and paragraph number in the reference that the content you are referencing can be found. For example, the reference may be listed as P Hawking, B McCarthy, A Stein (2004), Second Wave ERP Education, Journal of Information Systems Education, Fall, http://jise.org/Volume15/n3/JISEv15n3p327.pdf The in-text citations would then be The company decided to implement an enterprise wide data warehouse business intelligence strategies (Hawking et al, 2004, p3(4)). In the above example with p3(4), the p3 refers to the page number within the reference, and the (4) refers to the paragraph number within that page where the content can be found. These referencing markers will be checked for accuracy and authenticity as part of the assessment grading process. For the final submission, In Summary: • All references must use the Harvard adapted referencing style as described • The length of the paper is to be 2500 words (excluding the references, contents etc.) • The final submission is to build on what was already completed in the draft submission • The font of the body text should be 12pt Times New Roman font, 1.5 line spaced • Section Heading should be in Arial Bold 12 point font • At NO time should you use Wikipedia as a reference ________________________________________________________________________________ 3 Non Adherence to Referencing Guidelines Where students do not follow the above referencing guidelines: 1. Students who submit assignments which do not comply with the guidelines will be asked to resubmit their assignments. 2. Late penalties will apply, as per the Student Handbook each day, after the student/s have been notified of the re-submission requirements. 3. Students who provide false referencing information (including the page and paragraph markers) will be referred to the Academic Integrity Unit. Submission Guidelines Your document should be a single MS Word or OpenOffice document containing your report. Do not use PDF as a submission format, All submissions will be submitted through the safeAssign facility in Blackboard. Submission boxes linked to SafeAssign will be set up in the Units Blackboard Shell. Assignments not submitted through these submission links will not be considered. Submissions must be made by the due date and time (which will be in the session detailed above) and determined by your Unit coordinator. Submissions made after the due date and time will be penalized per day late (including weekend days) according to Holmes Institute policies. The SafeAssign similarity score will be used in determining the level, if any, of plagiarism. SafeAssign will check conference web-sites, Journal articles, the Web and your own class members submissions for plagiarism. You can see your SafeAssign similarity score (or match) when you submit your assignment to the appropriate drop-box. If this is a concern you will have a chance to change your assignment and resubmit. However, re-submission is only allowed prior to the submission due date and time. After the due date and time have elapsed your assignment will be graded as late. Submitted assignments that indicate a high level of plagiarism will be penalized according to the Holmes Academic Misconduct policy, there will be no exceptions. Thus, plan early and submit early to take advantage of the re-submission feature. You can make multiple submissions, but please remember we grade only the last submission, and the date and time you submitted will be taken from that submission. Academic Integrity Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing ________________________________________________________________________________ 4 guidelines and support resources. Many of these resources can also be found through the Study Sills link on Blackboard. Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment. Table 1: Six categories of Academic Integrity breaches Plagiarism Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism. Collusion Working with one or more other individuals to complete an assignment, in a way that is not authorised. Copying Reproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offence. Impersonation Falsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination. Contract cheating Contracting a third party to complete an assessment task, generally in exchange for money or other manner of payment. Data fabrication and falsification Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images. Source: INQAAHE, 2020 _______________________
Answered 35 days AfterApr 13, 2022

Answer To: HI5033 Database Systems Paper Individual Assessment Assessment Weight: 40% (3 deliverables) Due:...

Shubham answered on Apr 17 2022
88 Votes
Contemporary Database
The database allows multiple users to maintain, edit and update the stored information efficiently, quickly, and securely. This can help in making a valuable database for hosting real-life cases that can help in keeping track of accounting records and storing huge amounts of data from the network of devices. This is required for tracking inventory and building web applications. The database management language offers a highly structured and organized approach to information management. It includes a categorical parameter that allows
users to access maintain and organize information with multiple parameters. Atomicity in database management can promote consistency for the database. This includes a series of operations for the atomic transactions. The data strategy can rest on vertical scaling for relational databases. Vertical scaling can add more computing to the server for the addition of more servers to the system (Noll et al. 2019). It provides more elasticity to the business for ensuring joint operation of the system.
The contemporary database uses a database to process information with structured information. The database stores data in a normalized way so that data splits up into different tables for avoiding redundancy. This provides a versatile tool for data management and data storage. The database provides fast access to stored data. Designing the structure of the database can be done with the use of SQL. The structure of a relational database can be made up of indices, constraints, and columns. The table stores data of certain types and columns have properties for entities in the table. SQL provides a standardized way of accessing and manipulating databases. It can help in writing programs that can be used for managing the streaming and managing data for data processing (Li et al. 2022). It is like a database for the server-side script that is responsible for executing queries and retrieving data. It provides the standard program along with a number of variations that some data with SQL extension.
Relational databases are great for retrieving and organizing structured data that provide flexible database solutions. The amount of data that can be gathered can help in addressing issues that provide modern data harvested from the web that does not provide structured information.
Scalability provides the ability for scaling up and scaling down the database for holding more data without compromising the performance. Automatic scaling for the database provides a single cheap instance for development workload for multiple large instances for production workloads (Grycuk et al. 2020). The replication process is used for copying the data from one database to another database on the server. The database instance is used for writing data and it can also be used for reading data. It can be improved for providing responses on time and signifies the need for real-time access to synchronize and update data. Latency refers to the time for taking data for completing a complex round of trips between the application server and database server. Consistency ensures that transactions do not produce errors and can result in making the complete database invalid to use. It provides with consistency model that allows users to faster writing and read.
Existing work
A database is a collection of facts and figures that can be processed for processing information. Data present represents facts and data are stored in a way that can become easier to manipulate and retrieve the data for production of information. It provides the concept for overcoming deficiencies in the traditional style of data management. It provides with use of real-world entities for designing the architecture. DBMS allows relations and entities for the formation of a table and it can help in understanding the architecture of the data by looking at table names. DBMS follows rules of normalization that can split the relation for any attributes for having redundancy in values (Becher et al. 2018). Consistency provides the state for every relation in the database that remains consistent for data storing.
The database has users with different permission and right that can be used for different purposes. Administrators are part of DBMS and are responsible for administrating the database. It is responsible for looking after the usage and users that can use the database. It includes the creation of access to profiles for users and applying limitations for maintaining force security and isolation. Designers are a group of people that works on designing part of the database. It can help in keeping a close watch on the data and it includes designing and identifying of set of relations, views, constraints, and entities. It connected data with the use of advanced technology for the identification of insights and opportunities. It enables businesses for making better and faster decisions. It can help in providing a better streamlining of traditional processes along with a competitive advantage (Ferencz, 2018). This ensures effective use of technology for ensuring along with coordination with high-level data elements. Big data management is embraced tool that uses analytics and AI to discover insight through large volumes of data that cannot be detected through the computing process. Data quality ensures the quality of data and provides reliable insight and process. Data security ensures the security of data with a modern level of data management.
Along with advancements in technology more data comes through multiple sources like a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here