Explain two advantages of the Three Tier Client-Server Architecture over the Single Tier Centralized DBMS Architecture.
3-Define the Entity Integrity Constraint and Referential Integrity Constraint then explain their differences in a relational database. Explain why the DELETE operation may violate only the referential integrity and not the entity constraint. Provide examples to illustrate each constraint using the database system for SEU from question 1.
4-Using your own words, explain two advantages of the Three Tier Client-Server Architecture over the Single Tier Centralized DBMS Architecture.
Requirements: 500
College of Computing and Informatics Assignment 1 Deadline: Day 03/10/2023 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: Shahad Ali alruzuq CRN: 13333 ID: S200201850 Instructions: •You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format. •It is your responsibility to check and make sure that you have uploaded both the correct files. •Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation). •Email submission will not be accepted. •You are advised to make your work clear and well-presented. This includes filling your information on the cover page. •You must use this template, failing which will result in zero mark. •You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question. •Late submission will result in ZERO mark. •The work should be your own, copying from students or other resources will result in ZERO mark. •Use Times New Roman font for all your answers.
Pg. 01 Question One Question One Consider a hypothetical online management system for the Saudi Electronic University that uses a relational database to manage its operations. This system needs to keep track of information about students (including student ID, name, major, and email), courses (including course ID, name, instructor, and department), and enrollments (including enrollment ID, student ID, course ID, grade, and semester). Describe how you would design the relational model for this system. What tables would you create? What attributes would each table have? How would you use primary and foreign keys to represent relationships between the tables? Answer: The tables will be built with the correlating properties and relevant relationships will be established by use of foreign and primary keys. This will be a part of relational design for Saudi Electronic University online management system. a. Students Table: Student ID (Primary Key) Name Major Email b. Courses Table: Course ID (Primary Key) Name Instructor (foreign key referencing the Faculty table) Department c. Faculty Table: Faculty ID (Primary Key) Name Department Learning Outcome (3): Create Entity-Relationship model, Relational model, and write SQL queries. 3 Marks
Pg. 02 Question One Specialization d. Enrollments Table: Enrollment ID (Primary Key) Student ID (Foreign Key referencing Students Table) Course ID (Foreign Key referencing Courses Table) Grade Semester The student ID will contain students’ data and it will be the primary key for the students table. The Course ID will be the primary key representing the courses database containing courses’ data. The Instructor attribute will use a foreign key to establish a connection between the instructors and the courses. The Faculty ID will be the primary key for the Faculty database containing data on members of the faculty. The enrollments table will contain data about the courses the students have enrolled in. It will be a serve as a connection between courses and students.
Pg. 03 Question Two Question Two Consider a database system for SEU that stores information about students, courses, faculty, and course enrollments. A student has a unique ID, name, major, and email. Each course has a unique course ID, name, department, and credits. Faculty members have unique faculty IDs, names, departments, and specializations. An enrollment associates a student, a course, a faculty member (as the instructor), and a semester. One student can enroll in multiple courses, but each enrollment is for only one course. A faculty member can instruct many courses, and each course can have multiple students enrolled over different semesters. Based on this description, create the ER diagram. Answer: 1. Entities: Student StudentID (Primary Key) Name Major Email 2. Course CourseID (Primary Key) Name Department Credits 3. Faculty FacultyID (Primary Key) Name Department Specialization 4. Enrollment Learning Outcome (3): Create Entity-Relationship model, Relational model, and write SQL queries. 2 Marks
Pg. 04 Question Two EnrollmentID (Primary Key) Semester (Foreign Key) StudentID (Foreign Key) CourseID (Foreign Key) FacultyID (as the instructor)
Pg. 05 Question Three Question Three Define the Entity Integrity Constraint and Referential Integrity Constraint then explain their differences in a relational database. Explain why the DELETE operation may violate only the referential integrity and not the entity constraint. Provide examples to illustrate each constraint using the database system for SEU from question 1. Answer: In an entity integrity constraint, the rows of a table are recognized uniquely by their main keys because of the entity constraint. It restricts the uniqueness of the primary key values and non-nullness (Wei, 2019). In reference to question 1 above, the entity integrity constraint has ensured that each student has a unique student ID, each course has a unique course ID and each member of the faculty has a unique faculty ID. On the other hand, the referential integrity constraint ensures that connections between tables has been preserved (Ordonez & García-García, 2008).It ensures that the primary key values in a table matches with foreign key values. In the SEU database, there is a referential integrity constraint that ensures that the values in the course ID and Student ID of the enrollments table match with the primary key columns of the courses and students databases. It also ensures that the faculty IDs used in the faculty table are legitimate. 2 Marks Learning Outcome (3): Create Entity-Relationship model, Relational model, and write SQL queries.
Pg. 06 Question Four Question Four Using your own words, explain two advantages of the Three Tier Client-Server Architecture over the Single Tier Centralized DBMS Architecture. Answer: Scalability Enhanced security Scalability Three- Tier Architecture gives room for better scalability as compared to Single-Tier Centralized DBMS. The Single-Tier system has both the database and application logic on one server therefore when user load increases, the system is unable to scale the system vertically. In a Three-Tier system, the database management, application logic and presentation layers are separated into tiers that are distinct (Gallaugher & Ramanathan, 1996). The separation gives room for horizontal scalability therefore more servers can be independently added to each tier to handle increased user load. An example is when web servers are added without affecting the database server directly. The system is scaled as it should be therefore resources are utilized well and better performance is achieved. Enhanced Security When it comes to security, the Three-Tier system is preferred over the Single-Tier system. In the Single-Tier system, users and applications are directly connected to the 1 Mark Learning Outcome(s): CLO1 Explain the concepts and architectures involved in the database development.
Pg. 07 Question Four centralized database. This therefore poses risks associated with security because there is limited control over those that can access the database and access of data. In Three-Tier architecture, the application server is used as a buffer between the database server and the client. This therefore allows for security measures for example authorization, authentication and encryption. Database access is closely monitored and controlled therefore it reduces the risk of unauthorized data manipulation and access. References Gallaugher, J. M., & Ramanathan, S. C. (1996). Choosing a client/server architecture: a comparison of two-and three-tier systems. Information Systems Management, 13(2), 7-13. Ordonez, C., & García-García, J. (2008). Referential integrity quality metrics. Decision Support Systems, 44(2), 495-508. Wei, Z., Leck, U., & Link, S. (2019, April). Entity integrity, referential integrity, and query optimization with embedded uniqueness constraints. In 2019 IEEE 35th International Conference on Data Engineering (ICDE) (pp. 1694-1697). IEEE.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.