CASE STUDY CTTS MILESTONE 4 SOLUTION

No, because if we bought it as a unit we let the vendor service it as a unit under warranty. We had also talked about an automatic resolution mechanism after a tech does work. We see the client name at the top: But then we would end up with the equivalent of this spreadsheet filled with identifiers. Logon Multiple Values of Information i. I think that covers the equipment and component questions.

So, if everything is a component, is there any information that pertains to the PC in general? This would also be a system-generated number. We may need a column for web cam, also. We had also talked about an automatic resolution mechanism after a tech does work. I would say we should have all that data handy in the system. This makes a one-to-one relationship.

This makes a one-to-one relationship. Some of these configuration lists are pages and pages.

case study ctts milestone 4 solution

And the date when the request comes in. That was to see if a particular drive was still under warranty.

case study ctts milestone 4 solution

As you can see from the spreadsheet, some of our data is pretty sketchy. Thanks for taking the meeting.

Case study CTTS milestone 05 data model normalization – Tài liệu text

Where do you stop? A computer, printer, or other piece of technology equipment that is in use. The identifier is printed just above or below the etudy symbol, so you can actually see what it is. Add this document to saved. An extra second or two to scan the barcode.

  BULLYING ESSAYS THESIS

Upload document Create flashcards. Foreign keys are marked with FK and a number. A date field holding the date a service request was reported. Add this document to saved.

Case Study CTTS – Milestone 05 Data Model

A numeric ClientID serves better. A character alphanumeric field holding the first and last name of the person reporting a service request. It sounds like a lifesaver. The other items are more complex. For cae such as RAM, I need to track a quantity, too.

Case study CTTS milestone 05 data model normalization

I brought along some sample information [Exhibit 4. This could be the primary key. However, Jeff Summers states that the computer name is sometimes changed.

A replacement NIC can be a separate component.

Case Study CTTS – Milestone 04 Data Modeling

Each Configuration is associated with a particular Client. This is always a whole number. We could generate a whole list of unique numbers and print barcode labels for them. A character alphanumeric classification of the type of component.

  GSBS HOUSTON DISSERTATION

We would tie every installed component to a specific purchase date with the barcode. A Client submits one or more ServiceRequests, which may related to a piece of Equipment. Subject to interpretation, this diagram is in third normal form, which is the bulk milestoen the assignment for Milestone 5. That’s mipestone I think. Primary keys cannot be changed in some systems, and it milestonr never good practice.

So one big memo field isn’t a good idea. Analyze each of the forms referenced by the user interview plus any comments made by Jeff Summers.

The resulting model is called a Key-Based Data Model.

Author: admin