Professional Documents
Culture Documents
ASSIGNMENT – 2
Ques. 1 Explain various data models along with example of each of them.
ANSWER.
Data models define how the logical structure of a database is modeled. Data Models are
fundamental entities to introduce abstraction in a DBMS. Data models define how data is
connected to each other and how they are processed and stored inside the system.
The very first data model could be flat data-models, where all the data used are to be kept in
the same plane. Earlier data models were not so scientific, hence they were prone to introduce
lots of duplication and update anomalies.
ENTITY-RELATIONSHIP
MODEL
➢Entity-Relationship (ER) Model is based
on the notion of real-world entities and
relationships among them. While
formulating real-world scenario into the
database model, the ER Model creates
entity set, relationship set, general
attributes and constraints.
Relationship: The logical association among entities is called relationship. Relationships are
mapped with entities in various ways. Mapping cardinalities define the number of association
between two entities.
Mapping cardinalities:
✓ one to one
✓ one to many
✓ many to one
✓ many to many
RELATIONAL MODEL
The most popular data model in DBMS is the Relational Model. It is more scientific a model
than others. This model is based on first-order predicate logic and defines a table as an n-ary
relation.
Q2. Explain the legal and ethical issues related to the implementation of an Information
System in an organization.
Answer.
Information Technology specifies to the components that are used to store, fetch and
manipulate the information at the minimum level with the server having an operating system.
With the leading advancement in information technology, it is necessary to have the knowledge
of security issues, privacy issues and main negative impacts of IT.
Some of the major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy:
• It is an important aspect of ethical issues in information technology.
• IT facilitates the users having their own hardware, operating system and software tools to
access the servers that are connected to each other and to the users by a network.
• Due to the distribution of the network on a large scale, data or information transfer in a big
amount takes place which leads to the hidden chances of disclosing information and
violating the privacy of any individuals or a group.
• It is a major challenge for IT society and organizations to maintain the privacy and
2. Access Right:
• The second aspect of ethical issues in information technology is access right.
• Access right becomes a high priority issue for the IT and cyberspace with the great
intrusion detection systems are used to determine whether the user is an intruder or an
appropriate user.
3. Harmful Actions:
• Harmful actions in the computer ethics refers to the damage or negative consequences to
technology in manner which leads to any loss to any of the users, employees, employers
and the general public.
4. Patents:
• It is more difficult to deal with these types of ethical issues.
• A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very
5. Copyright:
• The information security specialists are to be familiar with necessary concept of the
copyright law.
• Copyright law works as a very powerful legal tool in protecting computer software, both
6. Trade Secrets:
• Trade secrets are also a significant ethical issue in information technology. A trade secret
confidants.
7. Liability:
• One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product that
can be restricted as an express warranty.
• Programmers or retailers possess the legitimate to determine the express warranties.
8. Piracy:
• Piracy is an activity in which the creation of illegal copy of the software is made.
• It is entirely up to the owner of the software as to whether or not users can make backup
• As laws made for copyright protection are evolving, also legislation that would stop
software.
Q3. What are the minimum software and hardware requirements for installing an MIS
in an organization?
Answer.
Processor Intel Core i3 and above (such as Intel Core i5, or Intel Core
i7) OR AMD FX 4100 and above, or A6 and above
Hard Drive 128 Gigabytes (GB)* 128GB+ Solid State Disk
(SSD) with at least 50GB of
free disk space
Memory 8 GB
Wired Networking Ethernet LAN Port or USB Ethernet Adapter/Dongle
In order to use the CBS wired network connection on your
ultra-light or Mac Book Air PC, you will need to purchase a
USB-to-Ethernet Adapter.
Wireless Networking 802.11n
ANSWER.
SR.N
the action on structure level and Update command will perform on the
S.N
O GRANT REVOKE
For each user you need to provided by that users to others will
O GRANT REVOKE