Professional Documents
Culture Documents
(ASSIGNMENT)
The project appears to be facing significant challenges related to the manual management of IT
assets. This manual process can lead to delays in the issuance of equipment to new hires, inaccurate
inventory records, and the potential loss of equipment.
To address these challenges, the project may benefit from implementing a digital asset
management system that can automate many of the current manual processes. Such a system can
streamline the issuance of IT equipment to new hires, provide accurate and up-to-date inventory
records, and facilitate timely repairs and maintenance of faulty equipment. This would not only
improve the efficiency of the IT department but also help to prevent delays in the overall project
operations.
Additionally, the project may benefit from conducting a thorough review of its procurement
processes to ensure that equipment is being purchased in a timely and cost-effective manner. The
procurement department could work closely with the IT department to identify the most commonly
requested equipment and establish vendor relationships to ensure that these items are readily
available when needed. This can help to prevent delays in the issuance of equipment to new hires
and ensure that the project is getting the best value for its IT investments.
Finally, the project may want to consider implementing a centralized database or system for
tracking the issuance and return of IT assets. Such a system can provide real-time visibility into
the location and status of all IT assets, allowing the IT department to better manage inventory and
respond quickly to any issues that arise. This can also help to reduce the risk of loss or theft of IT
equipment and ensure that the project is making the most of its IT investments.
TABLE OF CONTENTS
o Complete ER Diagram:
o Transform ER Diagram Into Database by writing DDL, and write queries
for insertion of data using DML :
Database Diagram:
2. Objective of Work done
The goal of the work done in the project-based organization's IT department is to successfully
and efficiently manage the acquisition, distribution, upkeep, and inventory of IT assets, such as
laptops, desktop computers, and internet devices, for personnel spread across numerous locations
and departments. Whether they work in close-knit offices or out in the country, the IT
department wants to make sure that every employee has access to the IT tools they need to do
their jobs.
The general goal of the IT department's work is to make sure that IT assets are managed
effectively and smoothly throughout the project-based organization, while also giving staff
members the support they need and keeping detailed records of asset acquisition, issuance,
maintenance, and inventory.
4. History
The history of database management systems (DBMS) dates back to the 1960s when the first
concept of a database was introduced. Charles Bachman developed the Integrated Data Store
(IDS) in the early 1960s, which was based on the network data model. In the late 1960s, IBM
developed the first hierarchical database model. In the 1970s and 1980s, attempts were made to
build database systems with integrated hardware and software. The underlying philosophy was
that such integration would improve performance and reduce costs. During the year 1970, the
relational database model was developed by Edgar Codd. Since then, the development of
DBMSs has played an outsized role in the history of software development and in the creation
and growth of the software industry. Today, databases are an essential part of modern computing
and are used in a wide range of applications.
a.Traditional Approach:
The traditional approach of database management systems (DBMS) refers to the early models
and methods used to manage data in databases before the emergence of modern DBMS. It
included hierarchical and network data models, file-based storage, procedural languages, and
limited data integrity and security features. However, this approach had limitations in terms of
complexity, scalability, and data management capabilities compared to modern approaches,
such as the relational model, SQL-based languages, and advanced data management features.
Despite its contributions, the traditional approach has been largely replaced by more advanced
and efficient DBMS technologies that offer enhanced data management capabilities and
improved security features.
b. Evolution:
The evolution of database management systems (DBMS) refers to the progression and
development of data storage, retrieval, and management technologies over time. It can be
summarized as follows:
Pre-relational Models: Early data models such as hierarchical and network models were
developed in the 1960s, organizing data in tree-like and graph-like structures, respectively.
Relational Model: The relational model was introduced in the 1970s, organizing data into
tables with rows and columns, and using keys to establish relationships between tables. This
led to the widespread adoption of relational DBMS in the 1980s.
Commercial Relational DBMS: In the 1980s, commercial relational DBMS products became
widely accessible, offering advanced features like transaction management, data integrity, and
query optimization.
Object-oriented DBMS: In the 1990s, object-oriented DBMS emerged, allowing for more
flexible and extensible data modeling with objects, properties, and behavior.
NoSQL DBMS: In the 2000s, NoSQL DBMS emerged as an alternative to relational
databases, offering scalability, performance, and flexibility advantages for distributed and
unstructured data.
NewSQL DBMS: In the 2010s, NewSQL DBMS combined scalability of NoSQL with ACID
properties of relational databases, offering advanced features for modern data-intensive
applications.
Cloud-based and Blockchain-based DBMS: Recent advancements include cloud-based
DBMS for scalable and flexible data management in the cloud, and blockchain -based DBMS
for decentralized and distributed data management in blockchain networks.
The evolution of DBMS has been driven by advancements in technology, changing data
management requirements, and the need for more efficient and reliable data management
solutions to meet the evolving needs of businesses and applications.
c. Security:
Here are some key points about security in Database Management Systems (DBMS):
Authentication: It is the process of verifying the identity of users accessing the DBMS,
typically through username and password combinations or other credentials.
Authorization: It involves granting or restricting access privileges to different users or user
groups based on their roles or permissions. This ensures that users can only perform actions
they are allowed to.
Encryption: It involves converting data into a coded form to prevent unauthorized access or
data breaches. Encryption techniques like SSL/TLS can be used to secure data in transit, while
techniques like data-at-rest encryption can protect data stored on disks.
Auditing: It involves monitoring and recording activities in the DBMS, such as user logins,
data modifications, and access attempts, to detect and investigate potential security breaches.
Backup and Recovery: Regularly backing up the database and implementing a robust
recovery plan can help protect against data loss due to accidental deletion, hardware failure,
or other incidents.
Role-Based Access Control (RBAC): It involves assigning permissions to users based on their
roles or job responsibilities, rather than individual user accounts. This helps ensure that users
only have access to the data and operations that are necessary for their job functions.
Data Masking: It involves obscuring sensitive data, such as credit card numbers or social
security numbers, in order to prevent unauthorized access or data leaks.
Patching and Updates: Regularly applying patches and updates to the DBMS software helps
to fix known security vulnerabilities and protect against potential exploits.
Physical Security: Securing the physical infrastructure hosting the DBMS, such as servers,
network switches, and data centers, through measures like access controls, surveillance, and
environmental protections.
User Education: Educating users about best practices for data security, such as using strong
passwords, avoiding sharing credentials, and being cautious about granting permissions, can
help prevent security incidents caused by human error.
These are some of the key aspects of security in DBMS. Implementing appropriate security
measures is crucial in protecting the confidentiality, integrity, and availability of data stored
in a database.