Project Deliverable 3: Database and Programming Design Due Week 6 and worth 150 points This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You mu

We are confident that we have the best essaywriters in the market. We have a team of experienced writers who are familiar with all types of essays, and we are always willing to help you with any questions or problems you might face. Plus, our writers are always available online so you can always get the help you need no matter where you are in the world.

Order a Similar Paper Order a Different Paper

Project Deliverable 3: Database and Programming Design

Due Week 6 and worth 150 points

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

One (1) of the main functions of any business is to transform data into information. The use of relational databases has gained recognition as a standard for organizations and business transactions. A quality database design makes the flow of data seamless. The database schema is the foundation of the relational database. The schema defines the tables, fields, relationships, views, indexes, and other elements. The schema should be created by envisioning the business, processes, and workflow of the company.

Section 1: Design Document

1. Write a five to ten (5-10) page design document in which you:

a. Create a database schema that supports the company’s business and processes.

b. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.

c. Create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved.

d. Normalize the database tables to third normal form (3NF).

e. Create an Entity-Relationship (E-R) Diagram through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

f. Explain your rationale behind the design of your E-R Diagram.

g. Create a Data Flow Diagram (DFD) through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

h. Explain your rationale behind the design of your DFD.

i. Create at least two (2) sample queries that will support the organizational reporting needs.

j. Create at least two (2) screen layouts that illustrate the interface that organizational users will utilize.

Your assignment must follow these formatting requirements:

  • This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 2: Business Requirements, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

  • Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.
  • Demonstrate the ability to evaluate organizational issues with integrative technological solutions.
  • Apply integrative information technology solutions with project management tools to solve business problems.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Project Deliverable 3: Database and Programming Design Due Week 6 and worth 150 points This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You mu
Running Head: Business Requirements0 Business Requirements Name: Adesola Jibade Institution: Strayer University Course: CIS 498 Business Requirement Document Scope and Control of the Scope The project will help an online store find its competitive edge in the world on the internet shopping. The online shop is relatively new, meaning that it has not yet identified the risks and potential in the e-commerce industry. The business’s challenges to warrant this project include identifying its strongest product that stands out to customers, retaining customers, finding the right population to target to its stores, and achieving long-term growth (Walker and Lloyd-Walker, 2016). Therefore, unless the online shop can manufacture its own products, it will be difficult to identify its strongest product. As the project manager, data from sales can lead to identifying the product with the highest sales. The consumption of online content had drastically changed as there has been an increase in different platforms that the shopper can use, unlike in the past when it was confined to just two or three (Soegoto, Huda, 2019). Thus, the online shop needs to identify traffic methods to its platform by engaging and targeting the right clientele. This will include putting up ads, sending emails regarding promotions, and hiring sales and marketing experts to help the business find its niche. An online platform that readily answers customer queries and provides suggestions can help attract a wide range of clients. The scope of the project will be well documented and stored for easy reference. The goals set must be realistic and time-bound to give a sense of control to the stakeholders. Therefore, as a project manager, the scope will Acta s a map to direct the right resources to areas that can improve, grow, and increase profit generated from the online platforms. The scope will include retention of existing customers, expansion of target groups for the business, increased advertisement, employment of capable workers, hiring marketing experts, and increased promotion and discount activities. Scope planning must be the first activity by the project manager. Scope planning will capture the main objectives as listed above and have clearly defined roles and responsibilities of each employee and manager to achieve the goals. Employees are the asset of the online shop. They will provide both theoretical and practical skills to increase sales. They will be involved in door-to-door marketing in slow days to increase penetration to new markets. The reputation of the business depends on them. How they treat and manage clients in the business will influence any future success. The business manager will organize and assign roles depending on the skill level of each employee (Walker and Lloyd-Walker, 2016). Since the online shop is a start-up, a centralized management technique will be used. The technique applied in developing the scope statement for future reference is vital. All the details in the scope must be specific. This includes the business’s main stakeholders, the main customers, risks that the business face, and assumptions that the business hold according to the goals set. The control of the scope will depend on the available resources to meet the set objectives and the amount of time needed. Business owners must professionally manage control of the scope to prevent scope creep. Additional time for the project that was not agreed in the scope document may be needed, leading to marketing delays for the online shop. New features that would help secure the online shopping platform may be added by IT experts leading to extra costs that were not in the official scope document. To better control a project’s scope, the online shop must establish a schedule that consistently gives updates to the relevant stakeholders. The use of sub-projects to achieve the main goals will help relieve stress and anxiety as the management sets manageable goals as they reach the product. If there is a change in leadership of the shop, it must be easy, and the right procedures followed to prevent disruptions. Risks, Constraints, and Assumptions of the Business An online shop makes use of technology. This exposes it to risks ranging from cybercriminals to computer viruses. The online platform must migrate from using an external database to store their sensitive customer data to cloud solutions. The external servers and database are prone to unauthorized access than cloud computing (Muller et al., 2016). If a fire or a natural catastrophe destroys the database, it would be difficult for the business to recover all the customer files and other intellectual properties. In a cloud solution, the business will increase the probability of business continuity as it will retrieve all its files from the internet. Cloud computing has well-established security features that include password management. Password management will regulate the number of employees from the online shop that can access specific data (Muller et al., 2016). The employees are assigned areas of access in the company’s online platforms within their work jurisdictions. This limits the probability of a rogue employee tampering with the company’s resources. Cloud computing also allows sales and marketing teams to access the same data as the main shop employees. This is because it allows for easy collaboration that eliminates the risk of poor coordination and teamwork that would limit employees’ potential. Managers will eliminate the risk of low productivity due to time and resource constraints. The risk of online security that could lead to credit card fraud for the business is real. Some cybercriminals will use the opportunity to steal funds from customers. Business owners can detect fraudulent transactions if the service providers of the site are well-skilled. There are different ways that the online shop can use to identify internet frauds. They include irregular activities on the platform, such as a sudden increase in purchase than usual and evaluation of a customer’s location and that of the IP address. Malware attacks are also a risk that the business will have to control. Hackers use software to gain access to an online business with the sole aim of stealing information and data. This includes customers’ addresses, credit, and bank information, customer list, and contact information such as emails (Muller et al., 2016). They can use them to extort money further or ask for ransoms. If the online business is hacked, it will ruin its reputation leading to poor customer retention. Therefore, the business must invest in the latest anti-virus software and use service providers will a long history of proficiency. The anti-virus protocols provided must keep up with the change in strategies by criminals. There is the risk that other competitors in the same industry may use the videos, images, and marketing techniques applied. This will lead to the loss of intellectual properties. This violation must be timely reported to authorities. If it is not well-managed, consumers may not identify and appreciate the business’s effort in making its venture unique compared to competitors. An increase in recruitment of clients to the platform will reduce if competitors successfully implement stolen intellectual properties. Today’s online markets are filled with different sellers, all dealing with similar products. The online shop needs to find its niche to help it have a competitive advantage over the rest. A special feature that will set it apart is advanced customer care, a wide product catalog, free delivery of products, or good return policies (Sriyanto et al., 2020). For example, Amazon has been a market leader in the world of online commerce as it provides its consumers with a wide range of selection that is world-wide. This allows people from all over the world to shop for any item manufactured in any country in the world without having to travel. This reduces costs for the customer. The other challenge it faces is the selection between search engine marketing or social media marketing. The online platform must weigh between the merits and demerits of each platform before settling on one. Social media marketing has more brand development, and awareness than search engine marketing as each post shared or downloaded opens up to a new audience (Soegoto, Huda, 2019). It is also more effective in reaching a wider circle away from loyal clients. The product and the online shop become famous on social platforms; their search engine ratings will automatically increase. Poor logistics and warehousing are a constraint that the business must invest in putting under control to achieve its goals. If orders for a particular product surpass the ones available, the business will experience delays and increased customer complaints. Delayed shipment of ordered goods will reduce the probability of a second order being put. The referral will reduce, and the profit margins will remain stagnant. Assumptions. Online shops face challenges that may lead to assumptions that are not verified to be applied. The assumption that hiring IT experts in managing and protecting online platforms will not result in a breach of data and information. The security features of any online platform are prone to attacks, and there is a chance that it may not be strong enough. The business must prepare a separate database to ensure it has a back-up if it loses access to its cloud computing resources. The assumption that it is 100 percent safe may put the business into deadly trouble if a security breach occurs. The assumption that the online shop knows what its customer base wants without carrying out due diligence is a recipe for disaster (Soegoto, Huda, 2019). Employees must regularly perform a feedback campaign to identify patterns and changes in customer needs. There are technological tools that have made it possible for businesses to closely monitor customers allowing them to stock their products according to the business’s needs, thus reducing losses created from dead stocks. The assumption that sales will increase by increasing discount and promotion activities. This type of marketing activity may generate a short-term increase in the platform’s activities, but retention and follow-up activities will increase profitability in the long run. Therefore, the business must invest in the after-sale services that will lead to referrals and second purchases from the shop (Sriyanto et al., 2020). Therefore, increased traffic in a shop platform with minimal increase in sales is not productive. Conversion of traffic to customers who purchase and provide positive feedback is the main goal. The assumption that competitors will not try to steal the shop’s intellectual property will expose the business to a lot of harm. It must invest in security both physically and on its online platforms. Experts must take the staff and employees through vigorous training and education that will help in the identification of phishing activities via email or websites. Most hackers and cybercriminals might use the information obtained by selling it to competitors. The use of lengthy passwords with special characters is vital if hacking is to be put under control. Integration of Technological Systems System integration is vital if success is to be achieved. The bringing together of different tools such as visualization tools, big data analysis tools, computing systems, and other technological techniques vital for the online shop. Big data analytics is vital for an online business as it integrates marketing and sales by monitoring trends and patterns, correlations, customer choices, and product changes. This technology depends on analytic tools that will derive the information. A better customer experience is expected from the business as the awareness of the clients’ needs will be there. The advantage over other online platforms will be achieved, leading to increased revenues. The use of data mining in the analysis helps to retain customers. The inclusion of big data in computer systems will help in the identification of fraud in business activities. The disadvantages of big data include the poor control and use of personal data, leading to data loss. The online shop’s interface design must be simple and have elements that make it easy for the customer to navigate from one feature to another. Interaction and feedback with clients will increase if an optimized interface is applied. Graphic designers must be included by management to create a user interface to make sure the theme colors and logos of the business are rightly captured. The art of networking is vital for a business’s success as it allows online businesses to explore new markets. Communication is the main factor as social platforms such as Facebook and Twitter have eliminated the time-consuming and expensive calls that clients and stakeholders had to use to reach businesses (Sriyanto et al., 2020). LinkedIn can be utilized by the business to hire “star” employees that will provide technical and customer service skills to increase business traffic. The low cost and convenience that online networking provides relieve management pressure, allowing them to focus on core business functions. Database use has been on the decline but can be utilized when there is a need to keep a data back-up. The database can be kept by management in a secure room on the business premises, and security personnel, including security cameras, can be installed in the gateways. This is because they are more prone to unregulated access as multiple users can access sensitive documents in an unsupervised environment leading to compromise. In conclusion, an online shopping facility has all the needs to succeed, but only if it is professionally managed and funded. The risks involved in managing an online shop are difficult to navigate if the latest technology and highly skilled employees are operating under it. Employees must well document the assumptions to remind employees that no stone must be left unturned to pursue profits. The combination of great management techniques and availability of infrastructure will make the enterprise a success. Relevant Terms Assumption-Believing that particular actions will be successful without proof. Cloud Computing-The storage, retrieval, and use of data and information through the internet. Database: Structured data that is accessible via a computer by one or several users via several gateways. Intellectual Property-Intangible property such as images, videos, and logos is the result of innovation by a company, business, or individual. Risk: It refers to unexpected actions or events that were not expected. References Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. Warokka, A., Sjahruddin, H., Sriyanto, S., Noerhartati, E., & Saddhono, K. (2020). Digital marketing support and business development using online marketing tools: An experimental analysis. International Journal of Psychosocial Rehabilitation, 24(1), 1181-1188. Walker, D., & Lloyd-Walker, B. (2016). Rethinking project management: Its influence on papers published in the international journal of managing projects in business. International Journal of Managing Projects in Business. Soegoto, E. S., & Huda, M. N. (2019, November). Utilization of Information Technology as Online Business Marketing Media. In IOP Conference Series: Materials Science and Engineering (Vol. 662, No. 3, p. 032018). IOP Publishing.

Do you have a lot of essay writing to do? Do you feel like you’re struggling to find the right way to go about it? If so, then you might want to consider getting help from a professional essay writer. Click one of the buttons below.

Order a Similar Paper Order a Different Paper