Easy Drive is a car rental company that offers the best car hire prices in Australia. The company is located in Sydney, Melbourne, and Brisbane. Easy Drive branches could be found at all major airports and in downtown locations. In addition, online car reservation system is also provided for the ease of the booking experience.
Easy Drive is not only providing affordable prices, but also providing the best car rental experience. The company is well known for its excellent customer service. Moreover, Easy Drive has more than 12,000 vehicles that range from car, van, and busses.
The company’s goal is to keep increasing their service offering but partnering with various service providers. Due to the growth and expansion of the company, Easy Drive currently is in deep need of renewing its database system. Easy Drive has trusted WIC to model its data objects and to provide the company with a documentation of its business data model.
It is vital for easy drive to have an accurate and reliable data, across all of its business processes in order to provide an excellent car rental experience to its customers. Thus, a detail list of business data and normalisation procedure is required to model the company’s data.
Interview Documentation
WIC Representative: Hello, Good Afternoon. My name is Sarah. I am one of the representatives from WIC. I would like to conduct an interview regarding Easy Drive car rental system to model the data objects. Admin Staff: Good Afternoon, it’s my pleasure to help you. WIC Representative: How would you like to describe Easy Drive daily routine? Admin Staff: Basically our daily routine is to record customer booking information and assign the booking to the car that we have. It is crucial for us to have timely and accurate information about our customer booking and number of cars that are available. We would like to record customer personal information, customer booking information, car information, and information of our staff. WIC Representative: What information you would like to capture regarding your customer personal information? Admin Staff: We would like to capture our customer name, address, and their phone number. WIC Representative: What about car and staff information?
The Essay on Traditional Marketing Information Customer Companies
... of customers. E-CRM (customer relationship marketing) systems, for example, help companies to gather information on customers, to ... that happens, Peter says, the traditional marketer-driven, marketer-controlled marketplace will be severely ... Some still want to get in their cars and go to the mall or ... define customer trends and preferences. Placing value on learning is not an easy thing for companies ...
Admin Staff: We would like to capture our car type, colour, seating, capacity, availability and rent price. For staff, we would like to capture our staff name, address, phone number, salary, working hours, and rate per hour. WIC Representative: Is there any specific information you would like to capture regarding customer booking besides booking start date and end date? Admin Staff: No, we only need to know the booking start and end date. WIC Representative: That is all for my interview. Thank you for your time. Admin Staff: It’s my pleasure to help you. Thank you
Now, based on the interview documentation and project in information provided, you are required to: Document relationships in an entity relationship diagram
Undertake normalisation of business data and document results Compare normalisation results with entity relationship diagram and reconcile differences between data, if any Identify the suitable business data
List the steps involve in resolving issues or recommendation arising in the data model validation process with the client and document the detail information about the activity that you have conducted for each of the steps Document the entity relationship diagram after the normalisation procedure and database table Create a client approval form for the final approval
The Business plan on Data Warehousing Warehouse Business Information
Data Warehouses MGT 327 April 13 th, 2004 In the past decade, we have witnessed a computer revolution that was unimaginable. Ten to fifteen years ago, this world never would have imagined what computers would have done for business. Furthermore, the Internet and the ability to conduct electronic commerce have changed the way we are as consumers. One of the upcoming concepts of the computer ...
8. Below is a list of activities that are required to gather client’s business data to understand operations. All of the activities are correct, except :
a. Document analysis
b. Interviews
c. Observation of current business processes
d. Construct an Entity Relationship Diagram
e. Research through company’s website and publication
9. What is the purpose of identifying boundaries of the system?
a. Data validation
b. Identifying what is included and what is not included in the system
c. Listing the value range of data
d. Business data identification
e. Identifying errors in the system
10. Conduct a business rule analysis based on the following scenario: WestLuxe Cinema has 5 theatres all together. The cinema is famous for its unique movie packages. However, due the high demand of the movie packages, one customer is restricted to only purchase one movie package deal. WestLuxe Cinema strategy is to provide a unique and excellent customer service. In the point of entry, the customer is grouped according to their movie package deal and each group is assigned to one staff that will provide them a tour around the cinema complex that has a lot of entertainment quarter. Customer is free to enjoy the entertainment, while waiting their movie schedule time. Which of the business rule is best represents the above scenario?
a. One movie package deal group is handled by many staff
b. One staff guide many groups
c. Many to one customer could purchase one to many movie package deal
d. One customer could only purchase one movie package deal
e. None of the above
11. What is the main activity involved for validating data model with client?
a. Ensures that the data model meets a specified set of requirements and correctly reflects the real world process.
b. Find alternative model and evaluate the trade off for different data model decision.
c. Conducting client’s business data analysis.
d. Client signing off documentations for final approval.
e. Identifying system boundaries.
The Term Paper on An Ethical Analysis Of The Customer Data Breach In Target Corporation
Target Corporation, which is one of the leading retail companies the United States, was founded in 1902. The first target store was opened in 1962. Through the 52 years rapid development, Target stores are now located in over 1,924 places. About 90% of the stores are located within the United States, the other 10% stores are in Canada, Australia, and other countries (Target, 2014). All the Target ...
12. A book store sells a lot collection of book that range from science and technology, novel, autobiography, and arts. The book store has a vast number of loyal customers that have joined to become a member of the store. Currently, there are fifteen knowledgeable staffs that are employed by the store to provide an excellent customer service to their customers. The book store is well known for its excellent customer service and relaxing environment.
Based on the scenario above identify the entities and the relationships between those entities.
(Note: Ignore normalisation for this question)
a. The entities are Manager, Employee, and Store. One Manager has one to many Employee. One Employee is supervised by one Manager. One Store has many Manager. One Manager belong to one Store.
b. The entities are Book, Genre, Employee, and Customer. One Customer could purchase one to many Book. One book belongs to one Customer. One Book belongs to one Genre. One Genre consists of one to many Book. One employee service One customer. One customer is being served by one Employee.
c. The entities are Book, Customer, and Staff. One Customer could purchase one to many Book. One Book belongs to one Customer. One Customer is served by one to many Staff. One Staff serves one to many Customers.
d. The entities are Staff, Customer, and Payment. One Staff serves one Customer. One Customer conduct one to many Payment. One Payment belongs to one Customer. e. None of the above
13. What kind of information is required in indentifying boundaries of the system?
a. System mission, Objectives, Goals, Functional requirement, Information needs, and Users group
b. Entities, Attributes, Data types, and Relationship between entities c. Row, Columns, Attributes, Relations, Domain of attributes, and Cardinality d. Role, Required data, Data elements, Data types, and Data resources e. Data flow diagram, Normalisation, Entity Relationship Diagram, and Business Data
14. What is the main difference between the used of primary key and unique
key in modelling data objects?
a. Primary key is used to represent more than one attribute that act as the key b. Both of the key has a similar function and attributes
The Essay on An Analysis Of Key Enterprise Data Concepts
An Analysis of Key Enterprise Data ConceptsGarreth H. Dowden II Database Management Systems 405 Nasser HalwaniDecember 14, 2004 An Analysis of Key Enterprise Data Concepts Business intelligence has several different meanings depending upon the organization and its goal. I general, it involves the collection of data and using it to predict future trends. This information is used to make decisions ...
c. Unique key may have a NULL value, while primary key value cannot be NULL d. Unique key is automatically generated by the database system when we create a primary key.
e. Primary key is used to represent more than one attribute that act as the key
15. Entity Relationship Diagram
Compare and identify the differences between the third normal form and the entity relationship diagram. Which of the following statement is TRUE? a. The third normal form has eliminate redundant data by creating a new table and creating a relationship between the two tables
b. The value of staff data needs to be in a single value. It cannot have a multiple set c. A new table that consists of Department ID, Department Name, and Department Location is created to eliminate redundant data.
d. In the third normal form Department information is separated into two attributes to eliminate repeating group. The two attributes are Department Name and Department Location
e. In the third normal form Department Name and Department Location is separated into a new table for a more efficient access as it is now directly dependent on the primary key.