Karol has a coffee shop and produces coffee drinks under theproduction function Q = F(K,L) = 5K + L

Karol has a coffee shop and produces coffee drinks under theproduction function Q = F(K,L) = 5K + L , where q is the number of cups generatedper hour, K is the number of coffee machines (capital), and L isthe number of employees hired per hour (labor). Suppose Karol needsto produce 500 cups of coffee and the price of capital is 40 europer unit and the price of labor (wage) is 20 euro per unit. IfKarol minimizes costs, how much capital and how much labor shouldhe employ? . . .

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Case Study 3 covers Milestone 4: Data Modeling. Remember to review the instructions three times and

Case Study 3 covers Milestone 4: Data Modeling. Remember to review the instructions three times and prepare the templates and other deliverables as instructed. The templates are in the Content section.

Your deliverables are:

Complete an Entity/Definition Matrix.

Prepare a Context Data Model.

Prepare a Key-Based Data Model.

Prepare a Fully Attributed Data Model. Add the data attributes for each entity.

Milestone 4

In this milestone we will use our results of the previous milestones and transcripts of an interview with IT consultant Jeff Summers and receptionist/bookkeeper Kathy Grey, both of Coastline Systems Consulting. The results of this activity will identify the business data requirements for the proposed system.

In the normal course of system development, the activities in this case are your first look at the data involved in the system. You will construct ‘entities' or things that you store data about. A purchase order is an entity and you readily see that things like P O Number, Date, Vendor, etc are things you want to keep about a purchase order. In all systems these data entities have relationships with other entities. The third component of your data entity drawings will be something called cardinality, or how the relationships can be populated. Cardinality is a common term in databases so Google it if you are not familiar with the concepts. Basically the relationship between a teacher and student (for a given course) is one to many, i.e. one teacher has many students. The most common forms of cardinality are one to many, one to zero, one to one, etc.

Entity/Definition Matrix

The Entity/Definition Matrix is simple word document. You can furnish the data model drawings using any drawing software or do it by hand and scan it as a .jpg file and upload that to the dropbox. Analyze each of the forms referenced by the user interview plus any comments made by Jeff Summers. Make assumptions where necessary. This is simple table naming the entity and a brief description.

Context Data Model

You start by constructing the Context Data Model which is simply the entities and the relationships and cardinality.

Key-Based Data Model

Next copy this drawing to another on and name it the Key-based Data Model. Here you add those data elements you feel are the key to the entity. You have already preserved the relationship and cardinality of the first drawing.

Fully Attributed Data Model

Last, copy your key-based drawing and name it Fully Attributed Data Model. This is simply adding all the data elements for that entity.

 

Milestone 4 – Data Modeling

 

Synopsis

Data modeling is a technique for organizing and documenting a system's data. Data is viewed as a resource to be shared by as many processes as possible. As a result, data must be organized in a way that is flexible and adaptable to unanticipated business requirements – and that is the purpose of data modeling.

In this milestone you will first discover those entities in the system that are or might be described by data. With each entity we identify, we will define it in respect to the business. Then, we will construct a Context Data Model that graphically depicts each of the entities and the relationships they have with each other. Next, we will refine the context data model to include primary and foreign keys. The resulting model is called a Key-Based Data Model. Finally, we refine the key-based data model to include any hierarchies and attributes, and this model is referred to as the Fully Attributed Data Model.

Objectives

After completing this milestone, you should be able to:

Understand and perform the techniques for entity discovery.

Define each entity with respect to the business and complete an entity/definition matrix.

Perform the necessary data modeling techniques to organize and document the data requirements for the proposed system.

Construct the Context, Key-Based, and Fully Attributed data models.

Prerequisites

Before starting this milestone the following topics should be covered:

Data modeling – Chapter 8

Milestone 3 Solution

Assignment

In this assignment we will use our results of the previous milestones and transcripts of an interview with IT consultant Jeff Summers and receptionist/bookkeeper Kathy Grey, both of Coastline Systems Consulting. The results of this activity will identify the business data requirements for the proposed system.

Exhibit 4.1 is a copy of the transcript of the interview. Refer to the transcript, sample forms, and results from Milestones 1-3 for the information necessary to complete the activities.

Activities

Complete an Entity/Definition Matrix. Analyze each of the forms referenced by the user interview plus any comments made by Jeff Summers. Make assumptions where necessary.

Prepare a Context Data Model.

Prepare a Key-Based Data Model.

Prepare a Fully Attributed Data Model. Add the data attributes for each entity.

References and Templates:

Milestone 3 Solution

Provided by your instructor

Transcripts of Interview with Jeff Summers and Kathy Grey and Accompanying Sample Forms and Report

Exhibit 4.1
Exhibit 4.2
Exhibit 4.3

Templates

Templates are availabe in the Content area under the Week 7 Case Study 3.

Deliverables:

Entity Definition Matrix

Context Data Model

Key-Based Data Model

Fully Attributed Data Model

Exhibit 4-1: Transcript Of Interview

 

The following is a copy of the transcript of an interview conducted by Anna Kelly with IT consultant Jeff Summers and receptionist/bookkeeper Kathy Gray of Coastline Systems Consulting. The goal of this interview was to obtain sample forms and to ask questions about them to discover data entities of the system.

Scene: The meeting room at Coastline Systems Consulting. Anna Kelly scheduled the interview to obtain instructions and sample forms for designing the data structure for the customer response system.

Jeff: Good morning, Anna!

Anna: Good morning, Jeff. Good morning, Kathy. Thanks for taking the meeting.

Jeff: You requested some samples of the forms we use now out on site. Here are copies of the main forms I think will be relevant.

Anna: Great! That will be a big help. I think you have received copies of the use case glossary, diagram, and narratives. The use cases and those forms you brought will be guiding our discussion in this meeting. What I want to accomplish is to get answers on some questions I have concerning the data requirements.

Jeff: The first form is the PC Configuration Sheet [Exhibit 4.2]. This is just a spreadsheet that we currently use to keep track of equipment in each PC. We build one of these sheets for each client where we service hardware and keep it in our disorganized binders.

Anna: OK. Are these columns all the pieces of information that need to be tracked for each PC?

Jeff: I don't think this whole format works very well. A few years ago we had to change the name of the CD-ROM column to CD/DVD when DVD drives started getting popular.

Anna: Today, we may need a column for mouse as we are getting all kinds of specialty mice and other pointing devices on the market.

Jeff: We may need a column for web cam, also. But the point is that we don't want to be restructuring the data every time there's a technology shift. Also, we have a problem with this format in that it doesn't allow for multiple hard drives or multiple CD ROMs. That happens pretty often.

Anna: I see. So we ought to move away from having specific components as fields.

Jeff: That's what I think. For each machine, we should be able to enter any number of components. And for each component, we should be able to select a component type from a list and then fill in the detailed information.

Anna: When I was talking to Ben and Doug about it the other week, they thought we could use barcodes to speed the entry process and tie the information back to when we check it into inventory.

Jeff: I can see how that would help. As you can see from the spreadsheet, some of our data is pretty sketchy. A barcode would tie each entry to a specify model number.

Anna: I've never worked with barcodes in an information system.

Jeff: I have. Every barcode symbol is associated with a numeric or alpha-numeric identifier. The identifier is printed just above or below the barcode symbol, so you can actually see what it is. When you scan the barcode, that identifier is entered into the computer just as if someone had typed the identifier on the keyboard. Often the identifier is the serial number of the component, so every one is unique.

Anna: I see. How long are those identifiers?

Jeff: It varies. But I think 20 characters should be sufficient.

Anna: But then we would end up with the equivalent of this spreadsheet filled with identifiers. That would be less informative than what we have already. That's where that Check In Inventory use case comes in. Kathy, how do you check in inventory now?

Kathy: I have an Access database. I type in model number, a description of the item, quantity, date purchased, and the vendor.

Anna: Not the purchase price?

Kathy: No. That information is in the accounting system. But it isn't relevant to inventory.

Anna: OK. We would need those same pieces of information. Plus we would need you to scan the barcode.

Kathy: Sounds like more work.

Anna: An extra second or two to scan the barcode. But I remember about a month ago you had to dig up a list of all Teac DVD+RW drives brought into inventory over a three month period.

Kathy: Oh, yes. What a hassle that was! That was to see if a particular drive was still under warranty.

Anna: Well, I think this new system could eliminate those searches. We would tie every installed component to a specific purchase date with the barcode.

Kathy: Then that would be well work the extra second. But I heard Jeff say that “often” the identifier is a unique serial number. What about cases where it's just a model number? That wouldn't be unique and so we couldn't tie the installed component to a specific purchase date.

Anna: I'll put that on my open issues list to check out. Worst-case scenario is that we put our own barcode on those items. We could generate a whole list of unique numbers and print barcode labels for them. It would be an extra step to apply those labels…

Kathy: But still worth it in the long run.

Anna: I'm glad you agree. What else do we have to talk about with the component end of the system?

Jeff: Well, let's say I replace the video card. I know what the PC now has. But I don't know what it had before, how long that component was in service.

Anna: So you want a history of each PC.

Jeff: From a component standpoint, I just need to see a list of all components that have ever been in the PC, when those components were added, and when they were removed.

Anna: It's not that I'm questioning your processes, but why do you need to know about components that are no longer in a PC?

Jeff: For one thing, clients like us to tell them about PCs that are causing problems over and over. Another reason is so on continuing problems we can see what was tried before.

Anna: That makes sense. So we don't want to just write over the information of the old component with the information of the new component. We want to keep adding to the list with an installed date and a removed date.

Jeff: For things such as RAM, I need to track a quantity, too.

Anna: OK. Given the changes you want, I think we ought to define the word “component.”

Jeff: Good question. You have to think about how we buy and upgrade. Sometimes we buy a complete system with CPU, monitor, mouse, keyboard – the works in one package.

Anna: If you buy it as one unit, do you get all the detailed component information and enter it to the columns?

Jeff: No, because if we bought it as a unit we let the vendor service it as a unit under warranty. In those cases a complete system would be a single component. But then later we upgrade a hard drive, add RAM, replace something, etc. A replacement NIC can be a separate component.

Anna: I know we custom build some PCs. What about them?

Jeff: A PC that we build from individual parts is all components.

Anna: So, if everything is a component, is there any information that pertains to the PC in general?

Jeff: Yes. First of all, this PC Configuration Sheet doesn't show it, but we need to track whether we are talking about a PC, a printer, a router, a hub or some other kind of technology equipment.

Anna: We service all those?

Jeff: If by service, you mean repair, then no. But if you mean make sure it is operational and handle sending it in for warranty work, then yes.

Anna: So I should call it equipment instead of PC. What else do we track about each piece of equipment?

Jeff: Each piece of equipment is given a name. We let the users name their own machines. Sometimes they change them. Also, everything has an “In Service Date.” And, of course, we track which client owns the equipment.

Anna: I notice this sheet tracks the user.

Jeff: Yeah. But tracking the user just doesn't work. We don't get informed of personnel turnover. So we go into an office months later and can't find the people we have on file. That's why we have started using a numeric ID for each piece of equipment. We just have it printed on a sticker that we attach to the machine.

Anna: I think that covers the equipment and component questions. What about the software configurations?

Jeff: I brought along some sample information [Exhibit 4.3]. This isn't all the kinds of configuration information we track. But it is representative.

Anna: Walk me through this, if you would.

Jeff: We see the client name at the top: Family Vacation Rentals. All this configuration information pertains to them. The DSL IP is simple. They have a DSL line, and this is the static IP address for it. The other items are more complex. You see we have a LAN IP for the network server. We also have the administrator username and password for that server. Then we have the LAN IP and username/passwords for three different logins for the SQL Server machine. We have a little configuration information for the network router, also – it's LAN IP and username/password. There should be more information on the router, such as the DHCP range, port forwarding information, etc.

Anna: Can't you just view all that information on the router once you login?

Jeff: Sure. Unless the router dies. Then we need to have it documented.

Anna: Got it. I can think of several ways to structure this data. Could we just dump all this information into a memo type of field?

Jeff: I've brought you a short one. Some of these configuration lists are pages and pages. We desperately need some organization so it can be searched.

Anna: So one big memo field isn't a good idea. I'll have to think through the pros and cons of various implementations. That leaves the service requests. Unfortunately we don't have any forms for that, do we?

Kathy: Not unless you count sticky notes and e-mails.

Anna: So let's approach it this way: What information do you need to communicate to a tech when a service request comes in?

Kathy: Well, which client it is, of course. Also a description of the problem and the person reporting the problem.

Jeff: If it deals with a particular machine, we need that, too. But not all do. Some deal with web hosting or software.

Kathy: And the date when the request comes in. Sometimes that is a point of contention.

Anna: All right. Then we need to track the work a technician does on a request. What would that look like?

Jeff: Well, we would want the date of that work and the technician's initials and kind of a memo pad for notes.

Anna: Earlier we had talked about a mechanism for marking requests as resolved. So we need that tracked. My opinion is a resolution date field would give us better information in the long run than a resolution checkbox.

Jeff: Makes sense. We had also talked about an automatic resolution mechanism after a tech does work. So we need a FinishTime field. We just as well have a StartTime field, too.

Anna: OK. This system is about client service requests and client equipment and client configurations. What kind of general information do we need to keep on each client?

Kathy: They are all companies with company names. And we always have a primary contact person.

Jeff: I don't know how many times I've needed a client phone number or e-mail address or mailing address. I would say we should have all that data handy in the system.

Anna: That's a good point, Jeff. Wow. I'm glad I talked with you two. This is giving me lots of good information. In fact, I think I have everything I need now to design the data.

Jeff: We're just glad you're working on this system. It sounds like a lifesaver.

Anna: Well, thanks for your time. You have both been a big help.

attached is 4.1, 4.2 and 4.3 with template for entity definition matrix

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Lesion of the optic tract causes a. homonymous hemianopia b. bitemporal hemianopia c. binasal…

Lesion of the optic tract causes a. homonymous hemianopia b. bitemporal hemianopia c. binasal hemianopia d. ipsilateral blindness
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Research – Antitrust Claims – Business Law Prepare at least a two page paper, following the APA guid

Research – Antitrust Claims – Business Law

Prepare at least a two page paper, following the APA guidelines, detailing the antitrust claims faced by the Microsoft corporation as detailed in the above websites (see Required Readings for this week).

Your paper must have an introduction and a closing conclusion.

Within the paper answer in detail the following with sub-heading breakdowns.

Please provide an analysis of your own opinion about the charges levied against Microsoft.
 
Do you believe that the charges were valid, or was Microsoft merely acting aggressively as capitalistic businesses are required to act in order to excel?

You are encouraged to seek out scholarly articles and appropriate websites to support your position.

Book for referencing if needed is:
Mallor, J.P., Barnes, A.J., Bowers, T., & Langvardt, A.W. (2010). Business law: The ethical, global, and ecommerce environment (14th ed.). New York : Irwin/McGraw Hill.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Develop and populate a reference architecture for the Adopt-A-Farm virtual business,… 1 answer below »

write a 4- to 6-page paper that addresses the following:

1. Develop and populate a reference architecture for the Adopt-A-Farm virtual business, based on your work in Weeks 3 and 4. Note that those diagrams focused on high-level analysis/design, and will aid in the creation of a high-level reference architecture.

2. Next, identify suitable vendor products for at least three elements of the reference architecture (specific to Adopt-A-Farm). Be sure to include the business capabilities of the products in your evaluation. Explain how you chose and evaluated each one.

3. Finally, develop implementation-level models or blueprints that incorporate these products (from your vendors) for the artifacts you previously created.

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

On January 2, 2011, the Crossover Band acquires sound equipment for concert performances at a cost… 1 answer below »

1. On January 2, 2011, the Crossover Band acquires sound equipment for concert performances at a cost of $55,900. The band estimates it will use this equipment for four years, during which time it anticipates performing about 120 concerts. It estimates that after four years it can sell the equipment for $1,900. During year 2011, the band performs 40 concerts. Compute the year 2011 depreciation using the straight line method.

2 .Refer to the information in QS 10-3. Compute the year 2011 depreciation using the units-of-production method.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Which graphical technique or chart should be used if the researcher is interested in comparing…

a) Which graphical technique or chart should be used if the researcher is interested in comparing the number of individuals in each location group? Explain the reason for the selection of this graphical chart. Construct and display the chart, also briefly describe what you can observe about the number of individuals belonging to each location category. (3 marks)

b) Which graphical technique or chart should be used if the researcher is interested in comparing the proportion of the number of individuals in each occupation group? Explain the reason for the selection of this graphical chart. Construct and display the chart, also briefly describe what you can observe about the proportion of the number of individuals belonging to each occupation category. (3 marks)

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Question 22 During assessing the project performance, the project manager found that the eamed value


Question 22 During assessing the project performance, the project manager found that the eamed value $2,400, the actual cost Question 22 During assessing the project performance, the project manager found that the eamed value $2,400, the actual cost $2800, and the planned value $2,000. This means that the project is schedule ahead on schedule exactly on the budget over running the budget

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Margaret is a 75-year-old woman living in an aged care facility for residents with low-care… 1 answer below »

Margaret is a 75-year-old woman living in an aged care facility for residents with low-care needs. Margaret had polio as a young child and has one shortened leg requiring a built-up shoe. She also now has arthritis in her hands, back, hips and knees, which is making movement, transfers and balance difficult and painful. Margaret also has emphysema and requires oxygen via nasal tubes, medication via a nebuliser, tablets for her arthritis and she receives injections.

Following is a list of supports outlined on Margaret’s care plan.

Washing:

Margaret can sit on a shower chair and independently wash the top half of her body, including genital area. She requires assistance to wash feet, legs and hair.

Margaret must be supervised and may need direction when stepping in and out of shower and transferring in and out of the shower chair.

She needs full assistance with drying herself, as she becomes breathless.

Dressing/undressing:

Margaret needs assistance with dressing and undressing as she has difficulty moving and becomes breathless with exertion. She must have a built-up shoe on her left foot.

Grooming:

Margaret likes to direct her own grooming and can do her make-up independently. She needs assistance with drying and styling her hair.

Nail care:

Margaret needs regular monitoring and treatment for ingrown toenails and corns. She takes care of her fingernails independently.

Oral hygiene:

Margaret has upper dentures and requires assistance to clean these and to open lids of cleaning fluid and containers.

Mobility:

Margaret uses a four-wheeled walker at all times

Transfer:

Margaret requires direction to use handrails and chair arms, to transfer in and out of chairs.

Toileting:

Margaret can use the toilet independently but wears incontinence padding due to difficulty getting to the bathroom in time, which results occasional leakage.

Eating and drinking:

Margaret has all meals in the facility dining room. She requires modified large-handled cutlery due to arthritis in hands.

CS Question 17

What equipment and aids are required for the provision of Margaret’s personal support?

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"