Assingment of Database
Assingment of Database
Introduction
The Annapurna Boutique Hotel the Beautiful area nearby Kathmandu is the location for
the recently launched Paradise Hotel. It is the attempt of the hotel to make its visitor
have an unforgettable stay in the hotel that the front desk of the hotel has adopted
efficient and secure hotel registration system. This is because the use of this
technology will impact all the mentioned areas, for instance, the reservation-related
inquiries as well as capturing of other details about the visitors such as name, phone
number, and length of stay among others. Every room will be occupied by a given visitor
exclusively; still no visitor will be allowed to occupy more than one room at a given
Period.
The visitors may also be provided with extras that include; sight-seeing, extra bedding,
car hire services with airport transfers and Ali baba catering. The system shall also
oversea the exact computation of the balance at the time of check as well.
In the interest of the hotel and based on the material presented, the manager needs to
maintain the ability to alter any data of a room in the system and demand weekly as well
As monthly summary on selling and occupancy. Since am the hotel database developer,
It will be my duties to coordinate the planning, designing and implementing of this
system. My current duty is to see that this module should run like a well-oiled machine;
this involve using specified tools to fine tweak the database for best performance;
perform regular through tests; fixing problems that would arise and using the light
patches to fix the bugs.
Activity 1
Describing user requirements is mostly done when a case for a certain project is
Under discussion. Product managers or customers who know the intended application
Of the embedded systems by the actual end user work together to determine the
Specification (Habash, 2022). Thus, to provide a detailed explanation of United
Limited system functioning, I have presented information for user of the
relational database system in the table below which includes the regulations of user
requirements.
Secondly, I have introduced end user requirement to the table below, which provides
specific information on the characteristics of the software systems, as well as services
to be provided and, if needed, sources of information.
Fig; System Requirements
Local Diagram
The logical diagram is as follow;
Pictures
Data Dictionary
It is another structure in a DBMS that helps accommodates names, description, and
definition aspects of the database. It should be noted however that there is meta data,
or rather information about the database in the database. Subsequently, data elements
are used in databases, information systems, research, analysis, and the intervention
purposes. The two basic components of the data dictionary are the label or the
dictionary, which contains references to the locations of the sources, and the contents
or data, which are facts collected from various sources.
For it provides more specific information about relationship between the tables within
a relational database, the Dictionary of Data is considered as an important factor. Users
are also supported by the data dictionary of a DBMS in terms of managing data in a
systematic manner thus keeping off redundant data.
Everything that has to do with tables or relations concerning the constraints and
schema, it records. Metadata is saved for every piece of information. The term
metadata can be defined as details concerning the data being referenced. Therefore,
the connection specification and all other supplementary data are stored in a Unified
record called a system directory or data dictionary. Likely to the references of an A to Z in
a relational database system, the data dictionary holds all details of each relation in
the database (GeeksforGeeks,2020).
Interface Design and Output
It has also been described how concerning the basic and complex interfaces in the
different related database systems and forms which has been used to finish the above-
mentioned interfaces. Five forms are employed to provide the best design and output
that can respond to United Limited’s correct results.
Login Table
Signup Table
Signup Table
Customer Table
Customer Table
Booking Table
Booking Table
Room
Amenities
About US Form;
Inaccurate data can be entered if the personnel do not adhere to proper input methods;
the information will therefore not be very helpful and could, in fact, lead to severe
reporting deficiencies in the future. However, there will always be costs related to the
Transformation, cleaning and hosting of unstructured data even if entry is perfect
(Taylor, 2023).
. Verification of Data
Data type check confirms that the entries made in the domain are the correct
data type in United Limited’s planned system. For example, data type will only
take data as input while the int data type will only take numeric as input.
. Range Verification
In cases while working with date that contain numbers, currencies, date, or time values,
range checking is inevitable to scan data in a given range.
. Length Range
This way you can determine that the field contains correct number of characters and
does not contain an extensive or insufficient information.
. Introduction to Normalization
When a relation or a collection of relation have redundancy, it is removed through
normalization. This may be due to relation redundancy where relation anomalies
associated with orders like insert, Delete and Update may occur. Therefore, it helps in
the minimization of redundancy in the business relationships. Normal forms are used in
database tables to remove or reduce redundancy, in this area.
The operation performed on the content of the new as well as the existing databases is
knows as normalization. To protect our data which are in storage media, it arises our
data into tables, define relationships between the tables, and cuts out the outcome
data that entails partition of a single table into several tables. Normalization can be
defined as the process that takes place when converting a complicated database
Structure into a clear structure combined with high reliability. Normal forms are a set of
rules that can be used to ascertain that a database is optimally constructed, optimally
structured and free of such things as anomalies in the information. The terms normal
forms could be used to mean different stages of normalization each its own set of
rules (GeeksforGeeks, 2015).
Advantages of Normalization
. In the creation or data redundancy by applying normalization.
. Thus, it may be mentioned that duplication can be eliminated extremely.
. Normalization could aid in eliminating null values having knowledge of research
before declaring a table ready for use.
. Results in the information of a smaller database as there are no or minimum cases
of repeated data.
. Minimise or avoid data change issues.
. It simplifies the question.
Disadvantages of Normalization
. When data are scattered across these tables, there must be linking of the tables
Which drags the work for long. Identifying the database among equally
interesting.
. Tables that will contain rewritten data shell have codes rather than genuine
information because the rewritten data will be taken in the forms of lines of
numbers. This significant that one needs to always look at the query table.
. The show goes at a progressively slower pace as compared to the one in the
conventional structural type.
Types of Normalization
1NF is mean for every cell in the table there should be one value and foe every column
that should be different names.
Example;
Solution of 1NF;
Example;
Solution of 2NF
1 Abhishek Parsa
2 Anij Parsa
3 Aman Parsa
Normalization 3NF
Since to meet NF, each non-key attribute is supposed to be independent of any other
attribute, 3NF is even more important than 2NF. This implies that for every table under
consideration, every other column distinct from the main key should refer only to the
main key and not to any other key.
Example;
Customer ID Customer Name Customer Address
1 Abhishek Parsa
2 Anij Parsa
3 Aman Parsa
Solution of 3NF
1 Single 2000
1 Double 5000
2 Double 5000
3 Double 5000
3 Triple 3000
Effectiveness of Design
As the user-interface indicates, the Reservation and Room tables are presented with
great organization; thus, it becomes easy for the user to check the available rooms,
and reserve them in a fair method that they would wise to use Receptionists themselves
will not have any difficulty in getting information about a guest because in the guest
able record creation, record updating and many more record functions concerning the
guests are allowed. Hence, the payment table and its respective interface ensure the
simplicity in the payment’s calculation. Therefore, the total of payments at any point in
time is correctly indicated and only this can work in accounting. Concerning reporting,
the ability to search tables and the displayed reports are encouraged by management in
the table design. It entails some useful reports as concerns with sales and occupancy.
The main and vertically incorporated key fields are utilized in a manner guarantee
that relations are accurate and safe from anomalies which in turn keeps
referential integrity for the completion of framework requirements. The strategies to
strengthen the protection of the site include the use of encryptors and accounts with a
verifications code. By employing the data normalization solutions, the reservations takers,
information desks, as well as other personnel interacting with the guests are able to
promptly accept orders, notify clients, and ensure the veracity of the information they
convey. Some of the attributes of the system as postulated are; Defined user access
with user roles, the ability to expand the uses of the system for more access
with user roles, the ability to expand the uses of the system for more functions,
integration of other modules, compatibility with other hotel management systems and;
enhanced, flexible reporting options for generating management information for
correctly informed decision making.
Ensuring Data Integrity and Security
This way, referential integrity is used, which prescribes to pay attention to the foreign
keys and make sure that all the possible connections between the table are created
and none of them can be spoiled.
The front-desk staff is far more experienced in the producer of reservation, and in the
provision of the visitors with the necessary information through the data normalization.
Normalization helps in avoiding any contamination of the data, thus ensuring that
issues frequent with data almost affect the normal running of the business.
Even, it can be ensured that management has the right information for the right decision
making, reporting systems can be made more flexible and effect that. They will ensure
that proper system creates and feed to ensure that it will be capable of meeting future
needs.
Overview;
Summing up, it is appropriate to underline the necessity of meeting both system and
user requirement for the distinctly underlined hotel reservation system. It provides a
unique strategy in accepting the reservation; managing the visitor’s information, and
ensuring verified charges. Also, the system appreciates data security and the quality of
the information it handles.
Conclusion;
Therefore, based on the findings shown in the above, it is possible to conclude that the
human hotel reservation systems meet a number of user/sponsor/systems requirements
and that their integration into the structure of the system proved efficient. Concerning
the particular of the ER system, it has been applied to describe how the five majors
entities – guest, room, reservation, service and payment – interconnect. Although
several linked tables are connected, an almost-normalized output could be achieved.
This one addresses bookings, guest’s details, and room status for ensuring front desk
employees meet their responsibilities. It is also possible to prepare management
reports on weekly or monthly basis and the amount due at the given month end to fulfill
the user’s requirement.
To meet the needs of the systems rational, feasible approaches such as checking the
input data, and normalizing the results as well as developing relatively user friendly
interfaces are incorporated. The whole design document ensures that there is creation
and documentation of the user interface and the output besides the data validation
methods ensuring the truthfulness of the entered data; the data model is always
normalized to at least third normal form, here too.
Therefore, the effectiveness evaluation proves the point that the design meets the
requirements and gives an opportunity for the futures scalabilities for security
improvement and other options to preserve the openness and freedom of the system
which are present right now.
Activity 2
Development of database system;
On the other hand, software development means a process of developing a new
application or modifying the existing one to meet the intended goals and objectives of
an organization with efficiency and ease. It refers to the CS methods applied in
application development and maintenance, as well as in the application business. Two
distinct tools were used by the author to handle database; other graphical user
interface tools such as MySQL server Management studio PhpMyAdmin local host
servers.