Skip to main content

Newer Post or latest post

what is data cable? Types of cables, uses of data cables, importance of data cable explained!

Introduction of data cables Data cable is an important part of computer network model . From smartphone to supercomputer connections and wide range network uses and network models. It helps in network model in different types of topology models also. But we discuss what exactly called a data cable? How it is working with network model? Why these data cables are so important? In this guide, I will provide some information about the definitions, types, uses of data cables on network model with easy explanation of data cable covered topics. What is data cable? [Definition] A data cable is a wire that can transfer the data from one to another computer system. It connects to the ports available on the computer system. The user can transfer the data from one computer to another data cable connection. If two computers are connected then:- In according to data cable male port:- Port 1:- the male port of data cable is used to receive the data from the sender computer. Port 2:- th...

What are the steps of attribute of software model designing?

What are the steps of attribute of software model designing?

First of all we considered the software model as according to the database then we consider the steps of attribute of the software model. 

What is the software model in according to the database?

Software model is to understand by the skeleton structures of the software called schema. The Schema is define basically the two main structures are logical structure and Physical structure. Schema is define that the relation of their entity, attribute, processing structure, function, logical structure and Physical structure.

1. A typical model of software has their entity, attribute, conditions, functions, connection of the database etc.

2. A software has Input and output structure and their interface design.

3. A software has their database structure or database connectivity.

4. The Admin and the End user interfaces design of the software model have its security access to protect the data or any RDBMS information.

5. The security of the software protects their company data.

6. Accessing of networking must need for the software.

7. A Module is to design for the software to solve basically the original problem of the specific tasks.

8. Here the database of the software is managed by the Key attributes which is given below the typical steps.

Steps of attribute in typical model of software

1.  Step 1

Use Primary Key

First you can use the primary key to identify uniquely the database which is in the form of table.

Suppose you can use to see the record of LHS (Left Hand Side) table and RHS (Right Hand Side) table by using the basic condition.

For example:

SELECT  id no., Employee_name, Address;

From * Table; \\ both side of the table

Where ( id = 1);

This condition is use to retrieve the data from both the table and the result is

( 1, abhishek Avasthi , Uttarakhand, India)

Here is code from MS SQL server 2008. It is used as database for software developing.

Here in the figure above Id no., employee name, address fields are the three column and their records which is represents in the rows of table. Column is to understand the attribute of the recorded data.

In the table Id number is must be needed for the every data base of the tabular form because the sequential data is very easily to retrieve the data from the table’s record.

2. Step 2

Use Candidate key

 If you have problem in tabular database such as all employees are admins and their admin_id number than you can use candidate key because admins numbers may be are look like Id number of their employees.

Here in the figure above Id number, employee name, address and admin numbers are in the form of the table. The admin numbers are used in the sequential form. So you can retrieve their record by the candidate key.

By using the ‘select’ command as given above in the step 1.

3. Step 3

Use Super key

If you have a problem in the tabular data in the employees name and their address field’s values are the same as a part of the primary key then you can use Super key.

In the above Figure to show the Super key detects their Employees name and addresses are same or not.

4. Step 4

In another way you can use Composite Key

In other way when Primary key is not identify uniquely the database in the table record then you can add new field or column or attribute of the record to identify uniquely by the use of Composite Key.

In the above figure Composite Key attribute to composite or merge two databases and new database created which is used to help the uniquely identify the record of the database from the new created table.

5. Step 5

For instant data you can use Secondary Key

a) Secondary key is use to classifies the data in table database.

b) It classifies the instances of employee entity set such as their department name which is the attribute of employees in a field or column.

Secondary key is use to identify by the department in the above table. Secondary is used as the strong attribute which is show in the figure above.

6. Step 6

Use Foreign Key

a) Foreign Key is use widely because according to employees departments in any company employees record the most of employees have their one department but some employees have their two departments with different works.

b) In the above figure “Foreign Key” may be the primary key from another department because their data have corresponds to.


------------------------

MCQ questions related to the steps of software attributes....

------------------------

Which basic key attributes are used to find the record from the relational database model in the application software?

  • A) Foreign key
  • B) Composite key
  • C) Super key
  • D) Primary key


Answer is D) "Primary key"


The primary key basically used first to uniquely identify the record and most powerful key in the relational database model.

The find record using the select command is used to find the record from the database file.

When the user applies the select command in the relational database model then the user needs to mention the "user id number" which is known as the primary key mentioned in the relational database model. For example:- "Select user_id_num = 089;" .

Then the select command works on the database file and provides the record which has the user id number is 089.


Can a primary key be a unique identifier in database records?

Yes, the primary key or attribute used to define the record in the database file is unique from every record stored in the database file.

The relational database model file stores so many types of records and their attributes that categorised the data based on object or subject stores in a text information in the table format or matrix format.

The table included row as a record and column as an attribute to store the property of the record such as:- a user has a name which is categorised by the first, middle and last name on the table format of database file which is also known as relational database model.

For example:- Ana de Rodrigues included the first name Ana then middle name is De and last name is Rodrigues stored in three columns in one record or row in the table format of database file or relational database model file.


-----------------------------------------------------------------------------------------------------------------------------


Hello guys, I hope you can learn from this post easily  from “
What are the steps of attribute of software model designing?” and you get the right information from this post that I have posted related to information technology and computer science topics with questions and answers. Thanks for reading our content 🙂 👍

"I appreciate your attention to this topic! If you have any thoughts or questions, please feel free to share them in the comments below. Until next time, stay curious and keep learning!"


My latest post is here links below about the databases technology

What are the components of data model in [DBMS] Relational Database Management System?

There are five main components of data model... 👉 click here 👈

What is stability of the distributed database management system?

In the distributed database model there are.... 👉 click here👈

Comments

Post a Comment

Popular posts from this blog

About the memory and its Classification of the computer Memory

"Hi everyone, I'm Rudra, a CS engineer and passionate blogger. Welcome to my post on [About the memory and its Classification of the computer Memory. ], where I'll share insights on Information Technology and Computer Science education. My goal is to provide helpful information and answer your questions. Feel free to ask me anything in the comments below. Let's dive into today's topic…🙂” What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer s...

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

how the track ball is differ from the mouse and joystick

What are the differences between trackball, mouse and joystick devices? The differences are according to the track ball device verse mouse and joystick Trackball The track ball is a pointing device which contains a ball over the device or above the device. The track ball is a statics device that cannot move from one place to another. The track ball gives you a stability to use the device without moving the whole and just move the ball or roll the on the device. It uses as input device that depends on finger and thumbs only to moves the ball. It is slower than mouse due to cause the dependency the finger and thumb to move the ball to track the path of the pointer. What is trackball used for? The trackball is an input device which is used to provide 2 dimensions to move the ball over the device the ball is attached to. The trackball is used to move the pointer of the operating system where the ball is moved according to the position of the 2 dimensions x and y axis on the...