Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

What are the steps of attribute of software model designing?

What are the steps of attribute of software model designing?

First of all we considered the software model as according to the database then we consider the steps of attribute of the software model. 

What is the software model in according to the database?

Software model is to understand by the skeleton structures of the software called schema. The Schema is define basically the two main structures are logical structure and Physical structure. Schema is define that the relation of their entity, attribute, processing structure, function, logical structure and Physical structure.

1. A typical model of software has their entity, attribute, conditions, functions, connection of the database etc.

2. A software has Input and output structure and their interface design.

3. A software has their database structure or database connectivity.

4. The Admin and the End user interfaces design of the software model have its security access to protect the data or any RDBMS information.

5. The security of the software protects their company data.

6. Accessing of networking must need for the software.

7. A Module is to design for the software to solve basically the original problem of the specific tasks.

8. Here the database of the software is managed by the Key attributes which is given below the typical steps.

Steps of attribute in typical model of software

1.  Step 1

Use Primary Key

First you can use the primary key to identify uniquely the database which is in the form of table.

Suppose you can use to see the record of LHS (Left Hand Side) table and RHS (Right Hand Side) table by using the basic condition.

For example:

SELECT  id no., Employee_name, Address;

From * Table; \\ both side of the table

Where ( id = 1);

This condition is use to retrieve the data from both the table and the result is

( 1, abhishek Avasthi , Uttarakhand, India)

Here is code from MS SQL server 2008. It is used as database for software developing.

Here in the figure above Id no., employee name, address fields are the three column and their records which is represents in the rows of table. Column is to understand the attribute of the recorded data.

In the table Id number is must be needed for the every data base of the tabular form because the sequential data is very easily to retrieve the data from the table’s record.

2. Step 2

Use Candidate key

 If you have problem in tabular database such as all employees are admins and their admin_id number than you can use candidate key because admins numbers may be are look like Id number of their employees.

Here in the figure above Id number, employee name, address and admin numbers are in the form of the table. The admin numbers are used in the sequential form. So you can retrieve their record by the candidate key.

By using the ‘select’ command as given above in the step 1.

3. Step 3

Use Super key

If you have a problem in the tabular data in the employees name and their address field’s values are the same as a part of the primary key then you can use Super key.

In the above Figure to show the Super key detects their Employees name and addresses are same or not.

4. Step 4

In another way you can use Composite Key

In other way when Primary key is not identify uniquely the database in the table record then you can add new field or column or attribute of the record to identify uniquely by the use of Composite Key.

In the above figure Composite Key attribute to composite or merge two databases and new database created which is used to help the uniquely identify the record of the database from the new created table.

5. Step 5

For instant data you can use Secondary Key

a) Secondary key is use to classifies the data in table database.

b) It classifies the instances of employee entity set such as their department name which is the attribute of employees in a field or column.

Secondary key is use to identify by the department in the above table. Secondary is used as the strong attribute which is show in the figure above.

6. Step 6

Use Foreign Key

a) Foreign Key is use widely because according to employees departments in any company employees record the most of employees have their one department but some employees have their two departments with different works.

b) In the above figure “Foreign Key” may be the primary key from another department because their data have corresponds to.


------------------------

MCQ questions related to the steps of software attributes....

------------------------

Which basic key attributes are used to find the record from the relational database model in the application software?

  • A) Foreign key
  • B) Composite key
  • C) Super key
  • D) Primary key


Answer is D) "Primary key"


The primary key basically used first to uniquely identify the record and most powerful key in the relational database model.

The find record using the select command is used to find the record from the database file.

When the user applies the select command in the relational database model then the user needs to mention the "user id number" which is known as the primary key mentioned in the relational database model. For example:- "Select user_id_num = 089;" .

Then the select command works on the database file and provides the record which has the user id number is 089.


Can a primary key be a unique identifier in database records?

Yes, the primary key or attribute used to define the record in the database file is unique from every record stored in the database file.

The relational database model file stores so many types of records and their attributes that categorised the data based on object or subject stores in a text information in the table format or matrix format.

The table included row as a record and column as an attribute to store the property of the record such as:- a user has a name which is categorised by the first, middle and last name on the table format of database file which is also known as relational database model.

For example:- Ana de Rodrigues included the first name Ana then middle name is De and last name is Rodrigues stored in three columns in one record or row in the table format of database file or relational database model file.


-----------------------------------------------------------------------------------------------------------------------------


Hello guys, I hope you can learn from this post easily  from “
What are the steps of attribute of software model designing?” and you get the right information from this post that I have posted related to information technology and computer science topics with questions and answers. Thanks for reading our content 🙂 👍

"I appreciate your attention to this topic! If you have any thoughts or questions, please feel free to share them in the comments below. Until next time, stay curious and keep learning!"


My latest post is here links below about the databases technology

What are the components of data model in [DBMS] Relational Database Management System?

There are five main components of data model... 👉 click here 👈

What is stability of the distributed database management system?

In the distributed database model there are.... 👉 click here👈

Comments

Post a Comment

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Types of Local Storage in Computer Systems

Describe the different types of local storage of computer systems? The local storage device is a type of memory for the user to keep a database file for a long time to access again and stored as a distributed offline database on the local storage. The local storage device can be pendrive, compact discs, dvd, floppy drive, HDD, SSD, memory card etc. The local storage needs to keep the valuable database file for the user to provide the lost database if suddenly deleted or formatted the whole drive of the computer system. Local storage in computer systems refers to devices or media that store data directly connected to the computer. There are several types, including Hard Disk Drives (HDDs), which use spinning disks and magnetic heads to store data; Solid-State Drives (SSDs), which store data in flash memory, offering faster access times and lower power consumption; and Hybrid drives, which combine elements of both. Other forms of local storage include USB flash drives, SD cards, and CDs/...

Discuss the data replication on the distributed database system?

Discuss the data replication on the distributed database system? The data replica is a term that refers to the data replication means the copy of data into the servers distributed to access the copy of data. The data replication in a distributed database system is a term that provides the benefits for the user to easily access the data from the nearby server provided for the client user from the website. The data can be easily accessible from the server and provide the fast speed with reduces the latency of the data transfer to the client server such as:- if the user access the data from their smartphone device then the data will be fast to load because the nearby server provide the data replicated or copied of data to the user. Data replication in a distributed database system involves creating and maintaining multiple copies of data across different nodes or locations to enhance availability, reliability, and performance. It ensures that users can access data even if a node fails, re...