27 Jan 2023

85

Three Primary Data Model Types

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 400

Pages: 2

Downloads: 0

A data model gives the description of how data would be used to meet end-user requirements. The modeling process allows the creator to understand information requirements. Models will normally vary between different businesses because of the peculiarities that each business has in different sectors. This paper will discuss the major milestones in data modeling, including data and system requirements.

Any proper data modeling activity will begin with the proper requirement gathering. Communicating with the stakeholders on the needs of the data model required is vital. The chief function of a data model is to ensure that it captures the information needs put forward. As such, consultations with stakeholders on requirement needs are key in providing the right background to the data model. The result is that both developer and end-users enjoy the user experience on the model.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Figure 1 : Summary of Data Modeling Process (Mallikaarachchi, 2010). 

The above model shows the graphical presentation of the data modeling process. Customer needs and output requirements inform the technology base that developers will use. Requirements analysis, functional analysis and system synthesis correlate so that the system can produce required information needs. Functional analysis allows the developer to determine system needs, including the decomposition of the system needs, allocating performance specifications and refine interfaces (Sturm & Shehory, 2002). The synthesis allows system specifications to be turned to physical performances of the developed interfaces. Preferences are also set here. Once the system is completed, a system analysis can be conducted to determine the effectiveness of the system in reaching information needs set out by the end-users. Configuration, data management, risk management and overall effectiveness are some factors considered at this point (Jensen, Kligys, Pedersen, & Timko, 2004).

The levels of data modeling are used as well in conducting the entire exercise. The following pictorial describes the levels of data modeling:

Figure 2 : Levels of data models (Mallikaarachchi, 2010). 

Either three of the major data models (conceptual, physical or logical design) can be used to achieve the objectives of the data modeling process. The functional team and technical team must come together to achieve these objectives. The functional team will consist of the analysts in the business arena as well as end-users who will use the end-product. The technical team on the other hand, consists of programmers and developers. A section of data modelers design the data model that meets the functional team’s expectations and provides the necessary system specifications for the technical team (Ballard, Herreman, Schau, & Bell, 1998).

References

Ballard, C., Herreman, D., Schau, D., & Bell, R. (1998). Data Modeling Techniques for Data Warehousing. International Technical Support Organization , 8 -158.

Jensen, C. S., Kligys, A., Pedersen, T. B., & Timko, I. (2004). Multidimensional data modeling for location-based services. , . The VLDB Journal—The International Journal on Very Large Data Bases, 13(1) , 1-21.

Mallikaarachchi, V. (2010). Data Modeling for System Analysis . Retrieved from University of Missouri - St. Louis: http://www.umsl.edu/~sauterv/analysis/Fall2010Papers/varuni/ .

Sturm, A., & Shehory, O. (2002). Towards industrially applicable modeling technique for agent-based systems. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1 (pp. 39-40). Washington D.C.: ACM.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Three Primary Data Model Types .
https://studybounty.com/three-primary-data-model-types-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration