Preview

Different Database Naming Conventions

Satisfactory Essays
Open Document
Open Document
502 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Different Database Naming Conventions
1. After looking at the different database-naming conventions there are actually two that make sense to me. I know the homework says only one but these two are so close that they are practically the same and are sometimes referred to as such. What I am talking about is Pascal case and Camel case naming conventions. With Pascal case the first letter of each word is capitalized (UpperCase) and all other letters lowercase has no spaces between the words. Camel case naming convention has the first letter of the identifier in lowercase and every word after that starting with an UpperCase letter with no spaces between the words. If I had to pick just one of these, I would have to choose the Pascal case over the Camel case. I would choose Pascal case probably for the simple fact that for me it would be easier to start typing the identifier with an UpperCase letter. This type of naming convention makes the most sense to me out of all the others that I have seen because I think it is easy to read and there is less chance of getting data mistaken for something else. Like others that use under_score and hash-marks, these to me just seem to be more time consuming and for me not natural keys that I am used to on the keyboard.

2. I found six other ways of diagramming entities and relations. The six other methods of diagramming entities and relations are as follows:
a. Peter Chen’s diagram
b. Information Engineering
c. Richard Barker’s notation
d. Object Role Modeling (ORM)
e. The Unified Modeling Language (UML)
f. Extensible Markup Language (XML)

The similarities that I found are that Peter Chen’s, Information Engineering, and UML diagrams all use square cornered shapes for entities. Also that only Information Engineering diagram, ORM, UML, Richard Barker’s notation, and Peter Chen’s diagram contain the entity’s name in the shape that depicts the entity in the diagram. As for the attributes two of them are displayed inside the entity



References: Bolton, D. (2013, 01 01). C# Tutorial - An Object Oriented Approach to Programming. Retrieved 01 17, 2013, from About.com: http://cplus.about.com/od/learnc/ss/csharpclasses_5.htm Hay, D. C. (1999). Essential Strategies. Retrieved 01 19, 2013, from essentialstrategies.com: http://www.essentialstrategies.com/publications/modeling/compare.htm

You May Also Find These Documents Helpful

  • Good Essays

    1) Which of the following adheres to the naming conventions for a text box control?…

    • 3668 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    I have learned few more advanced topics in c # programming Language in these two weeks. The topics are:…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mat 540 Week 4 Paper

    • 1775 Words
    • 8 Pages

    Although the details can be quite complex, these details are the basic principles of object-oriented programming.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Uppercase characters are distinct from lowercase characters. Using ALL uppercase letters are primarily used to identify constant variables. Remember that variable names are…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1320 Unit 7

    • 2041 Words
    • 9 Pages

    11) The little lines in an E-R diagram used as shorthand for the multiple lines between two entities are referred to as…

    • 2041 Words
    • 9 Pages
    Good Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.3 Text and diagrams can be used to explain data more thoroughly or can be used to get a point across in a more concise way. Diagrams may be used to make your data more appealing to the audience they are intended for. To give an additional visual representation to your text could perhaps iterate it more clearly, or could perhaps add an impact that text alone can not offer. This can also be used to highlight key points in the data, or for showing any trends or patterns.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Psy300 Week 8

    • 760 Words
    • 4 Pages

    Understanding object-oriented methodologies is often difficult. You already understand that object-oriented analysis and design emulates the way human beings tend to think and conceptualize problems in the everyday world. With a little practice, object-oriented programming will become second nature to you.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 3 research

    • 383 Words
    • 2 Pages

    I think the convention that makes the most sense to me is the one limiting the amount of characters to a maximum of 30. If more than 30 characters where allowed name would become very long and confusing greatly increasing the chance of programming errors when creating the database.…

    • 383 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Although Oracle10g is not case sensitive in regards to keywords, table names, and column names, it is case sensitive when comparing search conditions to the data contained in a database table.…

    • 4553 Words
    • 34 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Entity-relationship Model

    • 411 Words
    • 2 Pages

    12. Linking Entities- Linking entities are used to resolve many-to-many relationships into two one-to-many relationships.…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It/210 Course Design

    • 2571 Words
    • 11 Pages

    Course Design Guide IT/210 Version 5 2 Week One: Introduction to Software Development Details Due Points Objectives 1.1 Describe the importance of using a structured, modular approach when creating program requirements, design, and code. 1.2 Identify how a computer processes and stores data. Course Preparation Read the course description and objectives.…

    • 2571 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    It 210 Weeks

    • 2760 Words
    • 12 Pages

    This course provides students with a basic understanding of programming practices. Concepts covered include flowcharting, pseudocode methodologies, and an understanding of programming practices. Students will learn how these concepts, when properly applied, improve program design.…

    • 2760 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Venn Diagrams Math 156

    • 507 Words
    • 3 Pages

    A group discussion following the exercise can include naming and identifying objects not in the diagram. An example would be hearts and circles (Burrell, 2012).…

    • 507 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber bullying is when someone is harassing someone else online with electronic means like a phone or computer or even through messaging. It’s a type of bullying that is not face to face. The difference between cyber bullying is different is because it can happen twenty four hours a day, seven days a week. Some may be bullied when they are by themselves. There are many risks to cyber bullying, the worst one would be attempt of suicide because the victim might be confused and might not know how to ask for help. The victim may start physical harm. “Physical harm and include depression, anxiety, social isolation and an increased risk for attempting suicide’, said Peggy Andover, a psychology professor at Fordham University in New York. Usual they victim will turn to alcohol or drugs because they think that they can run away from their problems. They might start skipping school, and might not want to attend school because they might want to isolate themselves. That leads to low grade and a high chance of dropping out of high school. The victim might suffer from low self-esteem and all of these effects of cyber bully can cause health issues. In a report by the ABC News in 2006, a survey was conducted on 1500 students in the grades between 4-8 and gave the following findings.42% of the children had experienced some form of bullying while online. 35% of them had received threats while online.21percentage had received threatening and mean emails or other forms of messages. 58% of the kids admitted that they had received hurtful information while online while the most shocking statistic was that 58% of these kids did not tell any adult about the form of harassment they receive while online. This clearly shows that a very large number of teenagers are being involved in cyber bullying and their parents or teachers are not even aware. Just imagine how many victims there are suffering because of cyber bullying. Imagine…

    • 601 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Our project is to create an Entity - Relationship Diagrams for the Fleet Truck Maintenance database. This will allow hub managers and maintenance supervisors the ability to automatically generate uniformed reports using near real time data to assist in compiling with regulatory requirements or decision planning for a fleet of over 800 trailers and 2100 trailers.…

    • 1925 Words
    • 8 Pages
    Better Essays