CHP 5 5. Consider the following query against the MVCH database: For each treatment ordered in the past two weeks,list by treatment lD and date (in reverse chronological order) the number of times a physician performed that treatment that day, sorted alph

computer science

Description

CHP 5 5. Consider the following query against the MVCH database: For each treatment ordered in the past two weeks,list by treatment lD and date (in reverse chronological order) the number of times a physician performed that treatment that day, sorted alphabetically by physician name. a. Which secondary key indexes would you suggest to optimize the performance of this query? Why? Make any assumptions you need in order to answer this question. b. Following the examples in this chapter, write the SQL statements that create these secondary key indexes. 6. This chapter discusses the 2002 Sarbanes-Oxley Act, which is not focused on not-for-profit providers such as many community hospitals. a. Can you see how MVCH could benefit from voluntarily complying with SOX? b. Specifically how can proper physical database design help with compliance and the following: • Improving accuracy and completeness of MVCH data • Eliminating duplicates and data inconsistencies Improving understandability of MVCH data CHP 6 1. What version of SQL and what RDBMS vvill you use to do the case exercises? 2. Which CASE tools are available for completing the case exercises? Can the CASE tool you are using generate the database schema from the physical data model(s) you created? 3. Can you suggest an easy way to populate your tables if you want to create a large set of test data? 4. How do the ach1al values you are using help you test the functionality of your database? CHP 7 1. Does your SQL-based DBMS support dynamic SQL, functions, triggers, stored procedures, and UDTs? 2. HIPAA's privacy and security rules mandate audit controls " that record and examine activity in information systems that contain or use electronic protected health information" (§164.312(b)]. How can DDL triggers be used in support of this mandate?


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.