Nobody downloaded yet

Using a Database and Library Catalog - Book Report/Review Example

Comments (0) Cite this document
I typed the phrase “Food Justice” in the first field and used Boolean connectors AND and OR. I searched “food justice” AND (system analysis OR policy)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Using a Database and Library Catalog
Read TextPreview

Extract of sample "Using a Database and Library Catalog"

Download file to see previous pages Through this research I found the journal by the title “Growing food justice by planting an anti-oppression foundation: opportunities and obstacles for a budding social movement.”
A.S.P.E.CT- This is an abbreviation for A: Authority, S: Sources, P: Purpose, E: Evenness, C: Coverage and T: Timeliness. This criterion for evaluating articles or information from websites is by IRIS (information and research instruction suite). Authority is about if the site or the publisher that sponsored the source is legitimate. The URL of the source is .edu and hence it can be reliable. The author, Joshua Sbicca, is also a qualified author as he has written many more work such as “The Need to Feed: Urban Metabolic Struggles of Actually Existing Radical Projects.” published in 2013. Sources is about the legitimacy of the facts and figures presented. The identified source has 56 references which supports the facts and figures in it. The site where we found the source was created for the purpose of research, thus, it is in line with the purpose of the source. The evenness of the site is that the organization, shoreline, was created for the purpose of serving the community with reading and research materials hence it is unbiased and is not influenced by external forces. On the coverage, the source talks about “Growing food justice by planting an anti-oppression foundation” which is related to my search. The site is also well updated as indicated by the “Copyright © 2014.” Hence it follows the time factor in ASPECT.
To access my book, I went to the Sno-isle library online database and typed “food justice policy.” I limited my search to “books” but left search field to “any field.” this search resulted in a long list of books. I did a quick review of the books presented and finally I settled on “Life, liberty, and the pursuit of food rights: the escalating battle over who decides what we eat” by Gumpert because it was more ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Using a Database and Library Catalog Book Report/Review”, n.d.)
Using a Database and Library Catalog Book Report/Review. Retrieved from
(Using a Database and Library Catalog Book Report/Review)
Using a Database and Library Catalog Book Report/Review.
“Using a Database and Library Catalog Book Report/Review”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Using a Database and Library Catalog


...?Task a) and b) The ER-Diagram consists of five main entities, ly VISIT, BOOKING, OWNER, DOG, and INVOICE. The relationships can be explained in detail considering their cardinalities, participations and constraints according to the given scenario. CLASS/VISIT and BOOKING A CLASS/VISIT can have several BOOKINGs and a one BOOKING have a single corresponding CLASS/VISIT. Hence a one to many relationship exits between these entities (Marked with 1 and M near the respective entity). A CLASS/VISIT may or may not have booking at a time and it is considered a BOOKING is optional for a CLASS/VISIT and CLASS/VISIT is mandatory for a booking (marked with a circle on BOOKING as the optional side). A class can either have no bookings... a) and b) The...
4 Pages(1000 words)Assignment

Database application is valuable for the reason that it has to be linked to the data that is being processed by the application. In this scenario, following the process of security implementation, the next most excellent place to incorporate security is the Carrefour Business data warehouse itself. Because if security is incorporated to the data warehouse, all other associated programs will be protected. However, the selection of this security method will depend on a number of issues. On the other hand, if an organization is using more than one system inside the database, it can be most excellent to make use of a database level safety program. Furthermore, they can also make...
8 Pages(2000 words)Essay

Utilizing Database Performance Using Column Store

...indicates that, with compression, row-stores perform less effectively than column oriented systems. More formally, column storage systems store their data tables in the form of columns of data unlike the row based systems which store data in the form of rows of data; as seen in most relational database management systems. This system of storage; the column store method of storage is mainly best for systems like data warehouses, in addition to the customer relationship management systems, and finally, ad-hoc systems of inquiry, and library card catalogs. In these areas, large numbers of the same data items are used to compute aggregates on the data. Column oriented...
7 Pages(1750 words)Research Paper


...users are allowed to perform on the database. This is the main method of securing data in a database. Access to the database mostly requires correct username and a password which is assigned by the database administrator. The database administrator identifies legitimate users of the database and assigns each a passwords that they use to directly or indirectly access the database for manipulation, retrieval or updating of the data. The second issue that is concerned with database security is database vulnerabilities. Threats from a variety of sources such as internet and...
5 Pages(1250 words)Coursework


...? Creating an Extended Entity Relationship Model (EERM) Creating an Extended Entity Relationship Model (EERM) We use a classical four-layered approach to inductive specification of database structures. The first layer is the data environment, called the basic data type scheme, which is defined by the system or is the assumed set of available basic data. The second layer is the schema of a given database. The third layer is the database itself representing a state of the application's data often called micro-data. The fourth layer consists of the macro-data that are generated from the micro-data by application of view queries to the micro-data (DIETRICH, 2011). The second layer is diversely treated by database modeling languages... is...
6 Pages(1500 words)Assignment


...are held on record. Products are identified by their name and records of the product type and a description of the product are kept. i.) Design an E-R diagram for the above database ii.) Derive a corresponding relational scheme from your E-R diagram. Table Assets: assetID (primary) productID (primary) location LeaseRenewalDate Table Assets Inspection: inspectionID (primary) inspectorID (primary) assetID (primary) maintenanceDate maintenanceAction Table Inspectors: inspectorID (primary) name position Table Products: productID (primary) name type description Question 2: A garden plant supplier keeps data about their customers, orders and the plants they sell in a relational database with the...
4 Pages(1000 words)Assignment

Library research

...1. Explain the use and purpose of: CSA and Web of Knowledge ? CSA, which is now merged with Proquest, serves as an online access to information sources in the form of newspaper articles, journals and other periodicals, theses and dissertation as well as a host of databases for researchers and academics engaged in scholarly writing. CSA also offers links to information in other databases in the fields of arts and the humanities, natural sciences, social sciences, and technology (Proquest, 2011). On the other hand, Web of Knowledge (WoK) offers online academic citation indexing and search service covering the fields of science, social science, arts and the humanities. WoK provides...
2 Pages(500 words)Essay

The Service Model of the Contemporary Online Public Access Catalog

...Online Public Access Catalog (OPAC) Online Public Access Catalog (OPAC Assess the environmental conditions that surround and influence the service model of the contemporary online public access catalog (OPAC) for a communitys public library An Online Public Access Catalogue (OPAC) refers to an online database of documents held by a library. These libraries are meant for the public. It enables users to search items in the library easily. Hayes and Walter (1996).notes that the catalogues enable users to locate a book about which the title, author or the subject is known. In case a vendor wants to know if...
3 Pages(750 words)Assignment

Using a Star Database Schema

...Database Schema Fig A Star schema diagram for an online company Data warehouses form the bases for solid business intelligence solutions. According to Michelle (2007), a data warehouse is a repository for a company’s historical data. And it entails a set of technologies and techniques that are used in management of data (Michelle, 2007, p.1). These data warehouses are made using a dimensional model such as the star schema diagram (SSD) or a relational model like the entity relationship model. Comparatively SSDs are more preferred as they are easy to comprehend. The main aim of a marketing department adopting the use of a dimensional model is to help decision makers in making strategic decisions without the need of help and support... such as...
2 Pages(500 words)Research Paper

Library Database Exercise #4

...Advantages of using library databases In the modern world, with the invention of internet students are able to access many learning resources online. By performing a simple search using Google, a person can access millions of academic resources online. However, there are disadvantages of performing a general search via the internet instead of using library databases. First, the information obtained via a general search may be inadequate. This is due to the fact that publishers want to make money hence do not give full access to their copy righted content. This results in users not getting reliable information which can...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Book Report/Review on topic Using a Database and Library Catalog for FREE!

Contact Us