Data Models in Business Analysis
Data Models in Business Analysis
This video is from our PMI-PBA Business Analysis for IT Analysts and Project Managers (PMI-PBA)® Certification now available at Interface Technical Training.
Also see Steve’s PMP Project Management Certification Course:
Data Models are part of the elicitation analysis in PMI-PBA. This is the way that you represent the results of your elicitation so that the user of the audience can best understand them.
Data models have five different forms.
Entity Relationship Diagram (ERD) – Data Dictionary – Data Flow Diagram – State Table – State Diagram
Entity Relationship Diagrams (ERD) have the cardinalities and the little crow’s feet associated with it.
Data Dictionary: Any time working with reports or documentation you often have to define what certain terms mean. Remember, we like unique identifiers, so that we can reference the identifiers rather than having to keep editing a term or a value many times.
If you’re writing prose, for instance, then you want to be flowery with your words. You’re going to use lots of synonyms. If you’re using a business document, and you’ve got a term or an identifier for a particular value or feature that everybody understands, you repeat that same term over and over again. Don’t change it just to make the sentence more creative. We’re focusing on key concepts here.
As we move into data models, we’re actually talking about the data that might be created, read, updated, deleted, or other elements.
We’re now well past the scope model which at the high level and the process model is the interaction and the mid level as well as the rules model that inform when to do something or not.
The data models are often the objects to which we are applying all of those rules and/or efforts. This is a much lower layer with much greater detail to our model stack.
You don’t need to use every model if it’s not necessary to deliver to the audience that you’re trying to inform.
Data Flow Diagram: The third of the data model series is called the data flow. This is different than a flow chart or a flow diagram. In a flow chart or a flow diagram you’re showing the process interaction. In the instance of a data flow diagram, you’re showing how the data is affected by the process interaction which includes more details typically in a drawing/diagram.
State Table: Are rows and column that identify the various states the data might exist in. Which are typically, create, read, update and delete.
They can be situated in authentication on access, or in various states of requirement like in the queue, active, in front of the Change Control Board, being assigned for work or quality tested. They can be in many states the data exists in or a requirement exists in.
State Diagram: Lastly a state diagram (any time you see the word diagram we’re suggesting a drawing). They are used to solve relationships. The one to one, one to many, the optional zero to many, or zero to one of this particular entity relationship diagram which is about a registration system.
An entity relationship diagram with its cardinalities ‑‑ there’s little different cardinalities, the crow’s foot being a form of drawing the cardinality ‑‑ that is a form of data model used by business analysts.
Steve teaches PMI-PBA: Business Analysis Certification, PMP: Project Management Fundamentals and Professional Certification, Windows 10, and CompTIA classes in Phoenix, Arizona.
Steve’s Video Certification Training Classes at Interface Technical Training:
You May Also Like
In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management
In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.
In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.