Database Design of Pop Music Website Development

Article Preview

Abstract:

With the rapid development of network technology, music websites gradually become a popular, and the emergence of pop music website is to meet the people's strong demand for popular music, because database plays an important role in the design of website, studying the database design of pop music website development is important. From the conception of database design, firstly, this paper studies conceptual design for the database design, conceptual design is mainly reflected in the form of an E-R diagram; then conducted logical in the database design, logical design is expressed by the pattern of table structure; finally, studies the security design of database design, describes the security policy of database. The studied content of this paper plays a supporting role for popular music website design, promotes the combination of music and websites, and enriches people's leisure life.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3023-3026

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Z. Yu, Database Design of Website Management System, Computer CD Software and Applications, vol. 15, no. 19, pp.225-227, (2012).

Google Scholar

[2] Baidu Baike, namespace, " http: /baike. baidu. com/view/8268. htm, fr=aladdin, 2014-9-10.

Google Scholar

[3] S. Wang, X. S. Sa, Introduction to Database Systems, Higher Education Press, (2005).

Google Scholar

[4] Baidu Baike, namespace, " http: /baike. baidu. com/view/15236. htm, fr=aladdin, 2014-9-10.

Google Scholar

[5] H. M. Chen, Logical structure design of the database, Fujian Computer, vol. 28, no. 10, pp.214-215, (2012).

Google Scholar

[6] Z. Y. Duan, Database Design Methodology, Journal of Nanchang College of Education, vol. 20, no. 4, pp.85-86, (2005).

Google Scholar

[7] J. Z. Liu, F. X. Pan, Research on Database Security, Journal of Wuhan Bioengineering Institude, vol. 2, no. 1, pp.31-32, (2006).

Google Scholar

[8] Z. Liu, D. S. Yu, Database Security Analysis, China Computer&Communication, vol. 5, no. 2, p.99, (2011).

Google Scholar

[9] L. Zhang, L. Ma, DiscussiononDatabaseDesign, Journal of Anyang Institute ofTechnology, vol. 6, no. 4, pp.76-79, (2007).

Google Scholar