Assessment Cover Sheet-OCT16 Assessment Student Details Family Name: Given Name: Subject Details Qualification: Unit Code and Title: ICTDBS502 – Design a Database Trainers’ Name: Assignment Details...

ICTDBS502-Assignment[Your name] (1).docx


Assessment Cover Sheet-OCT16 Assessment Student Details Family Name: Given Name: Subject Details Qualification: Unit Code and Title: ICTDBS502 – Design a Database Trainers’ Name: Assignment Details Due Date: Assessment No: (If applicable) Date Submitted: Checklist · I have kept a copy of my assignment before submitting · I have completed and signed this page · I have answered all questions in the assignment · I have attached any relevant evidence/documentation, as required for the assessment Declaration I have been advised of the assessment requirements and have been made aware of my rights and responsibilities as an assessment candidate. I declare that, to the best of my knowledge and belief, this assignment is my own work, all sources have been properly acknowledged, and the assignment contains no plagiarism. This assignment or any part thereof has not previously been submitted for assessment at this or any other RTO. Student’s signature: Date: Assessment Feedback Result Satisfactory Not Satisfactory RPL RCC NYC – New assessment date scheduled or FIR – Further information Required Date: Trainers/Assessors signature: Date: Student Comments · I have received my assessment result and am satisfied with the feedback given on this assessment Student’s signature: Date: Questions: 1.1 List the activities involved in a user needs analysis to determine database functionality. Provide some examples. 1.2 What methods are used to gather the information for a user needs analysis to identify technical requirements? For this exercise you have been given the document 'Database Requirements.doc' in the student resources folder. Examine it and develop a list of functional requirements for the database and list below. 1.3 What are the four steps involved in developing the conceptual model? Using the answers to the first activity develop a conceptual model of the database. 1.4 Why do you need to submit the conceptual model to client for review? Why should you review the conceptual model with several users? 1.5 What could happen if client feedback is not obtained and you just go ahead and construct the database based on only one version of a conceptual model? Develop evaluation checklist and make changes as required. 2.1 What do attributes of an entity do? What is a primary key? List three common data types. What are foreign keys? What is referential integrity? From the conceptual design in activity 2 you will need to create the logical model for the database. Remember to include all the technical details such as data types, field lengths as well as relationships including symbols for cardinality. 2.2 Name two reasons to carry out normalisation. What does first normal form carry out? What does second normal form carry out? What does third normal form carry out? Also it is important to normalize your model. This means ensuring that the first 3 normal forms are adhered to. If you find any violations then recreate the model to separate out entities into new tables where necessary. 2.3 Develop entity relationship diagram for exercise 1, 2 and 3 (one to one relationship, one to many relationship and many to many relationship). Use ERD design tools to describe requirements and assumptions of technical requirements to develop database. 2.4 In what document would you include all attributes, normalised data and entity relationship diagram? In table format create a data dictionary and paste here. It should list: • Each entity such as Student table o description of the entity o a list of attributes(Fields) o the primary key o business rules affecting the entity (What constraints it limit the data it can contain) • Attributes(Fields) o Attribute name o Data Source -The table to which it belongs. 2.5 Why should different stakeholders review the documentation? What type of models can be forwarded to client for confirmation? 3.1 Provide a way of referencing one table from another confirm primary and foreign keys 3.2 Review client business rules, From the client brief note the functionality and database requirements you will need to develop for this project. 3.3 What is referential integrity? List a constraint you can put on two tables provided that are linked with primary key and foreign key. 3.4 What are database management system constraints? Which document would you put constraints in? 3.5 If you had to do the validation checking at the database level, why is MySQL not a good option? Define rules for foreign keys, range rules and list the rules. What is the advantage and disadvantage of enforcing validation rules at the database level? What is the advantage and disadvantage of enforcing validation rules at the application level? 3.6 What is an index? What do indexes achieve? What four rules can guide you when choosing what to index? 3.7 Create database structure design and detail where specific data resides and clarify structure of the system 4.1 The interface(website structure) o Pages will be constructed in PHP with basic CSS styling o Some graphics are included such as the banner are included but students can include their own if they wish for extra practice. 4.2 Connection scripts and query mechanisms o Database connection scripts and SQL queries should be carried out with PHP. 4.3 What do organizations commonly use queries for based on business requirements? Using the sample data from the Student Resources folder import the data and check all functionality to ensure compliance with requirements 4.4 List the things you would compare between the conceptual model and the physical design. (Consider attributes, validation rules, tables etc.). 4.5 Incorporating changes requires confirmation from whom? When changes are applied, what needs to be updated? 5.1 Why should you access the organization's security policy to determine access rights and privileges? List the four access rights for users of the database? Where can CRUD access be applied? 5.2 What is the purpose of passwords? What is a common way to stop unauthorised access when someone is trying to access the database or the application linked to the database? Design password protected interface web page 5.3 What is concurrency control? What type of lock ensures other users have no access at all? Can multiple users share a read lock? How do deadlocks occur? If multiple user access on web page, what website functionalities are required for multiple-users. 5.4 What is a client profile? Why should client access be reflected based on the client business model? If you were a computer administrator in a company and you wanted access to your pay information, what sort of access should be given? Produce list of profiles and their access details based on client business model. 6.1 Why is it essential to have a plan for database backup and recovery? Why is it important to store the database backup at an offsite or remote location? Why advantage has an incremental backup over a full backup? What do transaction logs store? What do change logs store? List the steps to recover a database? What is a mirrored database? 6.2 Why is it important to document the database back-up and recovery procedures? List and explain backup and restore procedures required for website. 6.3 This is the same as all other requirements as far as gaining client approval. This has been extensively covered in the Gather Data to Identify Business Requirements unit. Reference [Please put down any reference book/link here.] 6/2019 | Institute of Technology Australia | ICTDBS502-Assignment[Your name].docx 1 of 6 6/2019 | Institute of Technology Australia | ICTDBS502-Assignment[Your name].docx 3 of 6
May 18, 2021ICTDBS502Training.Gov.Au
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here