Database development assignment

Page 1

2017

Database Development Assignment

DATABASE ASSIGNMENT HELP

PROGRAMMING ASSIGNMENTS HELP | help@programmingassignmentshelp.net


Introduction Database Development Assignment is fundamental in the area of computing and ICT within organizational contexts.Database Management Systems (DBMS) provide the systems, tools and interfaces by which the organization can manage their information and use it to assist in the effective running of the organization. Databases offer many links to other areas such as programming, systems analysis, HCI, as well as embracing issues of compatibility and end-user interfacing. This unit explores database architecture, DBMS and the use of databases in an organizational context. Database Analysis and Design techniques are investigated and successful learners will be able to apply theoretical understanding to design, create and document a database system. This document include the report on the Tasks of Database Management Topics and Case Study implementation of Structured Systems Analysis and Design Method (SSADM).

Database Development Assignment and Data Management Systems Task P1.1 Key Issues Integrity: it means “consistency and correctness”. Business rules specify conditions and relationships that must always be true or must always be false.

For example, each company defines its own policies about salaries, employee numbers, and inventory tracking, and so on. It is important that data maintain data integrity, which is adherence to these rules, as determined by the database administrator or application developer.

Techniques for Guaranteeing Data Integrity When designing a database application, developers have various options for guaranteeing the integrity of data stored in the database. These options include:

   

Enforcing business rules with triggered stored database procedures, as described in “Overview of Triggers” Using stored procedures to completely control access to data, as described in “Introduction to Server-Side Programming” Enforcing business rules in the code of a database application Using Oracle Database integrity constraints, which are rules defined at the column or object level that restrict values in the database

Rule of Integrity

  

Domain Rules: Give legal values for domains. Attribute Rules: Give legal values for attributes. Relation Rules: Rules governing single relations (e.g., Primary keys must be unique and NonNULL)

www.programmingassignmentshelp.net

help@programmingassignmentshelp.net




Database Rules: Rules governing interrelationships between relations (e.g., Foreign Keys must be Primary keys – and therefore Non-NULL).

Read more about Computer Network Assignment help

Types of Integrity Constraints Types of Constraints Constraint Type

Description

NOT NULL

Allows or disallows inserts or updates of rows containing a null in a specified column.

Unique key

Prohibits multiple rows from having the same value in the same column or combination of columns but allows some values to be null.

Primary key

Combines a NOT NULL constraint and a unique constraint. It prohibits multiple rows from having the same value in the same column or combination of columns and prohibits values from being null.

Foreign key

Designates a column as the foreign key and establishes a relationship between the foreign key and a primary or unique key, called the referenced key.

Check

Requires a database value to obey a specified condition.

REF

Dictates types of data manipulation allowed on values in a REF column and how these actions affect dependent values. In an object relational database, a built-in data type called a REF encapsulates a reference to a row object of a specified object type. Referential integrity constraints on REF columns ensure that there is a row object for the REF.

Uses of Integrity Checking Security Data-integrity assurance techniques go a long way in making a computer system secure.

Intrusion Detection In the last few years, security advisory boards have seen an increase in the number of intrusion attacks on computer systems. A large class of these intrusion attacks are performed by replacing key binary executable like the ones in the /bin directory with custom back-doors or Trojans.

Non-Repudiation and Self-Certification

www.programmingassignmentshelp.net

help@programmingassignmentshelp.net


Distributed storage systems like SFSRO and NASD have public- or private-key-based signatures for integrity assurance.

Trusting Untrusted Networks Distributed file systems exchange control and data information over untrusted networks. Integrity assurance mechanisms like tamper-resistant HMAC checksums and public key signatures verify that the information sent through untrusted networks is not modified or corrupted.

Performance The design of a certain class of integrity assurance mechanisms takes advantage of already existing redundant information to improve system performance.

Duplicate Elimination Low-Bandwidth Network File System (LBFS) and Venti use checksums for eliminating duplicates in their data objects. Since duplicate data objects share the same checksum value, a reasonably collisionresistant checksumming scheme could help identify duplicates by comparing their checksums. This method of duplicate identification is efficient because the length of data that needs to be compared is usually 128-bit checksums, compared to data blocks which could be of the order of kilobytes. Duplicate elimination helps in reducing storage space and enables better cache utilization, and hence improves performance. Checksums are used for duplication elimination in the Rsync protocol

Indexing Checksums are a good way to index data. Object disks can use checksums for indexing their objects

Detecting Failures Integrity checks on raw data can be used to identify disk failures. Read more about computer programming assignment help

Programming Assignments Help is the best assignment help provider in the United Kingdom. Our online assignment writing help UK is especially dedicated for the students studying in all UK colleges and universities. Submit assignment to get the best quality assignment help.

www.programmingassignmentshelp.net

help@programmingassignmentshelp.net


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.