SlideShare a Scribd company logo
BTEC Higher National Diploma in Computer & Network Technology
                               Assignment Specification


Institute Name                 : IDM Computer Studies Pvt. Ltd.
Unit Name                      : Database Management System
Unit Value                     : Unit 11
Lecturer                       : Ms. Nirosha Perera
Unit Outcomes:
      1. Identify and explain the Fundamental concepts of databases.
      2. Identify and explain the features of Data Models
      3. Apply data modeling and analysis techniques to the development of database(DB)
      4. Formulate queries and develop database using DBMS
      5. knowledge and understanding of database administrations and database security.

Grading Opportunities Available

 Outcomes/       P13.1   P13.2     P13.3   P13.4   M1    M2       M3   D1   D2   D3
 Grade
 Descriptors
                                                                         

Date Set:      15th Feb 2012                            Due Date:

Student Name :                                          Student No :

Outcomes/Grade Descriptors Achieved (Please Tick)

 Outcomes/       P13.1   P13.2     P13.3   P13.4   M1    M2       M3   D1   D2   D3
 Grade
 Descriptors


Assessor Comments:


Signature:                                                    Date: __/__/__

IV Comments:



Signature:                                                    Date: __/__/__




                                                                                          1
ASSESSMENT CRITERIA

Criteria for PASS                  Possible evidence                                              × /√   Feedback
P4.1.1 Identify the fundamentals   Demonstrate the different database types available in the
of database environment            market(Task 1 Section a)

                                   Identify the main functions of DBMS(Task 1 Section b)


P4.1.2 . Identify and explain      Describe the data models available to design databases
the features of Data Models        i.e Relational, Object Oriented, Post Relational .etc,
                                   (Task 1 Section c)

P4.1.3 Apply data modeling         Explain the two approaches top down and bottom up
and analysis techniques to the     designing techniques with example. (Task 2, Section a)
development of database(DB)
                                   Normalization (Task 2, Section b)

                                   Identify the entities , relationships among the entities and
                                   Draw the ERD . Using data dictionaries explain the
                                   entities and relationships (Task 2, Section c)

                                   Describe the steps of converting ERD to Relations and the
                                   output(Task 2, Section d)

P4.2.1 Formulate queries and       Identification of suitable DBMS to create database. And
develop database using DBMS        explain the common language used to define the data,
                                   manipulating the data and defining integrities on data.
                                   Developing tables & manipulating data using proper
                                   tools(Task 3, Section a)
                                   Performing queries (Task 3, Section b)

P4.3.4 Perform Database            Identify the concept of database administration &
Administrative tasks               data administration and explain the main functions
                                   need to be carried out by data administrator. (Task 3,
                                   Section a)

                                   Analysis the main roles of a DBA. (Task 3, Section b)

                                   Construct a plan to ensure the security of a database
                                   and identify the main users to the system and grant
                                   the specified database models & grant user access,
                                   security and recovery, backup features. . (Task 3,
                                   Section c)

Grade Descriptors for MERIT        Possible evidence                                              × /√   Feedback
M1 Identify and apply              Effective use of function of Access software. Develop the
      strategies to find           entire required input output screen.
      appropriate solutions
M2 Select / design                 Used the presentation mechanism for technical & no
      appropriate methods /        technical audience
      techniques


                                                                                                          2
M3      Present and             Produce a well structured & demonstrated of designing a
        communicate             database, Demonstrated that & manipulate appropriate
        Appropriate findings    database software
Grade Descriptors for           Possible evidence                                          × /√   Feedback
Distinction
D1 Use critical reflection to   Show evidence of personnel work and used different Data
evaluate own work and justify
valid conclusions
D2 Take responsibility for      Demonstrate it has own work and lessoned learned using
managing and organizing         the Researching
activities
D3 Demonstrate convergent /     Problems have been solved, representative of the new own
lateral / creative thinking     ideas of work. Effective way of thinking.




                                                                                                   3
Task 1

   a. Identify the database types and distinguish between a production database and a
         decision-support database.
   b. Briefly describe the main functions of a DBMS and explain the Importance of DBMS in
         commercial and non commercial environments.
   c. Identified and describe the different types of data models available in the market.




Assignment Scenario : Bus Company
A country bus company owns a number of buses. Each bus is allocated to a particular route,

although some routes have several buses. Each route passes through a number of towns. One or

more of the drivers are allocated to each stage of a route which corresponds to a journey

through some or all of the towns on a route. Some of the towns have a garage where buses are

kept. Each of the bus is identified by the registration number and can carry different numbers of

passengers. Since the vehicles vary in size , each route is identified by a route number and

information is available on the average number of passengers carried per day for each route.

Drivers have an employee no, name, address and sometimes a telephone number.


Task 2
   a. Describe the different approaches available to design a database.

   b. Normalize the above database up to Boyce Codd Normal Form(BCNF).

   c. Show the relationship of the data identified in the above bus company using entity
      relationship modeling.

   d. Describe the steps of converting the above ERD to the implementation of Relational
      Database.




                                                                                               4
Task 3
   a. Using a Data Base Management System (DBMS) of your choice, create all the above
       tables, and populate them with well-designed test data (minimum 5 records per table).
       Provide printouts of all tables.

   b. Set-up and test the following queries using a suitable visual query tool. Provide
      printouts of SQL code for each query and the output

           1. For each route display the total number of buses allocated.
           2. Display the bus details assign for each route. that is route no, route name, bus
                reference no, number of passengers carried in each bus.
           3.   Display the driver details working each route.



Task 4
a. Describe the main data administration functions that need to be carried out for bus the
company.

b. Examine the main activities need to be carried out by the DBAs for the administration of the
database environment.

c. Construct a security plan to ensure the security of a database and identify the main users to
the system and grant the specified database models & grant user access, security and recovery,
backup features.



                                      END of Assignment




                                                                                                   5

More Related Content

Viewers also liked

Tugas agama resume
Tugas agama resumeTugas agama resume
Tugas agama resume
Arief Pandawa
 
Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...
Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...
Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...
AndyHunder
 
Pc.&.network.technology june.2012
Pc.&.network.technology june.2012Pc.&.network.technology june.2012
Pc.&.network.technology june.2012NATHEEN
 
PSICOGRUP MAGAZINE
PSICOGRUP MAGAZINEPSICOGRUP MAGAZINE
PSICOGRUP MAGAZINEmoalcavi
 
Vinito Presentation 2012
Vinito Presentation 2012Vinito Presentation 2012
Vinito Presentation 2012stzmn
 
somsak thepnarong2
somsak thepnarong2somsak thepnarong2
somsak thepnarong2somsak2500
 
هنر تندرست ماندن
هنر تندرست ماندنهنر تندرست ماندن
هنر تندرست ماندن
Ebrahim Jahanshiri
 
Folkmusikmars 2012
Folkmusikmars 2012Folkmusikmars 2012
Folkmusikmars 2012
Ingesund
 
环球客户端产品简介
环球客户端产品简介环球客户端产品简介
环球客户端产品简介
qiaofuli
 
الممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمراني
الممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمرانيالممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمراني
الممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمراني
Mais Algendy
 
Primer design
Primer designPrimer design
Primer design
kuangxia
 
أسس تصميم المطارات 2 - مطار ريغا الدولي
أسس تصميم المطارات 2 - مطار ريغا الدوليأسس تصميم المطارات 2 - مطار ريغا الدولي
أسس تصميم المطارات 2 - مطار ريغا الدولي
Mais Algendy
 
أسس تصميم المطارات 1
أسس تصميم المطارات  1أسس تصميم المطارات  1
أسس تصميم المطارات 1
Mais Algendy
 
Sports & Branding - Merken die scoren!
Sports & Branding - Merken die scoren!Sports & Branding - Merken die scoren!
Sports & Branding - Merken die scoren!
dBOD design agency
 

Viewers also liked (17)

Iran persia-nature
Iran persia-natureIran persia-nature
Iran persia-nature
 
Tugas agama resume
Tugas agama resumeTugas agama resume
Tugas agama resume
 
Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...
Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...
Ukraine's international image (Ukrainian version) Вплив внутрішніх політичних...
 
Pc.&.network.technology june.2012
Pc.&.network.technology june.2012Pc.&.network.technology june.2012
Pc.&.network.technology june.2012
 
PSICOGRUP MAGAZINE
PSICOGRUP MAGAZINEPSICOGRUP MAGAZINE
PSICOGRUP MAGAZINE
 
Vinito Presentation 2012
Vinito Presentation 2012Vinito Presentation 2012
Vinito Presentation 2012
 
somsak thepnarong2
somsak thepnarong2somsak thepnarong2
somsak thepnarong2
 
هنر تندرست ماندن
هنر تندرست ماندنهنر تندرست ماندن
هنر تندرست ماندن
 
tugas
tugastugas
tugas
 
Gespot - Do It Yourself
Gespot -  Do It YourselfGespot -  Do It Yourself
Gespot - Do It Yourself
 
Folkmusikmars 2012
Folkmusikmars 2012Folkmusikmars 2012
Folkmusikmars 2012
 
环球客户端产品简介
环球客户端产品简介环球客户端产品简介
环球客户端产品简介
 
الممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمراني
الممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمرانيالممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمراني
الممارسات الاجتماعية وتأثيرها على فلسفة الجمال المعماري والعمراني
 
Primer design
Primer designPrimer design
Primer design
 
أسس تصميم المطارات 2 - مطار ريغا الدولي
أسس تصميم المطارات 2 - مطار ريغا الدوليأسس تصميم المطارات 2 - مطار ريغا الدولي
أسس تصميم المطارات 2 - مطار ريغا الدولي
 
أسس تصميم المطارات 1
أسس تصميم المطارات  1أسس تصميم المطارات  1
أسس تصميم المطارات 1
 
Sports & Branding - Merken die scoren!
Sports & Branding - Merken die scoren!Sports & Branding - Merken die scoren!
Sports & Branding - Merken die scoren!
 

Similar to Database.management.system.june.2012

MC0077 SMU 2013 Fall Session
MC0077 SMU 2013 Fall SessionMC0077 SMU 2013 Fall Session
MC0077 SMU 2013 Fall SessionNarinder Kumar
 
Advanced Database Lecture Notes
Advanced Database Lecture NotesAdvanced Database Lecture Notes
Advanced Database Lecture NotesJasour Obeidat
 
D 17
D 17D 17
DBMS
DBMSDBMS
Mydb 2010 - AbhijeetKalsi
Mydb 2010 - AbhijeetKalsiMydb 2010 - AbhijeetKalsi
Mydb 2010 - AbhijeetKalsi
Abhijeet Kalsi
 
dbms final.pdf
dbms final.pdfdbms final.pdf
dbms final.pdf
RaKesh3868
 
Software design
Software designSoftware design
Software design
ambitlick
 
Mi0034 – database management system
Mi0034 – database management systemMi0034 – database management system
Mi0034 – database management system
smumbahelp
 
Module BookletUnitUnit17 Database Design Concepts.docx
Module BookletUnitUnit17 Database Design Concepts.docxModule BookletUnitUnit17 Database Design Concepts.docx
Module BookletUnitUnit17 Database Design Concepts.docx
gilpinleeanna
 
project report
project reportproject report
project report
Ranjan Sharan
 
Advanced Data Structures 2005
Advanced Data Structures 2005Advanced Data Structures 2005
Advanced Data Structures 2005
Sanjay Goel
 
Presentation data base(1) (18).pptx
Presentation data base(1) (18).pptxPresentation data base(1) (18).pptx
Presentation data base(1) (18).pptx
Mohammad Adnan
 
Dbms
DbmsDbms
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2
Ejiro Ndifereke
 
Bba205 – management information system
Bba205 – management information systemBba205 – management information system
Bba205 – management information system
smumbahelp
 
DBMS_UNIT_1.pdf
DBMS_UNIT_1.pdfDBMS_UNIT_1.pdf
DBMS_UNIT_1.pdf
Koteswari Kasireddy
 

Similar to Database.management.system.june.2012 (20)

MC0077 SMU 2013 Fall Session
MC0077 SMU 2013 Fall SessionMC0077 SMU 2013 Fall Session
MC0077 SMU 2013 Fall Session
 
Advanced Database Lecture Notes
Advanced Database Lecture NotesAdvanced Database Lecture Notes
Advanced Database Lecture Notes
 
D 17
D 17D 17
D 17
 
1.introduction qb
1.introduction qb1.introduction qb
1.introduction qb
 
DBMS
DBMSDBMS
DBMS
 
Mydb 2010 - AbhijeetKalsi
Mydb 2010 - AbhijeetKalsiMydb 2010 - AbhijeetKalsi
Mydb 2010 - AbhijeetKalsi
 
dbms final.pdf
dbms final.pdfdbms final.pdf
dbms final.pdf
 
Software design
Software designSoftware design
Software design
 
Sdd template
Sdd templateSdd template
Sdd template
 
Mi0034 – database management system
Mi0034 – database management systemMi0034 – database management system
Mi0034 – database management system
 
Module BookletUnitUnit17 Database Design Concepts.docx
Module BookletUnitUnit17 Database Design Concepts.docxModule BookletUnitUnit17 Database Design Concepts.docx
Module BookletUnitUnit17 Database Design Concepts.docx
 
project report
project reportproject report
project report
 
Advanced Data Structures 2005
Advanced Data Structures 2005Advanced Data Structures 2005
Advanced Data Structures 2005
 
Week 1
Week 1Week 1
Week 1
 
Presentation data base(1) (18).pptx
Presentation data base(1) (18).pptxPresentation data base(1) (18).pptx
Presentation data base(1) (18).pptx
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Dbms
DbmsDbms
Dbms
 
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2
 
Bba205 – management information system
Bba205 – management information systemBba205 – management information system
Bba205 – management information system
 
DBMS_UNIT_1.pdf
DBMS_UNIT_1.pdfDBMS_UNIT_1.pdf
DBMS_UNIT_1.pdf
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Database.management.system.june.2012

  • 1. BTEC Higher National Diploma in Computer & Network Technology Assignment Specification Institute Name : IDM Computer Studies Pvt. Ltd. Unit Name : Database Management System Unit Value : Unit 11 Lecturer : Ms. Nirosha Perera Unit Outcomes: 1. Identify and explain the Fundamental concepts of databases. 2. Identify and explain the features of Data Models 3. Apply data modeling and analysis techniques to the development of database(DB) 4. Formulate queries and develop database using DBMS 5. knowledge and understanding of database administrations and database security. Grading Opportunities Available Outcomes/ P13.1 P13.2 P13.3 P13.4 M1 M2 M3 D1 D2 D3 Grade Descriptors           Date Set: 15th Feb 2012 Due Date: Student Name : Student No : Outcomes/Grade Descriptors Achieved (Please Tick) Outcomes/ P13.1 P13.2 P13.3 P13.4 M1 M2 M3 D1 D2 D3 Grade Descriptors Assessor Comments: Signature: Date: __/__/__ IV Comments: Signature: Date: __/__/__ 1
  • 2. ASSESSMENT CRITERIA Criteria for PASS Possible evidence × /√ Feedback P4.1.1 Identify the fundamentals Demonstrate the different database types available in the of database environment market(Task 1 Section a) Identify the main functions of DBMS(Task 1 Section b) P4.1.2 . Identify and explain Describe the data models available to design databases the features of Data Models i.e Relational, Object Oriented, Post Relational .etc, (Task 1 Section c) P4.1.3 Apply data modeling Explain the two approaches top down and bottom up and analysis techniques to the designing techniques with example. (Task 2, Section a) development of database(DB) Normalization (Task 2, Section b) Identify the entities , relationships among the entities and Draw the ERD . Using data dictionaries explain the entities and relationships (Task 2, Section c) Describe the steps of converting ERD to Relations and the output(Task 2, Section d) P4.2.1 Formulate queries and Identification of suitable DBMS to create database. And develop database using DBMS explain the common language used to define the data, manipulating the data and defining integrities on data. Developing tables & manipulating data using proper tools(Task 3, Section a) Performing queries (Task 3, Section b) P4.3.4 Perform Database Identify the concept of database administration & Administrative tasks data administration and explain the main functions need to be carried out by data administrator. (Task 3, Section a) Analysis the main roles of a DBA. (Task 3, Section b) Construct a plan to ensure the security of a database and identify the main users to the system and grant the specified database models & grant user access, security and recovery, backup features. . (Task 3, Section c) Grade Descriptors for MERIT Possible evidence × /√ Feedback M1 Identify and apply Effective use of function of Access software. Develop the strategies to find entire required input output screen. appropriate solutions M2 Select / design Used the presentation mechanism for technical & no appropriate methods / technical audience techniques 2
  • 3. M3 Present and Produce a well structured & demonstrated of designing a communicate database, Demonstrated that & manipulate appropriate Appropriate findings database software Grade Descriptors for Possible evidence × /√ Feedback Distinction D1 Use critical reflection to Show evidence of personnel work and used different Data evaluate own work and justify valid conclusions D2 Take responsibility for Demonstrate it has own work and lessoned learned using managing and organizing the Researching activities D3 Demonstrate convergent / Problems have been solved, representative of the new own lateral / creative thinking ideas of work. Effective way of thinking. 3
  • 4. Task 1 a. Identify the database types and distinguish between a production database and a decision-support database. b. Briefly describe the main functions of a DBMS and explain the Importance of DBMS in commercial and non commercial environments. c. Identified and describe the different types of data models available in the market. Assignment Scenario : Bus Company A country bus company owns a number of buses. Each bus is allocated to a particular route, although some routes have several buses. Each route passes through a number of towns. One or more of the drivers are allocated to each stage of a route which corresponds to a journey through some or all of the towns on a route. Some of the towns have a garage where buses are kept. Each of the bus is identified by the registration number and can carry different numbers of passengers. Since the vehicles vary in size , each route is identified by a route number and information is available on the average number of passengers carried per day for each route. Drivers have an employee no, name, address and sometimes a telephone number. Task 2 a. Describe the different approaches available to design a database. b. Normalize the above database up to Boyce Codd Normal Form(BCNF). c. Show the relationship of the data identified in the above bus company using entity relationship modeling. d. Describe the steps of converting the above ERD to the implementation of Relational Database. 4
  • 5. Task 3 a. Using a Data Base Management System (DBMS) of your choice, create all the above tables, and populate them with well-designed test data (minimum 5 records per table). Provide printouts of all tables. b. Set-up and test the following queries using a suitable visual query tool. Provide printouts of SQL code for each query and the output 1. For each route display the total number of buses allocated. 2. Display the bus details assign for each route. that is route no, route name, bus reference no, number of passengers carried in each bus. 3. Display the driver details working each route. Task 4 a. Describe the main data administration functions that need to be carried out for bus the company. b. Examine the main activities need to be carried out by the DBAs for the administration of the database environment. c. Construct a security plan to ensure the security of a database and identify the main users to the system and grant the specified database models & grant user access, security and recovery, backup features. END of Assignment 5