Vous êtes sur la page 1sur 39

Page 1

Unit 33 – Data Analysis and Design

Database Solution for Stafford University

Assignment No (DAD-16-001-V2)

By

Vagish Kirubaharan

COL/A-051935

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 2

Task 1

1.1

The Data Model


The examination of information protests that are utilized as a part of a business or other
setting and the recognizable proof of the connections among information objects are called
Data Modeling. Information displaying is the initial phase in doing object situated
programming.

An information model can be thought of as an outline or flowchart that delineates the


connections between information.

1.2

Advantages Disadvantages
Clients can comprehend this model Consistent information model might be hard
effortlessly to adjust and on the grounds that other elated
data connected to them.
Logical data models help the users to identify Spotting errors within logical data model can
the activities of the business become difficult at times as they are not easy
to identify
When constructing logical data model itself, Attributes are not described properly and
it is very easy and all information is does not have fine details
transferred into diagram with less words

Relational Data Base

Advantages Disadvantages
The social information show keeps away Relational information show is costly
from multifaceted nature. Information are information framework
sorted out normally inside the model,
streamlining the improvement and utilization
of the database
Information honesty is a fundamental If the quantity of tables between which
element of the social model. Information connections to be set up are vast and the
trustworthiness guarantees exactness and tables themselves impact the execution in
consistency of the data. reacting to the sql questions
The social information show is normally If the information is normally sorted out in a
adaptable and extensible, giving an adaptable progressive way and put away all things
structure to meet changing necessities and considered, the various leveled approach may
expanding measures of data give brisk significance for that information
A database configuration is by and large Database frameworks utilizing object-
considered standardized when it meets the situated information models have been touted
prerequisites of the third typical form. as the developing structure for the up and
coming age of the frameworks

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 3

Hierarchical Data Model

Advantages Disadvantages
Utilizing a progressive information display Hierarchical information structures have a
sets up clear specialist for work and tendency to adjust gradually to evolving
departments needs
Associations can't adjust to new market The various leveled structure makes clear
requests or propelling advancements lines of correspondence and gives
correspondence direction.
Hierarchical display experience the embed The progressive system is that it doesn't urge
erase and refresh inconsistencies, individuals to team up and share data over
additionally recovery operation is entirely the announcing structure.
hard.
It is really perplexing to incorporate in spite The underlying database demonstrates that
of the fact that it is sans inconvenience and proposed the information security was
simple to plan Hierarchical model that is given by the
DBMS.

Network Data Model

Advantages Disadvantages
The system show is reasonable The system demonstrate is can deal with the
straightforwardness and simple to design. one to numerous and many to numerous
All the records are kept up utilizing pointers connections
and subsequently the entire database
structure turns out to be extremely intricate
That mean numerous connections can be Since the information get to strategy in the
handled system database display is a navigational
framework, rolling out basic improvements
to the database is extremely troublesome
much of the time and inconceivable now and
again
The system display does not enable a part to Making auxiliary alterations to the database
exist without a proprietor. This guarantees is extremely troublesome in the system
the information integrity database show as the information get to
technique is navigational
The various leveled display was the non-
accessibility of widespread norms for
database plan and demonstrating.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 4

Entity Relationship Data Model

Advantages Disadvantages
Having planned an E-R graph for a database Physical configuration got from E-R Model
application, the social portrayal of the may have some measure of ambiguities or
database display turns out to be generally irregularity
straightforward
Transformation from E-R chart to a system Popular for abnormal state outline The E-R
or progressive information demonstrate can• information display is especially well known
effectively be accomplished for abnormal state

Object Oriented Data Model

Advantages Disadvantages
Protest situated advancement is the We have just specified that there isn't
confirmation that the framework will generally concurred information demonstrate.
appreciate a more drawn out life while Essentially, there is no standard protest
having far littler upkeep costs. There is a arranged question dialect
general absence of benchmarks of
OODBMSs
Protest situated framework tend to There is no all-around concurred information
demonstrate this present reality in a more show for an OODBMS, and most models do
entire manner than do conventional methods not have a hypothetical establishment
This .detriment is viewed as a critical At the point when another protest is made, it
downside, and is practically identical to pre- will consequently acquire the information
social frameworks qualities and attributes of the class from
which it was brought forth.
In contrast with RDBMSs the utilization of This implies we don't yet have the level of
OODBMS is still generally constrained experience that we have with customary
frameworks

The essential information demonstrates which is utilized generally around the globe for
information stockpiling and handling is called Relational Data Model.

Yi-Shin-Chen clarifies that Relational information show speaks to the database as an


accumulation of tables, named relations, each with a one of a kind name.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 5

There are no different records changes required additionally there is more stockpiling
productive, points of interest can be erased basically or adjusted and all records in different
tables having a connection to that passage will demonstrate the change. That mean
information is just put away once. And furthermore complex questions can be done. At the
point when the individual logs on with their client name and watchword, the framework
would then be able to restrict get to just to those tables whose records they are approved to
view thus that it is better security. And furthermore it is less demanding to change and
information arrange.

Social information demonstrates is more adaptable than progressive and system database
models are additionally convenience.

1.2

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 6

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 7

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 8

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 9

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 10

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 11

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 12

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 13

There are two methodologies for building up any database, the best down approach and base
up approach. All these methodologies are distinctive they share the shared objective of
joining a framework by depicting the greater part of the communication between the
procedures. The database configuration process plans to make database structures that will
effectively store and oversee information.

Database configuration has frequently been depicted as a craftsmanship as opposed to science


Traditionally, it has been completed on a specially appointed premise by a "database plan
master" who acquire data about a client's information needs through talking, analyzing
existing reports and frameworks.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 14

Top down Method


A best down approach is basically the separating of a framework to pick up knowledge into
its compositional sub-frameworks. In a best down approach an outline of the framework is
defined, determining however not enumerating any first-level subsystems.

The procedure includes the distinguishing proof of various substance sorts and the meaning
of each of the element's characteristics. Top-down methodologies stretch an underlying
spotlight on learning of larger amount builds, for example, ID of populaces and
accumulations of things and element sorts, participation guidelines, and connections between
such populaces. On the off chance that you have a major issue to tackle, this technique is
extremely compelling. Top down outline is a choice to make new parts inside gathering. All
things considered, imperatives are the current geometry components from different parts
inside get together: lines, planes, surfaces, focuses, vertices.

The primary preferred standpoint of the best down approach is the representation of the
framework which can be utilized for discourses with the client and for advance following

How about we think about preferences of best down approach:-

• The association understands an engaged utilization of assets from the individual


oversaw application.

• The main usage turns into a feature for the character administration arrangement.

• When the stages are finished for the overseen application, you have actualized a more
profound more develop execution of the character administration arrangement.

• Operation and upkeep assets are not at first affected as seriously as with the base up
approach.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 15

Inconveniences of best down approach:-

• The arrangement gives restricted scope in the principal stages.

• A insignificant level of client accounts is overseen in the principal stages.

• You may need to create custom connectors at a beginning period.

• The support and general business won't understand the advantage of the arrangement
as quickly.

• The execution cost is probably going to be higher

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 16

Base up plan strategy


The base up approach starts with the particular points of interest and climbs to the general. To
start a base up plan, the framework expert will investigate every one of the interfaces that the
framework has, checking reports, screens, and structures. The expert will work in reverse
through the framework to figure out what information ought to be put away in the database.
Base up approaches see database configuration as continuing from an underlying
investigation of lower-level theoretical units, for example, characteristics and useful
conditions, and after that moving towards a worthy consistent information show through
intelligent groupings of related properties. Base up configuration is the favored strategy for
beforehand developed, off-the-rack parts, or standard segments like equipment, pulleys,
engines, and so on. These parts don't change their shape and size in light of your outline
unless you pick an alternate segment. In this approach the individual base components of the
framework are first determined in incredible detail. These components are then connected
together to frame bigger subsystems, which at that point thusly are connected, now and again
in many levels, until the point that a total best level framework is shaped.

With base up plan, a structure graph is important to decide the request of execution, and the
improvement of drivers is important to finish the base up approach

Preferences of Bottom-up Approach: -

• User and business consciousness of the item. Advantages are acknowledged in the
early stages.

• You can supplant numerous manual procedures with early mechanization.

• You can actualize watchword administration for an expansive number of clients.

• You don't need to create custom connectors in the early stages.

• Your association expands personality administration aptitudes and comprehension


amid the principal stage.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 17

• Tivoli Identity Manager is acquainted with your business with less interruption to
your operations.

Impediments of Top-down Approach: -

• The hierarchical structure you build up might need to be changed in a later take off
stage.

• Because of the prompt changes to store proprietors and the client populace, the
takeoff will have a higher effect prior and require more noteworthy participation.

• This system is driven by the current foundation rather than the business forms.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 18

Task 2

2.1

2.2

Assumption
A Student is referred by only Course Section and Professor in University.

All the different types of Courses were recorded in a single profile per a student

Each time the register enters the details of a new student

A student will receive only the report once he finishes the exam

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 19

2: 3
When all is said in done every substance will be changed over specifically into the
connection. The credited of the substance turn into the properties of the connection. The
identifier of the element turns into the key of the social outline. Connections will be mapped
as 'outside keys' of the element

Doctor (doctor No, name, address, phone Number, qualifications, fees per call, specialization
….)

Patient (patient Number, name, age, sex, address, city, referred Doctor, department)

Operation (operation Number, patient Number , date of Admission, date of Operation, name
of Doctor, operation Theater Number , type of Operation … )

Discharge (Discharge Number, patient Number, test Charges, operation Charges,

Doctor (Charges, balance Charges, treatment given, treatment Advice, payment Made, mode
of payment…)

paperwork(Balance charges , Test charges , Operation charges , Blood charges , Doctors


‘charges , Patient number , Treatment given , Treatment advice , Payment made , Mode of
payment, Date of discharge... )

Room (room type, status, room number... )

Treatment (Innu, treatment, treatment advice ...)

Department (name, location, facilities...)

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 20

Task 3

Dave Carlson (2015) clarifies that,


"A database inquiry is a bit of code (a question) that is sent to a database keeping in mind the
end goal to get data once more from the database. It is utilized as the method for retrieving
the data from database."

In the above framework the connections and custom outlines which will be helpful in day by
day operations can be actualize utilizing question instruments. The structure of SQL inquiry
is simpler to catch than numerous other database question dialects in the business. SQL can
be utilized with a few free and open source database frameworks

How about we consider session the benefits of SQL questions:-

SQL inquiries can be utilized to recover a lot of records from a database rapidly and
proficiently.

SQL databases utilize since a long time ago settled standard, which is being received
by ANSI and ISO. Non-SQL databases don't hold fast to any reasonable standard.

Databases enable you to interface diverse wellsprings of data together so you can see
imperative things about your business you may never have taken note.

Using standard SQL it is less demanding to oversee database frameworks without


writing significant measure of code.

SQL for the most part comprises of English explanations and it is anything but
difficult to learn and comprehend a SQL inquiry.

QL can do both the employments of being a programming and an intelligent dialect in


the meantime.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 21

SQL is utilized to make databases, oversee security of a database. It can likewise be


utilized for refreshing, recovering and offering information to clients.

SQL is the database dialect which is utilized by organizations and undertakings all
through the globe.

Utilizing remote key devices there are 6 sorts of connections can be actualized.

• One-to-one non-recognizing relationship

• One-to-numerous non-recognizing relationship

• One-to-one recognizing relationship

• One-to-many recognizing relationship

• Many-to-many recognizing relationship

• Place a Relationship Using Existing Columns

Likewise somebody can choose numerous connections by holding down the CONTROL key
as you click an association. This can be helpful for featuring particular connections on an
EER chart.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 22

While making an information display set of exercises can be found on the


workbench wizard.

EER Diagrams

Physical Schemata

Schema Privileges

SQL Scripts

Model Notes

MySQL Workbench gives DBAs and designers and incorporated devices


condition for: -

Database Design and Modeling

SQL Development

Database Administration

Database Migration

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 23

3.3
Inquiry programming apparatuses used to build up and execute inquiries from the regular
database administration systems (DBMS). We can utilize the accompanying apparatuses to
access and change information in occasions of SQL Server.

SQL Server Management Studio

sulcmd utility

bcp utility

sqlps utility

Inquiry plan by utilizing database particular question dialects, for example, SQL or OQL
ends up being awkward or even outlandish when end-clients need to posture inquiries to
expansive database plans. This is because of the challenges which emerge out of the wrong or
outlandish understandings of capacity models and the absence of instruments to implant
application space semantics inside inquiry dialects.

Utilizing inquiry instruments the proficient of the database question process can be upgrade.
Database question apparatuses permits to oversee scope of information in a database and
gives broad offices to working specifically with SQL code. Before working specifically with
a live server, an association must be made. After an association is built up, it is conceivable to
execute SQL code specifically on the server and control the server utilizing SQL code.

Information is important in the event that we have some approach to follow up on it. Else, we
are negligible observers. This is a standout amongst the most tricky parts of the present
fixation of information representation, which seems to regard information as a certain
legitimization for itself, instead of as an intermediary for things that we really need to
comprehend or test.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 24

Significant, information should first be:-

• Available

Accessibility starts with great plan, It implies keeping frameworks up and recoverable, and
upgrading forms like information extraction and change

• Accurate

To be precise, total portrayal of information.

• Actionable

Information dependably recounts a story. In any case, the story needs to go someplace.
Important information drives activity to comprehend its customer's objectives and power
significant decisions.

• There are three sorts of information extractions that the MDE can create:

• �Snapshot inquiry: Resource property (metadata) extraction for a set point in time

• �Raw time arrangement inquiry: Raw information extraction between a begin and
end time

• �Aggregated time arrangement question: Aggregated information extraction between


a begin and end time

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 25

3.1 Provide reasonable experiments and tests intend to test the database.

A put away strategy is a gathering of Transact-SQL proclamations accumulated into a


solitary execution design.

SQL Server put away methods return information in four ways:

Output parameters, which can return either information, (for example, a whole
number or character esteem) or a cursor variable (cursors are result sets that can be recovered
one column at once).

Return codes, which are dependably a whole number esteem.

A result set for each SELECT articulation contained in the put away method or some
other put away techniques called by the put away strategy.

A worldwide cursor that can be referenced outside the put away method.

Normally you approve by running a type of test on the information.

There are distinctive layers through which information passes and there are diverse sorts of
tests.

In the event that you consider the accompanying framework layers:-

User interface/customer layer

Application layer

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 26

Database layer

You can do information approval at any of these layers, with following


contrasts

Validation in the database layer is favored in light of the fact that you can have
diverse applications associating with a similar database and keeping in mind that this is
something to be thankful for, the approval in those applications isn't really the same, and
consequently approval that is actualized on the database layer is better as far as information
trustworthiness

at a similar time approval in the database layer ought to be speediest in light of the
fact that the database layer is nearest to the (information does not have to go through different
layers to be handled, for this situation approved)

the special case is if the approval manage is static and does not rely upon other
information from the database (for instance testing if the info is an even positive number), at
that point the customer can approve the information before the database and maintain a
strategic distance from superfluously entrusting application layer or potentially database
layer. (in the meantime you need to actualize approval at the database layer likewise, just on
the off chance that there is a bug or different applications will interface with the database).
same rule applies to application layer - if there is an approval that application layer can
perform without hitting the database server it ought to do it, however the same ought to be
done (ensured) in the database layer.

You can view following as approval tests (approval sorts):-

Type approval (illustrations: is the information that is embedded a whole number?).


This can be checked at database layer by announcing legitimate sort on the section.)

Domain approval (illustration: is the information a positive whole number?). This can
be checked at the database layer utilizing CHECK requirement

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 27

Relationship approval (case: for the record you are including is there as of now a
record in another table). This can be checked at the database layer by appropriate utilization
of FOREIGN KEYS

business rules approval (these can be intricate, for instance 'if the esteem you are
attempting to record is > 100 at that point ensure that you can record IP of the client,
generally wipe out exchange; if not don't trouble'.) these sort of approvals should be possible
through triggers and put away systems. in certifiable business rules approval are frequently
executed at the application layer (for different reasons - from relative non-viability and non-
versatility of PL/SQL, which is normally the dialect you should compose triggers in, to the
way that actualizing muddled triggers can decrease execution lastly make the framework
exceptionally intricate)

MySQL Fabric is worked around an extensible and open source system for overseeing
ranches of MySQL Servers. MySQL Workbench is a graphical apparatus for working with
MySQL Servers and databases. MySQL Workbench completely bolsters MySQL Server
variants 5.1 or more. It is good with MySQL Server 5.0, however only one out of every odd
component of 5.0 might be bolstered. It doesn't bolster MySQL Server adaptations 4.x.

Fundamental themes which are secured by My SQL Workbench: -

SQL Development : MySQL Workbench gives the capacity to execute SQL


questions on the database associations utilizing the inherent SQL Editor.

Data Modeling : The Table Editor gives offices to altering Tables, Columns,
Indexes, Triggers, Partitioning, Options, Inserts and Privileges, Routines and Views.

Server Administration: MySQL server examples by regulating clients, performing


reinforcement and recuperation, reviewing review information, seeing database wellbeing,
and observing the MySQL server execution.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 28

Data Migration : MySQL server occasions by controlling clients, performing


reinforcement and recuperation, assessing review information, seeing database wellbeing, and
checking the MySQL server execution.

MySQL Enterprise Support: Support for Enterprise items. (Ex: MySQL Enterprise
Backup, MySQL Audit)

MySQL presented another Migration Wizard module as a major aspect of MySQL


Workbench 5.2.41. The Migration Wizard enables you to effortlessly and rapidly relocate
databases from Microsoft SQL Server, PostgreSQL, Sybase ASE, and most ODBC-fit
RDBMSs to MySQL.

Planning a Microsoft® SQL Server™ application for ideal execution can appear an
overwhelming test. Devices, for example, dialect compilers or mediators, debuggers, and run-
time sending stages regularly limit the advancement show decisions. One of the capacities of
SQL is its capacity to channel information at the server with the goal that exclusive the base
information required is come back to the customer.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 29

Task 4

Security Policies

Security notice extend from expecting reinforcements to be done frequently and put away
off-site. Since which incorporate guaranteeing that unapproved access to delicate
information.

Eg, for example, representative compensations,

System Security Policy.

Security agenda.

Data Security Policy.

User Security Policy.

Password Management strategy.

Framework Security Policy

Security strategy, and contains these points:

Database User Management

Operating System Security.

User Authentication.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 30

Every database has at least one heads who are in charge of keeping up the security
arrangement: the security chairmen, if the database framework is huge, at that point a unique
individual or gathering of individuals may have duties constrained to those of a security
overseer..

Database User Management

Number of executives with freedom to oversee database client’s regardless, just trusted
people ought to have the intense freedom to direct database clients.

Client Authentication

Database clients can be checked by utilizing database passwords, the host working
framework. To be checked utilizing system validation administrations or SSL requires.

Working System Security

Database overseers must have the working framework freedom to make and erase
documents.

Typical database clients ought not have the working framework freedom to make or
erase documents identified with the database.

If the working framework recognizes database parts for clients, at that point the
security managers must have the working framework freedom to alter the security area of
working framework accounts.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 31

Information Security Policy

Information security incorporates the systems that control the entrance to and utilization of
the database .information security strategy figures out which clients approach a particular
mapping object, and the particular sorts of activities took into consideration every client on
the protest.

Principally, the levels of security you need to build up for the information in your database
decides your information security arrangement concede get to freedom for their articles to
some other client of the framework.

General information security ought to be founded on the affectability of information. On the


off chance that data isn't touchy, at that point the information security approach can be more
careless. Be that as it may, if information is delicate, at that point a security strategy ought to
be created to keep up tight control over access to objects.

Perspectives can likewise execute information security in light of the fact that their definition
can limit access to table information. They can bar segments containing delicate information.

Client Security Policy


Client security arrangement, and contains the accompanying points:

General User Security.

Application Developer Security.

End User Security.

Administrator Security.

Application Administrator security.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 32

General User Security

• Password Security.

• Privilege Management

Secret word Security

In the event that client confirmation is overseen by the database, at that point security
managers ought to build up a secret word security strategy to keep up database get to
security. For instance, database clients ought to be required to change their passwords at
general interims, and obviously, when their passwords are uncovered to others. By driving a
client to alter passwords in such circumstances, unapproved database access can be lessened.

Passwords are utilizing the AES (Advanced Encryption Standard) calculation, before sending
them over the system.

Benefit Management

Security directors ought to consider issues identified with benefit administration for a wide
range of clients. For instance, in a database with numerous client names, it might be
advantageous to utilize parts (named gatherings of related freedom that you give to clients or
different parts) to deal with the freedom accessible to clients. Then again, in a database with a
modest bunch of client names, it might be simpler to give freedom unequivocally to clients
and maintain a strategic distance from the utilization of parts.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 33

End-User Security
Security directors must characterize an approach for end-client security. On the off chance
that a database has numerous clients, at that point the security overseer can choose which
gatherings of clients can be ordered into client gatherings, and after that make client parts for
these gatherings. At that point security head can concede the important freedom.

Overseer Security
Security overseers ought to likewise have an arrangement tending to database executive
security. For instance, when the database is vast and there are a few sorts of database heads,
the security executive may choose to bunch related regulatory freedom into a few managerial
parts. The regulatory parts would then be able to be allowed to suitable chairman clients. On
the other hand, when the database is little and has just a couple of managers, it might be more
advantageous to make one regulatory part and concede it to all overseers.

Application Developer Security


Security executives must characterize an extraordinary security approach for the application
designers utilizing a database. A security executive could allow the freedom to make essential
articles to application engineers. On the other hand, the freedom to make articles could be
allowed just to a database overseer, who at that point gets demands for question creation from
engineers.

Application Administrator Security

In extensive database frameworks with numerous database applications, An application


manager is in charge of the accompanying sorts of errands:

Creating parts for an application and dealing with the freedom of every application
part

Creating and dealing with the items utilized by a database application

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 34

Secret word Management Policy

Database security frameworks that are subject to passwords require that passwords be kept
mystery consistently. Since passwords are powerless against robbery, imitation, and abuse,
Oracle Database utilizes a watchword administration arrangement. DBAs and security
officers control this approach through client profiles, empowering more prominent control
over database security.

Account Locking

Password History.

Password Complexity

Password alters.

Record Locking

At the point when a specific client surpasses an assigned number of fizzled login endeavors

Secret key change

Utilize the CREATE PROFILE proclamation to determine a most extreme lifetime for
passwords.

Secret key History

The accompanying two parameters control client capacity to reuse an old secret key:

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 35

Secret key Complexity

Prophet test secret key multifaceted nature check routine can be indicated utilizing a SQL
content which sets the default profile parameters.

The secret word unpredictability check routine guarantees that the watchword meets the
accompanying prerequisites:

Is no less than four characters in length

Differs from the client name

Has no less than one alpha, one numeric, and one accentuation stamp character

Is not straightforward or self-evident, for example, welcome, record, database, or


client

Differs from the past secret word by no less than 3 characters

A DBA with ALTER ANY USER benefit can adjust any client secret key without providing
the old one.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 36

Conclusion
I have clearly explained the entire task that I have given to me and I have given some
knowledge about the Data Analysis and Design which I have learnt

Here I have explained about database and shown ER Diagram for the scenario and also
described query tools with some instructions. So I think this assignment will give clear view,
image about this system and how databases are used.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 37

Gant Chart

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 38

References

Margaret Rouse. (2005-2015). data modeling. Available:-


http://searchdatamanagement.techtarget.com/definition/data-modeling. Last accessed 12th
January 2015 at 5.25A.M.

Tutorials point. (2014). DBMS Data Models. Available:-


http://www.tutorialspoint.com/dbms/dbms_data_models.htm. Last accessed 12th January
2015 at 5.35A.M.

Learn DataModeling.com. (). Why to build or create a data model?. Available:-


http://www.learndatamodeling.com/dm_overview2.php. Last accessed 12th January 2015 at
6.10A.M

CA. (2011). Benefits of Data Modeling. Available:-


http://support.ca.com/cadocs/0/CA%20ERwin%20Data%20Modeler%20r8-
ENU/Bookshelf_Files/HTML/Methods/index.htm?toc.htm?254455.html. Last accessed 12th
January 2015 at 6.20A.M.

Tutorials point. (2014). Relational Data Model. Available:-


http://www.tutorialspoint.com/dbms/relational_data_model.htm. Last accessed 13th January
2015 at 6.25A.M.

Teach -ICT.com. (). Advantage of Relational Data Base Available:- http://www.teach-


ict.com/as_as_computing/ocr/H447/F453/3_3_9/database_design/miniweb/pg8.htm. Last
accessed 13th January 2015 at 6.45A.M.

Eskimo. (). Advantages & Dis advantages of Logical Data Modeling? Available:-
https://answers.yahoo.com/question/index?qid=20090524074401AAsqig7. Last accessed
17th January 2015 at 8.00P.M.

Deborah Lee Soltesz. (1999-2015). What are the Advantages of a Relational Database
Model?. Available:- http://www.ehow.com/list_6328507_advantages-relational-database-
model_.html. Last accessed 17th January 2015 at 8.30P.M.

Azhar. (). What are the advantages and disadvantages of using relational models in a
database?. Available: -
https://answers.yahoo.com/question/index?qid=20091005032104AAFwMmT. Last accessed
18th January 2015 at 6.30A.M.

Sophie Johnson. (2015). What Are the Advantages & Disadvantages of Hierarchical
Structure?. Available:- http://smallbusiness.chron.com/advantages-disadvantages-
hierarchical-structure-66002.html. Last accessed 18th January 2015 at 7.09A.M.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 39

Burleson Consulting. (1996-2014). the Hierarchical Data base Model. Available:-


http://www.dba-oracle.com/t_object_hierarchical_database.htm. Last accessed 18th January
2015 at 9.05.M.

Audra Bianca. (2015) . Pros & Cons of a Hierarchical Organizational Structure Available:-
http://smallbusiness.chron.com/pros-cons-hierarchical-organizational-structure-24276.html.
Last accessed 18th January 2015 at 9.10A.M.

Dinesh Thakur . (). Network Model Available:-


http://ecomputernotes.com/fundamental/what-is-a-database/network-model. Last accessed
18th January 2015 at 11.40A.M.

Dinesh Thakur. (). What is ER-Model? Advantages and Disadvantages of E-R Model
Available:- http://ecomputernotes.com/fundamental/what-is-a-database/advantages-and-
disadvantages-of-e-r-model. Last accessed 18th January 2015 at 12.05P.M.

Dan Power . (1995-2014). What are advantages and disadvantages of data warehouses?.
Available:- http://dssresources.com/faq/index.php?action=artikel&id=180. Last accessed 20th
January 2015 at 6.30P.M.

WhamTech. (2014). Advantages and disadvantages of data warehouses. Available:-


http://www.whamtech.com/adv_disadv_dw.htm. Last accessed 20th January 2015 at
7.00P.M.

Exforsys . (2006). Advantages and Disadvantages to Using a Data Warehouse. Available:-


http://www.exforsys.com/tutorials/data-warehousing/advantages-and-disadvantages-to-using-
a-data-warehouse.html. Last accessed 20th January 2015 at 7.20P.M.

Dinesh Thakur . (). What is Data Warehouse? Benefits & Problems of Data Warehousing
Available:- http://ecomputernotes.com/database-system/adv-database/data-warehouse. Last
accessed 20th January 2015 at 7.25P.M.

Admin (2013). Advantages and disadvantages of distributed database Available: -


http://www.moreprocess.com/sql/advantages-and-disadvantages-of-distributed-database. Last
accessed 20th January 2015 at 11.15P.M.

Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )

Vous aimerez peut-être aussi