You are on page 1of 17

Identify Physical Database

Requirements
Level III

Prepared by Moges Tesfaye(MSc in ICT)


Learning Outcomes and Assessment Criteria
Unit of Competence : Identify Physical Database Requirements
EIS DBA3 M05 0517 Identifying Physical Database
Module Title
Requirements
LO 1  Identify database scope
Assessment Criteria  Requirements of the user and current system
architecture are reviewed
 Database size is determined from requirements
and technical specifications
 Database and scope of project are documented
 Several database management systems are
evaluated against requirements and make
appropriate selection

LO 2  Identify database requirements


Assessment Criteria  Technical specifications are reviewed for the database
 Database tables and relationships are identified
 Database data dictionary, table attributes and keys are
identified
 Database reports are developed based on acceptance
criteria and requirements

LO 3  Seek client feedback and approval


Assessment Criteria  System security plan is reviewed
 Chosen database management system and user
security required for the database clarified and
confirmed to ensure database security is aligned to
security system plan
 Database performance, recovery and audit trail
needs are identified, evaluated and recorded

LO 4 Identify security requirements


Assessment Criteria  Database scope and technical requirements are
presented to user for feedback
 User feedback are reviewed and database adjusted
as required
 Database and documentation are presented to user
for final approval
Training Mechanics

The Outcome-Based Training is one form of an independent learning approach. This


approach enables trainees to be master of their own environment and in charge of their
learning. It is also characterized by the integration of theory and application as two
dimensions of an effective learning process. The outcome-based system is consists of a
combination of lecture-discussion, individualized learning activities, mentoring, field
immersion and feedback.

In this competence the trainees will be given individual learning guide to go through and
accomplish. They will be instructed through this learning guide to accomplish learning activities as
part of the mechanism to transfer learning from the training situation to the job situation. For this
competence area, trainees will formulate a specific learning plan as a guide for applying their
learning to work setting and for their own continuing self-development. At this point, your role as
a trainer/facilitator is to guide the trainee in preparing and accomplishing their plan.

Lecture and discussion of the topics outlined in the session plan should be performed first before
the trainees are instructed to go to the workshop. You are also required to demonstrate the correct
steps/procedures and techniques to your trainees before you let them practice. Insure that they are
practicing safely.

Most part of the training activities will be conducted in the workshop for better development of
specific skills. Aside from motivating them to relate concepts and skills to their own work
situations, make sure to provide the necessary opportunity for competence practice and better
internalization of such concepts and techniques. The trainees should also be provided the
opportunity to blend with the actual working unit in the industry.

In this system, it is important to develop a sustained relationship with the trainees through a
continued involvement, where you are to offer support, guidance and assistance as the trainee go
through the learning activities and actual work.

With the mentoring approach, the trainees are grouped in learning teams with one facilitator-mentor
per team. Before learning session or workshop start in the morning, each team and mentor meets to
give feedback regarding their work, or how the group improves, acquire set of skills for the
members to become more effective trainees. You are also to asses them at the end of each module.
However, they have to be ready before the assessment and it should be them to request for it.

Before the training start you should conduct an orientation session to brief the trainees on how the
training will proceed.

Session Plans
Session Plan1 (EIS DBA3 02 0811)

Unit of Competency : Identify Physical Database Requirements

Module Title : Identifying Physical Database Requirements


LO 1 : Identify key information sources
Session Objectives: At the end of this session the learners shall be able to –

 Review requirements of the user


 Determin database size
 Document database and scope of project

Nominal
Activities 9hour Methods
Duration
Sessions 10 mins Recapitulation Question & Answer

3hr System architecture Lecture-discussion

Reviewing requirements of the Lecture-discussion


1:30hr user

2hr Determining database size Lecture-discussion

1hr Documenting database and scope Lecture-discussion


of project
Evaluation 1 hr Accomplishment of writeenTest Individual Activity
Discussion of writeen
Summary 20 mins Wrap-up and Feedback
Test Answers
Resources  Job specifications
 Safety manual and guide
 Reference Books
 Journals/publications/magazines
SET BY: Moges Tesfaye--------------------------
Signature ------------- Approved by-------------------------------

Signature ------------------------
Writeen test

Self – Check 1 Written Test

Name:____________________
Date:_________________
Instruction: Answer all the questions listed below, if you have some
clarifications- feel free to ask your teacher.

1. A person who takes overall responsibility for data, metadata, and the policies about data use is
the __
A. Data administrator
    B. Database administrator
    C. Database steward
    D. Both A and B.
2. The _________ has a more hands-on, physical involvement with the database than the
_________

    A. Data administrator; Database administrator


    B. Database administrator; Data administrator
    C. Database steward; Database administrator
    D. None of the above
3. Before- and after-images of records that have been modified by transactions are in a ____.
    A. database change log
    B. transaction log
    C. checkpoint
    D. journalizing facility
4. Which is NOT one of the basic facilities for backup and recovery of a database?
    A. Checkpoint facility
    B. Recovery Manager
    C. Biometric Device
    D. Journalizing facilities.
5. Which of the following is the goal of database security?
    A. To protect primarily against accidental or intentional loss of data
    B. To protect against misuse of data
    C. To protect against destruction of data
    D. All of the above
SET BY: Moges Tesfaye--------------------------
Signature ------------- Approved by-------------------------------

Signature ------------------------
DATABASE ADMINISTRATION SERVICES
Level III
Unit of Competence : Identify Physical Database
Requirements
Module Title Identifying Physical Database
Requirements
LO 1: Identify database scope
LO1. Identify database scope
- Scope is the range of one's perceptions, thoughts, or actions
A good database is one that is simple to understand and well planned.
One can use ERDs (Entity-Relationship Diagrams) or EERDs (Enhanced-Entity Relationship
Diagrams) in order to make a good database.
The Scope of Good Database Design:
- Easy to locate the data.
- No redundant data (No repeated).
- More security.
- Table references (keys like: Primary and foreign keys) are easy to maintain.
1.1 Reviewing system architecture and user requirements
A.1.1 Operating system
Operating System is a set of programs that manages computer hardware and various resources
installed on it.
You have to check the operating system loaded on your the machine whether it is compatible with
the DBMS software you want to install or not.
A.1.2 DBMS software
A database management system is the general purpose software that:
. Enables users to define, create, and maintain the database
. Provides controlled access to the database.
. Interacts with the users, application programs, and the database itself.
. Allows users to insert values, retrieve it when needed, update/modify it when necessary,
and delete it if not required from the database.
 Each database application has its own specific strength and weakness.
 Some of the common database applications include:
- Microsoft Access - Microsoft SQL
- Oracle and Informix. - MySQL
A.1.3 Configuration : small and large memory model
A memory of large size and processor with high speed of data processing might be
required to run the DBMS software.
1.2 Determining Database size and technical specifications
Database Size means the amount of data to be stored in the designed system.
- You can specify sizes for data and log file in the definition of a database.
- File Growth: You can specify whether a file will grow in size in the future if necessary.
Example: - Specifying memory size during database Creation
When you design a database, you may have to estimate how large the database will be when filled
with data. Estimating the size of the database can help you determine the hardware configuration you will
require to do the following:
 Achieve the performance required by your applications.
 Guarantee the appropriate physical amount of disk space required to store the data and
indexes.
Estimating the size of a database can also help you determine whether the database design needs
refining.
Session Plan2 (EIS DBA3 02 0811)

Unit of Competency : Identify Physical Database Requirements

Module Title : Identifying Physical Database Requirements


LO 2 : Identify database requirements
Session Objectives: At the end of this session the learners shall be able to –

 Review technical specifications of database


 Identify database tables and relationships
 Identify data dictionary
 Develop database reports

Nominal
Activities 9hour Methods
Duration
Sessions 10 mins Recapitulation Question & Answer

3hr Reviewing technical specifications Lecture-discussion


of database
Identifying database tables and Lecture-discussion
1:30hr
relationships
2hr Identifying Database Lecture-discussion

Developing database reports


1hr based on acceptance criteria and Lecture-discussion
requirements
Evaluation 1 hr Accomplishment of writeenTest Individual Activity
Discussion of writeen
Summary 20 mins Wrap-up and Feedback
Test Answers
Resources  Job specifications
 Safety manual and guide
 Reference Books
 Journals/publications/magazines
SET BY: Moges Tesfaye--------------------------
Signature ------------- Approved by-------------------------------

Signature ------------------------
Writeen test

Self – Check 2 Written Test

Name:____________________
Date:_________________
Instruction: Answer all the questions listed below, if you have some
clarifications- feel free to ask your teacher.

Question 1

Describe about table relationship

Question 2

What is data dictionary?

Question 3

List and describe types of attribute

SET BY: Moges Tesfaye--------------------------


Signature ------------- Approved by-------------------------------

Signature ------------------------
LO2. Identify database requirements
2.1. Reviewing Technical specifications
Technical specifications are typically written by computer department staff that answers
specification questions such as: - What are the hardware and software requirements to run this
system?
(Be sure to specify a minimum of disk space to store the data)
- “What is the compatible operating system for the selected DBMS?"
- "How many tables are included in the database and how are they related?"
- describe the file structure for each table.
2.2. Identifying database tables and relationships
What is entity in a database?
 An Entity is a thing in real-world (an object with a physical existence or an object with a
conceptual existence).
- person/employee, car, book, house, employee, etc are example of objects with physical
existence
- A project, course, payment, department, etc are examples of objects with object with a
conceptual existence.
- Entity can be roles, events, tangible things or concepts.
* Each entity must have its own identity that distinguishes it from every other entity, called
unique identifier.
Example: Each Student has a unique ID that distinguishes one from others.
Generally in database terms, an entity is a table which is responsible for storing records
in the database.
In E-R Diagram, an entity is represented by a rectangle. Example:

Other terms related to Entity include:


. Entity type
. Entity set
. Entity instance
Entity type is a collection of entities that share common properties or characteristics.
Example: - Student is an entity type to all students.
In E-R Diagram, an entity type is represented by a rectangle, and the name is indicated in capital
letters.
Example:
DEPARTMENT EMPLOYEE

Entity set is a set of entities (collection of Entities/instances) of the same type.


Example: - a company have many employees, and these employees are defined as entities
(e1,e2,e3....) and all
these entities having same attributes are defined under ENTITY TYPE employee.
I.e. Entity set is also called Entity Extension.
 Entity Instance is a single occurrence of a particular entity type. An entity type is described
just one time in the
data model, but many instances of that entity type may be represented by data
stored in the database.
Session Plan3 (EIS DBA3 02 0811)

Unit of Competency : Identify Physical Database Requirements

Module Title : Identifying Physical Database Requirements


LO 3 : Identify security requirements
Session Objectives: At the end of this session the learners shall be able to –

 Review system security plan


 Choose database management system
 identify, evaluat and record Database performance,
recovery and audit trail

Nominal
Activities 6hour Methods
Duration
Sessions 10 mins Recapitulation Question & Answer

1hr Reviewing system security plan Lecture-discussion

Choosing database management Lecture-discussion


1:30hr
system
identifying, evaluating and
2hr recording Database performance, Lecture-discussion
recovery and audit trail
Evaluation 1 hr Accomplishment of writeenTest Individual Activity
Discussion of writeen
Summary 20 mins Wrap-up and Feedback
Test Answers
Resources  Job specifications
 Safety manual and guide
 Reference Books
 Journals/publications/magazines
SET BY: Moges Tesfaye--------------------------
Signature ------------- Approved by-------------------------------

Signature ------------------------
Writeen test

Self – Check 3 Written Test

Name:____________________
Date:_________________
Instruction: Answer all the questions listed below, if you have some
clarifications- feel free to ask your teacher.

Question 1

What are system security?

SET BY: Moges Tesfaye--------------------------


Signature ------------- Approved by-------------------------------

Signature ------------------------
LO3. Identify security requirements
3.1 Reviewing system security
Reviewing system security includes:
- Application System security
- Computer System security
- Network system security
- DBMS security
- Financial and business system security
System security means Control of access to a computer system's resources, specially its data and operating
system files.
- It covers access and use of the database at the system level, such as a username and password.
- Application System security
Application system security is the use of software, hardware, and procedural (technical) methods to
protect applications from external threats.
- The most basic software to ensure application security is application firewall that limits the
execution of files or
the handling of data by specific installed programs.
- Computer System security
The term computer system security refers to the collective processes and mechanisms by which sensitive
and valuable information and services are protected from publication ( unauthorized activities), tampering
(corrupting) or collapse.
- Network system security
Network security is a specialized field in computer networking that involves securing a computer
network infrastructure.
Network security is typically handled by a network administrator or system administrator who
implements the security policy, network software and hardware needed to protect a network and the
resources accessed through the network from unauthorized access and also ensure that employees
have adequate access to the network and resources to work.
- DBMS
Database Security means protection of the: - data from malicious attempts to steal (view) or
modify data.
- Database from unauthorized users.
3.2 Clarifying and confirming DBMS and user security
Security within the DBMS protects the integrity of the data, records and databases. It can provide
encryption protection at the data level.
Database Security means protection of the: - data from malicious attempts to steal (view) or
modify data.
- Database from unauthorized users.
Session Plan4(EIS DBA3 02 0811)

Unit of Competency : Identify Physical Database Requirements

Module Title : Identifying Physical Database Requirements


LO 4 Seek client feedback and approval
Session Objectives: At the end of this session the learners shall be able to –

 Present database scope and technical requirements


 Review user feedback to adjust database
 present Database and documentation

Nominal
Activities 6hour Methods
Duration
Sessions 10 mins Recapitulation Question & Answer

1hr Presenting database scope and Lecture-discussion


technical requirements
Reviewing user feedback to Lecture-discussion
1:30hr
adjust database

2hr presenting Database and Lecture-discussion


documentation
Evaluation 1 hr Accomplishment of writeenTest Individual Activity
Discussion of writeen
Summary 20 mins Wrap-up and Feedback
Test Answers
Resources  Job specifications
 Safety manual and guide
 Reference Books
 Journals/publications/magazines
SET BY: Moges Tesfaye--------------------------
Signature ------------- Approved by-------------------------------

Signature ------------------------
Writeen test

Self – Check 4 Written Test

Name:____________________
Date:_________________
Instruction: Answer all the questions listed below, if you have some
clarifications- feel free to ask your teacher.

Question 1

What is database feedback?

SET BY: Moges Tesfaye--------------------------


Signature ------------- Approved by-------------------------------

Signature ------------------------
LO 4: Submit analysis and gain
agreements
Information Sheet 4 Gain Concensus(agreement)

Once you have gathered information through interviews, workshops etc. you
need to report these findings in a clear, concise and systematic fashion. The
purpose of the report is to gain agreement from the client on the objectives of
the proposed system.

In this resource we will discuss:

 Report Findings
 Summary

Report Findings

The contents and degree of detail for a Requirements Report will vary depending on
the size and scope of a project, but a Requirements Report is generally an informal
document that can be easily understood by the customer.  The report may contain
only business requirements or it may extend to technical requirements and a
feasibility study. Your organisation will often provide a template for requirements
documentation.

The purpose of the Requirements Report is to communicate and confirm the


requirements. The next section describes the purpose of the different sections of the
report.

The Requirements Report

There are many templates available for writing a Requirements Report. This section
looks at one possible report layout.

The following headings may be used in a requirements report:

 Introduction
 System description
 Functional requirements
 Non-functional requirements
 Information domain
 Project costs
 Benefits
 Other project specific topics

You might also like