Professional Documents
Culture Documents
DESIGN A DATABASE
ASSESSMENT
This material is developed by Enhance
Your Future Pty Ltd for Australian Institute of Science and Technology (AIST)
All of your assessment and training is provided as a positive learning tool. Your assessor will guide
your learning and provide feedback on your responses to the assessment materials until you have
been deemed competent in this unit.
The process we follow is known as competency-based assessment. This means that evidence of your
current skills and knowledge will be measured against national standards of best practice, not
against the learning you have undertaken either recently or in the past. Some of the assessment will
be concerned with how you apply your skills and knowledge in the workplace, and some in the
training room as required by each unit.
The assessment tasks have been designed to enable you to demonstrate the requirements of the
performance criteria and knowledge in this unit to successfully demonstrate competency at the
required standard.
Your assessor will ensure that you are ready for assessment and will explain the assessment process.
Your assessment tasks will outline the evidence to be collected and how it will be collected, for
example; a written activity, case study, or demonstration and observation.
The assessor will also have determined if you have any special needs to be considered during
assessment. Changes can be made to the way assessment is undertaken to account for special needs
and this is called making Reasonable Adjustment.
What happens if your result is ‘Not Yet Competent’ for one or more assessment tasks?
In the case that one or more of your assessments has been marked ‘NYC’, your trainer will provide
you with the necessary feedback and guidance, in order for you to resubmit your responses.
You can appeal against a decision made in regards to your assessment. An appeal should only be
made if you have been assessed as ‘Not Yet Competent’ against a specific unit and you feel you have
sufficient grounds to believe that you are entitled to be assessed as competent. You must be able to
adequately demonstrate that you have the skills and experience to be able to meet the requirements
of units you are appealing the assessment of.
Your trainer will outline the appeals process, which is available to the learner. You can request a
form to make an appeal and submit it to your trainer, the course coordinator, or the administration
officer. The RTO will examine the appeal and you will be advised of the outcome within 14 days. Any
additional information you wish to provide may be attached to the appeal form.
If you believe you already have the knowledge and skills to be able to demonstrate competence in
this unit, speak with your trainer, as you may be able to apply for Recognition of Prior Learning (RPL).
Assessor Responsibilities
Assessors need to be aware of their responsibilities and carry them out appropriately. To do this
they need to:
Ensure that participants are assessed fairly based on the outcome of the language,
literacy and numeracy review completed at enrolment.
Ensure that all documentation is signed by the learner, trainer, workplace supervisor and
assessor when units and certificates are complete, to ensure that there is no follow-up
required from an administration perspective.
Ensure that their own qualifications are current.
When required, request the manager or supervisor to determine that the learner is
‘satisfactorily’ demonstrating the requirements for each unit. ‘Satisfactorily’ means
consistently meeting the standard expected from an experienced operator.
When required, ensure supervisors and learners sign off on third party assessment forms
or third party report.
Developed by Enhance Your Future Pty Ltd 4
ICTDBS502 - Design a database Version 3
Course Code and Name
Follow the recommendations from moderation and validation meetings.
Your assessments should be typed in an 11 or 12 size font for ease of reading. You must include a
footer on each page with the learner name, unit code and date. Your assessment needs to be
submitted as a hardcopy or electronic copy as requested by your trainer.
The length of your answers will be guided by the description in each assessment, for example:
1
10 lines of handwritten text = of a foolscap page
3
Brief Report 500 words = 1 page typed report, or
1
50 lines of handwritten text = 1 foolscap handwritten pages
2
Mid Report 1,000 words = 2 page typed report
Include a reference list at the end of your work on a separate page. You should reference the sources
you have used in your assessments in the Harvard Style. For example:
Website Name – Page or Document Name, Retrieved insert the date. Webpage link.
For a book: Author surname, author initial Year of publication, Title of book, Publisher,
City, State.
The following table shows you how to achieve a satisfactory result against the criteria for each type
of assessment task. The following is a list of general assessment methods that can be used in
assessing a unit of competency. Check your assessment tasks to identify the ones used in this unit of
competency.
You will receive an overall result of Competent or Not Yet Competent for this unit. The assessment
process is made up of a number of assessment methods. You are required to achieve a satisfactory
result in each of these to be deemed competent overall. Your assessment may include the following
assessment types.
Written Activity The assessor will mark the Does not follow
activity against the detailed guidelines/instructions
guidelines/instructions
You will receive an overall result of Competent or Not Yet Competent for this unit. The assessment
process is made up of a number of assessment methods. You are required to achieve a satisfactory
result in each of these to be deemed competent overall. Your assessment may include the following
assessment types.
Practical Activity All tasks in the practical Tasks have not been
activity must be completed completed effectively and
and evidence of completion evidence of completion has
must be provided to your not been provided.
trainer/assessor.
All tasks have been completed
accurately and evidence
provided for each stated task.
Date
Assessors Name:
Submitted:
Have the Learner’s rights and the appeal system been fully
Yes No
explained?
The learner will complete the written activity provided to them by S NYS
the assessor. The Written Activity Checklist will be completed by
the assessor.
The learner will demonstrate a range of skills and the assessor will S NYS
observe where appropriate to the unit. The Practical Activity
Checklist will be completed by the assessor.
Learner Declaration
I agree to undertake assessment in the knowledge that information gathered will only be used for
professional development purposes and can only be accessed by the RTO
I declare that:
I have given references for all sources of information that are not my own, including the words,
ideas and images of others
Feedback to Learner:
Your task is to write the answers to each of the following questions. Answers should exceed 50
words but no more than 100 words for each questions:
1. Reflect on the process of data analysis, including its role in determining data types and data
structures, in query and in report design.
Answer
A system is a database of data that has been arranged into a method that makes it easy to
find for, choose, or analyse a bit of data based on specified features that characterize each
quantity of data.
Databases come in a variety of forms, including:
Database packages that are commercially available off-the-shelf (COTS).
Object-relational databases (ORBs)
Exclusive databases
Relational database systems
4. Describe the fundamentals of DBMS, particularly as these are applicable during the design
phase.
Answer
5. What is encryption and authentication, and how do these apply to database security
features?
Answer
Authentication is the process of guaranteeing that only authorised parties who are
authorised to execute specific approved actions in the database may access the database.
6. Explain the functions and the features of data types and data structures.
Answer
Understanding the roles and characteristics of data types and data structures aids in the
creation of a functional database. Data structure allows data to be arranged in tables
according to the kind of database and would have specified properties and IDs to organise
data in a database so that queries and searches can be performed.
Databases not only allow complicated data to be kept in a searchable, organised, and
usable manner, but they also allow an organization's data to be managed in a structured,
reportable, and queryable manner.
Databases allow data to be provided to ensure that queries are answered and that
information is displayed to users via a user interface in a variety of ways. Databases allow
data to be stored in a secure location in accordance with the organization's security policy,
as well as allowing users to add, delete, and update data. Databases handle information
according to business needs and provide various searching and indexing functions.
8. Describe the concepts of logical design, particularly as they relate to designing data
structures, queries screens and reports.
Answer
The process of developing many associations among diverse data structures, which are
likely to be based on the manner in which they are logically related to each other through
business processes or needs, is defined as logical database design. The fundamentals of
logical design include grouping data into entities, relationships, and attributes. Logical
design is important for the development of data structures, queries, screens, and reports,
and it can be used to lay out data and make decisions about how it should be used.
9. Explain the concepts of object model design, particularly as they relate to the design of data
structures, queries, screens and reports.
Answer
For this assessment, the learner must complete the written activity.
The written activity is a stand-alone activity that will allow the learner to display the requirements
of the performance criteria and knowledge evidence in this unit that are essential when deciding
overall competency.
Assessor Name:
Yes No
Explain the functions and the features of data types and data
structures.
Feedback to Learner:
The following task is to be demonstrated and assessed in conditions that are safe and replicate the
workplace. Noise levels, production flow, interruptions and time variances must be typical of those
experienced in the database field of work, and include access to:
For this task you are to complete the following activity to demonstrate your ability to design a
database.
Prepare for the task by completing the following actions to determine the database requirements:
1. Meet with the client, and conduct a user-needs analysis to determine database functionality.
Provide the documented user-needs analysis.
2. Analyse the results of the user-needs analysis to identify the technical requirements. Record
this analysis, including the technical requirements.
3. Develop a conceptual model of the database, and submit this to the client for review.
4. Evaluate the client feedback on the conceptual model, making changes as required.
Document this evaluation, and record any changes made.
9. Confirm, and record, the primary and foreign keys for the tables.
10. Review and record the client business rules.
11. Identify, and document, the referential integrity constraints.
Design the queries, screens and reports through completion of the following steps:
16. Design and document the user interface for the database, including the menus, input screens
and outputs.
17. Based on the requirements, design, and document, the queries and the output reports.
18. Compare the physical design with the conceptual model, or with the user-needs analysis, and
incorporate changes, as required. Document this comparison, noting any changes
incorporated.
Perform the following actions to design the access and security systems:
19. Review the business security plan as a basis for commencing the access and security design.
Document this review.
20. Design and document the password and access system for the database.
21. Identify, and record, multiple-user requirements.
22. Using the client business model, develop the client access profiles.
Confirm the database design with the client through the following actions:
23. Identify the requirements for database backup and recovery. Record these requirements.
24. Develop, and document, the procedures for database backup and restoration.
25. Submit the database, and documentation, to the client for their final approval. Provide the
final approval obtained.
Design a database
Determination of the database requirements
The client is met, and user-needs analysis is to be conducted in order to determine database
functionality:
A database is a collection of data organised in a structured system that allows pieces of data to
be identified, selected, and analysed based on predetermined attributes of each item of data.
In order to determine what database functionality is required, personnel and administrators
must meet with customers and conduct a user-needs analysis to determine the best manner
to obtain information from clients. Commercial off-the-shelf (COTS) database packages,
object-relational databases, proprietary databases, and relational databases are all popular
databases.
A user-needs analysis would assist in determining what components and functionality are
necessary to be incorporated in the design of a database in order to meet the demands of the
Submitting the conceptual database to the customer for evaluation and model review:
The conceptual database model will be given to the customer for evaluation to ensure that
the data and the method in which the data is structured is compatible with the client's
demands and needs. In conclusion, the conceptual model is being given to the customer, the
client wants revisions, and further explanation is required. After making changes, the revised
Developed by Enhance Your Future Pty Ltd 18
ICTDBS502 - Design a database Version 3
Course Code and Name
model is submitted for additional evaluation. This procedure would be continued until the
customer agreed to the conceptual model.
The customer input on the conceptual model is to be analysed in order to make
modifications as needed, and this evaluation is to be documented, as are the alterations:
Feedback evaluation:
A model is to be given to a client. The client provides feedback. Following that, necessary steps
are made to address the comments. The process of assessing feedback takes into account how
the feedback relates to the conceptual model, which allows to depict what data would be
included in the database but does not completely explain how the data would be handled.
Effective communication would be necessary to avoid errors that would have a detrimental
impact on the database's outputs as well as harm to the client-designer relationship.
Making modifications to the conceptual model:
Changes to the conceptual model would be required. Adjustments and modifications are
made to the definition of entities, relationships between entities, metadata, and data being
deleted or added to the model based on the review findings, and the model is eventually
presented to the customer for approval.
Creation of a logical data model
The characteristics must be determined, as well as the data types.
Identifying the type of data:
Before identifying characteristics, it is necessary to understand the function and features of
various data types, as well as the data structure, which is the method in which data is
constructed. Following that, qualities that are database components such as a table, a column
or row in a table, and a field would be identified in order to use this information to help build
the database's data structures.
Identifying the data type:
In order to build a database that meets the demands, a variety of data types that must be
included in the design would be selected. Numeric, date and time, character and string,
Unicode character string, binary data, and other data types are all possible. The function of a
datatype is to guarantee that data is sequenced and organised in a way that permits
information to be accessed and used when needed.
The characteristics, normalised data, and the ER diagram must be correctly recorded, and
this documentation must be sent to the client for validation, as well as evidence of client
confirmation:
Data documentation:
According to organisational standards, all database characteristics, normalised data, and the
ER diagram would be recorded. Attributes must be recorded so that they may be used in
decision making. To convey normalised data, normalised data would be described using a
single business modelling language. The ER diagram would be written using the agreed-upon
ER rules and format, as well as establishing the cardinality of information.
Forwarding documentation to client for confirmation:
Once completed, documentation would be checked and assessed to ensure that it is correct
and that all required information is effectively contained in documentation in accordance with
documentation standards before being submitted to the client for confirmation. Finally, after
verifying that all documentation adheres to standards, the material would be given to the
customer for confirmation via an agreed-upon mechanism to guarantee that documentation
may be evaluated. During this step, the client receives documentation, confirms the database
architecture, and approves the next stage of development.
Database management system basics would be specified during the design phase in order to
create the database management system limitations and incorporate them into database
architecture. DBMS is made up of three components: the actual database, the database
engine, and the database scheme.
To guarantee that data can be viewed and comprehended by the DBMS, the physiological
database would've been constructed in accordance with the specific DBMS.
To guarantee that data can be viewed and comprehended by the DBMS, the physiological
database would've been constructed in accordance with the specific DBMS.
The database scheme, which is a database structure and the data included in the structures,
would be necessary to ensure that they are finished in accordance with the demands of DBMS
so that two things may be assured to be compatible with each other.
The following actions would be performed by DBMS: generating database data, reading
database data, updating or deleting database data, managing data, and displaying data. DBMS
restrictions are any limits imposed on database administration as a result of DBMS, such as
features.
functions, applications, and permissible acts
These DBMS restrictions would be recognised and managed throughout the design process;
nevertheless, a catastrophic scenario would compel us to pick a different DBMS.
Data validation rules must be created and documented:
Validation rules would be defined and published when the DBMS was established. The
validation rules would consist of object, field, and case milestones that would be used to test
and validate that data satisfies important criteria. Validation would be established and
implemented for all instances when forms are used to enter data into the database to
ensure that information saved to the database by users meets the business rules and can be
kept and utilised appropriately in the database. Finally, the validation rules would be written
down.
The indexes must be designed, and the data dictionary must be created:
Designing database indexes: Database indexes would be used to increase the speed of data
retrieval operations; hence, indexes would be built to allow search algorithms to be applied
to index tables. Indexes would generate parameters that might be used in searches. Indexes
would utilise unique IDs as keys to apply classifications to the data. Indexes would be
organised logically to satisfy the client's use requirements.
Creating the data dictionary:
A data dictionary, which is a document, would be created and used to specify the parts of
the data, allowing data stored in the database to be recognised and classified. A data
dictionary would have metadata, a table, a description, a name, and relationships.
The database design must be documented as follows:
Different sorts of information would be deemed to be recorded, as well as the techniques
employed to do this. Design parameters documentation, relationship and data modelling,
data structure diagrams, definitions and rules, reports on functionality, specifications sheets,
and user manuals are all examples of documentation. Documentation would adhere to
Developed by Enhance Your Future Pty Ltd 23
ICTDBS502 - Design a database Version 3
Course Code and Name
organisational standards such as format, layout, degree of detail, version control, style
guides, and design guidelines.
Design of queries, displays, and reports
The database user interface, comprising menus, input screens, and outputs, must be
developed and documented:
The user interface would be created by taking into account the following interface elements:
input controls, navigational components, informative components, and containers. Menus
would be built logically while developing the user interface to make it easy to go to different
areas of functionality and control. Furthermore, input panels would be set to guarantee that
users may enter questions, requests, and instructions to get the required results.
Furthermore, output for user interface would be evaluated to satisfy the unique user demands
of the organisation, including kind of output, format, and visual display requirements. All best
practise components would be incorporated into interface design.
The queries and output reports must be created and documented in accordance with the
following requirements:
Creating Queries Based on Specifications:
Queries would be created to collect information from the database based on the client's
needs. Queries would be written in accordance with the programming language and database
type. They would be determined by the data structure, type, and other criteria used
throughout the design and construction phases. Queries would be made capable of meeting
functionality requirements depending on the requirements. SQL SELECT would be used to get
data from the database, where a statement would be chosen in SQL to allow the queries
required to gather data from the database and display it on the user interface.
Example of a SELECT Column
The following SQL query pulls the columns "CustomerName" and "City" from the
"Customers" table:
The physical design should be compared to the conceptual model or the user-needs study,
and modifications should be implemented as needed. This comparison must be
documented, as well as any modifications made:
Comparing the physical design to the conceptual model and conducting a user-needs
assessment:
The physical design of the database, comprising tangible components such as data type, data
structures, user interface, queries, reports, and functions, would be compared to the
conceptual model to verify compliance with client expectations. Physical design would be
evaluated to user-need analysis to ensure that it is in accordance with the stated user needs.
Physical design components created in response to the construction of a conceptual model or
a user needs study would be evaluated so that similarities and differences with the applicable
requirements could be found.
Along with the review, the security design would be defined to guarantee that the review is
saved in the database, when it is accessed, and when it is transmitted and produced.
The database's password and access mechanism must be created and documented:
Passwords and access systems, a form of access and authorization system, would be used to
guarantee that only authorised and authenticated users may access the system. User profiles,
authorization and authentication processes, and needs would be established in order to create
a password and access system, and passwords would be developed to fulfil the security plan
criteria.
These passwords and access systems would be recorded, as would the process for creating
passwords and access systems.
The client business model will be used to build the client access profiles:
Client access profiles would be created for each of the many sorts of people in the
organisation utilising the client business model. These accounts would have various rights and
authorities assigned to them in order to secure data protection as per the demands of the
organization's security strategy. User accounts would be classified based on their access
needs, permissions, and authority.
The following needs must be recognised and documented for database backup and
recovery:
Access to and evaluation of a variety of information, including security plans, disaster recovery
Developed by Enhance Your Future Pty Ltd 26
ICTDBS502 - Design a database Version 3
Course Code and Name
plans, organisational rules and procedures, and compliance plans, will identify backup and
recovery requirements. Database backup and recovery needs would be documented and
evaluated to ensure that backup and recovery requirements could be recognised.
The database and supporting documents must be delivered to the customer for final
approval. The following information must be given after final permission has been
obtained:
The database and documentation would be presented for approval as an application and fully
functional and installed item, with all essential access information supplied to access and
approve the database. Design papers, user instructions, assistance manuals, specs sheets, and
process maps are examples of such documents.
Once the database and database documentation have been delivered to the customer, time
will be set aside for the client to examine the database and documentation before final
approval on the finished project is acquired in accordance with organisational processes.
*Multiple copies of the checklist will need to be printed if the activity is to be performed more than
once.
For this assessment, the learner must complete the practical activity.
The practical activity is a stand-alone activity that will allow the learner to display the knowledge
and performance evidence that is essential when deciding overall competency.
Assessor Name:
Yes No
Confirm, and record, the primary and foreign keys for the
tables.
Design and document the password and access system for the
database.
Feedback to Learner:
The following questions may be answered verbally with your assessor or you may write down your
answers. Please discuss this with your assessor before you commence. Short Answers are required
which is approximately 4 typed lines = 50 words, or 5 lines of handwritten text.
Your assessor will take down dot points as a minimum if you choose to answer them verbally.
Answer the following questions either verbally with your assessor or in writing.
2. List five (5) examples of technical requirements you might identify by analysing the
results of the user-needs analysis.
Answer
7. What are the relationship types you might clarify through developing an ER diagram?
Answer
8. What should you consider and apply when documenting the attributes, normalised data,
and the ER diagram?
Answer
All characteristics should be recorded so that they may be utilised to make important
judgments. Data that has been normalised would be documented in an uniform
business modelling language.
During the documentation of an ER diagram, duplicate entities should be removed
while also ensuring that entities are labelled and that colour is utilised to emphasise
the relevant sections.
The first key is the main key, which is used to identify data in the database and must
be one of the record qualities that will be used as a suitable unique key for each
record. A foreign key relates the main key of one object to an attribute in another.
11. When taking about databases, what are client business rules?
Answer
Client business rules are statements that apply a constraint to certain parts of the to-
be-designed database. They may be created for any component of a database and
applied to elements that can be entered into a certain field, field definition criteria,
and relationship characteristics.
Referential integrity constraints are likely to be the constraints that are applied to the
way entities are specified to guarantee they are always in agreement and consistent.
All relationship needs and interactions must be evaluated to ensure that relevant
referential restrictions can be established.
To prevent useless or incorrectly structured data from being put into a database,
validation rules are created. These rules are described as the rules to be used to check
and confirm that data satisfies the fundamental criteria. Where forms are used to
enter data into a database, validation rules are produced and implemented.
Database indexes, a type of data structure that may be used to speed up data retrieval
procedures necessary for database use, allow search functions to be applied to index
tables and will employ unique identifiers such as keys to apply categories to the data.
16. What information would you include in the data dictionary developed?
Answer
17. What information should be included when documenting the database design? List at
least five (5) examples
Answer
The following information should be included when documenting the database design:
design parameter documentation, relationship and fata modelling, data structure
diagrams, definitions and rules, reports on functionality, requirements sheets, and
user manuals. To do this, several types of information and relevant approaches are
being examined.
18. What will need to be included when designing the user interface for database?
Answer
Keeping the interface simple, creating consistency and using common UI elements,
being purposeful in page layout, using colour and texture strategically, applying
typography to form hierarchy and clarity, ensuring system converses what's
happening, and thinking about the defaults are all practise elements considered when
designing a user interface for a database.
19. List five (5) examples of the areas of requirements you might need to consider when
Developed by Enhance Your Future Pty Ltd 34
ICTDBS502 - Design a database Version 3
Course Code and Name
designing queries.
Answer
During the query design process, the following needs are deemed to be satisfied for
functionality based on the specified requirements: application, business, database,
network, people in the organisation, platform, system, programming language, and
database type.
20. What are the typical requirements you will base and design your output reports on?
Answer
Typical criteria for developing output reports include: what report kinds will be
required, how the report will be constructed as well as requested, and report output
format and placement. The report should be organised logically.
21. Why is it necessary to compare the physical design with the conceptual model, or with
the user-needs analysis?
Answer
In order to analyse the physical design elements that have been produced in response
to the conceptual model's development or the user needs analysis's development,
necessary comparisons must be made so that similarities and differences with the
applicable requirements may be found.
22. Briefly reflect on the process for incorporating changes into the database.
Answer
Modifications to the physical model are planned to make them comply with client
demands after identifying needed changes by comparing physical database design
with conceptual design and user needs analysis. Finally, modifications are made in a
controlled way, and changes are monitored and logged using suitable version control
and change management approaches.
23. What types of information will you identify when reviewing the business security plan as
a basis for commencing the access and security design?
Answer
A security plan is a component of every organisation that outlines the standards and
methods to be used in the security of an organization's ICT assets. The security
strategy must include information such as authentication, authorization, and integrity,
as well as the organization's privacy and security objectives.
To design a password and access system: an access and authorization system that
ensures only authorised users can access the system, the following information must
be identified, such as the user's profile and permissions, as well as authentication
procedures and requirements; however, passwords that meet the security plan
requirements should be developed.
25. Outline three (3) examples of the types of multiple-user requirements you might
identify.
Answer
The sorts of data they can view, queries they can perform, reports they can access,
adding and deleting information from the database, and changing information stored
in the database are all examples of multiple-user needs. Multiple-user requirements
are established in order for user profiles to be generated and implemented with the
necessary permissions.
26. What information is it essential to consider and use to develop client access profiles?
Answer
In order to generate client access profiles, it is probable that all of the various multiple
user needs must be recognised and recorded; therefore, identified information may
be used to develop client access profiles as needed. User accounts are organised into
groups based on their access needs, permissions, and authority.
27. What are four (4) of the types of information you would assess to identify the database
backup and recovery requirements?
Answer
Database backup and recovery needs are likely to be determined by the access and
assessment of diverse information, such as security plans, disaster recovery plans,
organisational rules and processes, and compliance plans. These papers should be
evaluated to ensure that backup and recovery requirements can be determined.
28. What do you need to ensure about the procedure documentation developed for the
database backup and restoration?
Answer
Following the creation of each and every necessity for backup and recovery processes,
29. What evidence should you obtain for client final approval of the submitted database and
documentation?
Answer
It would be necessary to get design papers and user instructions for final client
approval of database documentation. It is necessary to get not just assistance manuals
but also specs papers. Maps of the processes are also provided.
Questioning Checklist
The assessor needs to indicate whether they have conducted the questioning as written questions
or as verbal questions by ticking the box below.
The assessor must provide evidence with the assessment tool. For written questions, the assessor
must provide the learner’s original written responses. For verbal questioning, the assessor must
provide dot points as a minimum on the learner’s responses.
For details on how to conduct and contextualise this form of assessment, please refer to the
questioning checklist explanation in the assessor guide.
Assessor’s name:
Satisfactory
If questions are answered verbally, the assessor must write detailed notes
response
on the learners responses. If answers are recorded separate to this
document, they must be attached to the assessment documents. Yes No
What will need to be included when designing the user interface for
18 database?
What are the typical requirements you will base and design your
20 output reports on?
What are four (4) of the types of information you would assess to
27 identify the database backup and recovery requirements?
What evidence should you obtain for client final approval of the
29 submitted database and documentation?
Feedback to Learner: