Professional Documents
Culture Documents
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
Internal Verifier
Date
signature
LO2 Develop a fully functional relational database system, based on an existing system design
Pass, Merit & Distinction P2 P3 M2 M3 D2
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Assessor Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
Name Subject Assignment NO.
S.A. Thushan Lakshitha Unit 04: Database Design & Development 01
(e005928) page. 6
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.
Unit Tutor
Issue Date
Submission Date
Submission format
Part 1: The submission should be in the form of an individual written report written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research and referenced using Harvard referencing system. Please also provide in-text citation
and bibliography using Harvard referencing system. The recommended word limit is 3,000–
3,500 words, although you will not be penalised for exceeding the total word limit.
Part 2: The submission should be in the form of a fully functional relational database system
demonstrated to the Tutor; and an individual written report (please see details in Part 1 above).
Part 3: The submission should be in the form of a witness statement of the testing completed
by the Tutor; technical documentation; and a written report (please see details in Part 1
above).
Unit Learning Outcomes:
LO1 Use an appropriate design tool to design a relational database system for a substantial
problem.
LO2 Develop a fully functional relational database system, based on an existing system design.
LO3 Test the system against user and system requirements.
LO4 Produce technical and user documentation.
Assignment Brief and Guidance:
Polly Pipe is a water sports provider and installer based in Braintree, England. They need you
to design and implement a database that meets the data requirements. These necessities are
defined in this scenario and below are samples of the paper records that the Polly Pipe
preserves.
Polly Pipe is focused in placing aquariums at business customers. Customers can request
several installations, but each installation is tailor-made for a specific customer. Facilities are
classified by type. One or more employees are assigned to each facility. Because these
facilities are often very large, they can include carpenters and masons as well as water
installers. The facilities use equipment such as aquariums, air pumps and thermostats. There
can be multiple computers in a facility.
Below are examples of paper records that Polly Pipe currently maintains.
Activity 1
Name Subject Assignment NO.
S.A. Thushan Lakshitha Unit 04: Database Design & Development 01
(e005928) page. 10
1.1. Identify the user and system requirements to design a database for the above scenario
(Note:-It is allowed to have your own assumptions and related attributes within the scope of the case study
given)
1.2. Design set of simple interfaces to input and output for the above scenario using
Wireframe or any interface-designing tool. Evaluate the effectiveness of the given design
(ERD and Logical design) in terms of the identified user and system requirements .
Activity 2
Activity 2.1
a. Develop a relational database system according to the ER diagram you have created
(Use SQL DDL statements). Provide evidence of the use of a suitable IDE to create a
simple interface to insert, update and delete data in the database. Implement proper
security mechanisms in the developed database.
Evaluate the database solution developed and its effectiveness with relevant to the
user and system requirements identified, system security mechanisms (EX: -User
groups, access permissions) and the maintenance of the database.
Activity 2.2
a. Explain the usage of DML with below mentioned queries by giving at least one single
example per each case from the developed database. Assess the usage of the below
SQL statements with the examples from the developed database to prove that the
data extracted through them are meaningful and relevant to the given scenario.
Select/ Where / Update / Between / In / Group by / Order by / Having
Activity 3
Activity 3.1
Activity 3.2
Get independent feedback on your database solution from the non-technical users and
some developers (use surveys, questioners, interviews or any other feedback collecting
method) and make recommendations and suggestions for improvements in a separate
conclusion/recommendations section.
Activity 4
Produce a technical documentation and a user guide for the developed database system.
Suitable diagrams diagrams (Use case diagram, class diagram, flow charts, DFD level 0 and
1) should be included in the technical documentation to show data movement in the system.
Assess the developed database by suggesting future enhancements to ensure the
effectiveness of the system.
Thushan Lakshitha
(e005928)
List of Tables
Table 1: Normalization (Author 2021) ............................................................................... 29
Table 2: Test case 01 .......................................................................................................... 59
Table 3: Test case 02 .......................................................................................................... 60
Table 4: Test case 03 .......................................................................................................... 61
Table 5: (Author 2021) ....................................................................................................... 65
Table 6: (Author 2021) ....................................................................................................... 66
Table 7: User guide (Author 2021) .................................................................................... 67
Table 8: User guide (Author 2021) .................................................................................... 68
Table 9: User guide (Author 2021) .................................................................................... 68
List of Figures
Figure 1: DBMS ................................................................................................................... 23
Figure 2: ER Diagram for Polly pipe (Author 2021) ............................................................ 26
Figure 3: logical schema for Polly Pipe (Author 2021): ...................................................... 27
Figure 4: (Author 2021) ...................................................................................................... 31
Figure 5: (Author 2021) ...................................................................................................... 31
Figure 6: (Author 2021) ...................................................................................................... 32
Figure 7: Logging form (Author 2021) .............................................................................. 33
Figure 8: Main form (Author 2021) .................................................................................... 34
Figure 9: Employee details form (Author 2021) ................................................................ 35
Figure 10: Customer details form (Author 2021)............................................................... 36
Figure 11: Installation details form (Author 2021) ........................................................... 37
Figure 12: Enuipment details form (Author 2021) ............................................................. 38
Figure 13: Payment form (Author 2021) ........................................................................... 39
Figure 14: (Author 2021) .................................................................................................... 45
Figure 15: (Author 2021) .................................................................................................... 46
Figure 16: (Author 2021) .................................................................................................... 46
Figure 17: Login form (Author 2021) ................................................................................. 47
Figure 18: Employee form (Author 2021) ......................................................................... 48
Figure 19: Customer details (Author 2021) ....................................................................... 49
Name Subject Assignment NO.
S.A. Thushan Lakshitha Unit 04: Database Design & Development 01
(e005928) page. 21
Figure 20: Equipment form (Author 2021) ........................................................................ 50
Figure 21: Installation form (Author 2021) ....................................................................... 51
Figure 22: Payment form (Author 2021) ........................................................................... 52
Figure 23: Select form (Author 2021) ............................................................................... 54
Figure 24: Where form (Author 2021) .............................................................................. 55
Figure 25: Update statement (Author 2021) .................................................................... 56
Figure 26: Between statement (Author 2021) .................................................................. 56
Figure 27: In statement (Author 2021) ............................................................................. 57
Figure 28: Group by statement (Author 2021) ................................................................. 57
Figure 29: Order by statement (Author 2021) .................................................................. 58
Figure 30............................................................................................................................. 62
Figure 31............................................................................................................................. 63
Figure 32............................................................................................................................. 64
LO1 Use an appropriate design tool to design a relational database system for a
substantial problem.
Activity 1.1
What is database?
Figure 1: DBMS
1.1.1 Introduction
Polly pipe is a water sports provider and installer based in Braintree, England. Its
manual database system wants to design and implement a database that meets the data
requirements as computerized system. Therefore, this system was designed and
developed the solution for water sports provider and installer to meet their business
customers.
Polly pipe is maintaining their data in manual system. Manual system is a paper record.
When defining requirements, two types of requirements are served different purposes.
When identify the user requirements of the above scenario. They are,
1. Functional requirements
2. Non – functional requirements
Functional requirements
All the tasks required to upgrade the database are called functional requirements.
Updating the data required to add to the system is one of the main requirements of the
user. The customer's database should be able to enter the customer's data from the Poly
Pipe company's database. Ability to enter information about employees, what duties
they are assigned, etc. Provide the equipment needed for an installation or order, what
type of equipment the organization needs, and the user needs to have information in the
system. (Polly Pipe system should ability to give customer details, employee details,
payments, installation, equipment details.) It should have creative interface.
Non – functional requirements specify for not covered all the areas by functional
requirements. The details in system design were implement by functional requirements.
Various types of non – functional requirements are accessibility, audit, efficiency,
security, accuracy, availability, backup and restore, capacity, certification, compliance,
reliability, responsibility, virus guard, compatibility of software.
System requirements
System requirements are the building blocks developers use to develop the system.
System requirements are categorized as either functional or non – functional
requirements. Functional requirements differentiate something that a user needs to
perform their work very well. For example, in the above scenario system should be able
to provide the required information for customers several installations and handle daily
operations that is functional requirements.
8GB Ram, HDD, SSD, Frequency 3-3.5 GHZ and more, Network interface bandwidth
100Mbps, SSD for SQL 200Gb, Operating system – windows 10, Hard disk space 250GB+,
intel i7 dual core processor, Printer, Fax, scanner, Restore and backup options, Anti-virus
software.
Learner has identified some of the functional and non-functional requirements of the
system.
Data normalization is the process of organizing data into a database. It also includes
creating tables and interacting with pre-designed rules to make it more flexible by
eliminating redundancy, data security and database incompatibility. Excess data storage
is a waste of disk space and can cause various maintenance problems. If different tables
have the same data, the data in each table must be changed. For example, if you intend
to change the customer's address, changing the customer desk data is sufficient.
Here, removing repetitive groups from individual tables, creating separate tables for
each dataset, and identifying data using a primary key. And not using the same desk to
store the same data.
For example, a company wants to store name and contact details of their employees.
Use separate tables for values that apply to multiple reports. Connect tables with a
foreign key and do not rest on a table key other than the corresponding desk key.
For example, suppose we want to store data on teachers who teach in a school and the
subjects they teach. There can be several rows for the same teacher at the table as one
teacher can teach more than one subject.
In any case, if the contents of a group of fields apply to more than one report in a table,
such areas can be listed separately.
For example, a recruitment table may include the name and address of a candidate's
university, but a complete list of universities is required to send a group mail. If the
information is stored on the job seeker's desk, there is no way to list the universities
where there are no candidates. What can be done here is to create a separate university
table and then attach it to the candidate desk. Although this is theoretical, there are
Name Subject Assignment NO.
S.A. Thushan Lakshitha Unit 04: Database Design & Development 01
(e005928) page. 28
problems with its implementation. This is because in some cases this method is not
suitable for small tables. This is most appropriate for a frequently changing data party.
This is also known as the Boyce Code Normal Form (BCNF) and exists as the fifth
standard form, but in practice it is considered a coincidence. Ignoring these rules may
result in less than a complete database plan, but it does not affect performance.
For example, if think that there is a company that employs more than one employee, can
indicate that they are working in several departments of the organization.
Data validation is important in data processing, analysis, data verification and data
processing. It is important to verify any data before use. Making decisions based on
flawed data is risky. Therefore, any organization in the world has its own set of rules for
storing and maintaining its corporate data. Examples of data validation rules ,
Data type (ex. integer, float or string)
Range check (ex. A number between 10-50)
Uniqueness (ex. Postal code)
Consistent expressions (ex. Using one of St., Str, Street)
No null values
Data validation
Insert
Update
Delete
(What is Data Validation? How It Works and Why It's Important, 2021)
Update Data
Learner has just simply explained the validation mechanisms to validate data in the tables
with examples.
Activity 1.2
Simple interface design to user for get main idea of system. It is can designed on
wireframe or any interface designing tool.
Polly pipe company has 6 interface forms that author created. They are,
• Login form
• Main form
• Employee form
• Customer form
• Installation form
• Equipment form
• Payment form
Polly Pipe company system main interface is Login form. It is design on simple
interface include username and password.
Learner has designed sample interfaces to input and output data using an interface
designing tool.
Activity 2.1
Importance of SQL
Activity 2.2
DL can change commands automatically. It’s permanently saved in the database. DDL
does things like create tables and delete tables. DDL as a command,
• DROP
• ALTER
• CREATE
• TRUNCATE
Create used
Syntax
Example
Drop used
Syntax
Example
Syntax
Example
Truncate used
Syntax
Example
2.2.1.2 DML
DML is used to modify databases. But DML cannot execute automatic commands like
DDL. Data can be reversed via DML. Here are under DML commands,
• INSERT
• UPDATE
• DELETE
Syntax
For example
Update used
Syntax
For example
1. UPDATE Installation
2. SET Name = 'Marine'
3. WHERE Installation__Id = '767'
DELETE USED
Syntax
The key here is the ability to create tables and manage created tables using data definition
language. Create a new tables, structured and recorded stored create in table and also
delete structured data and stored on table in database and used to add new attributes in
database.
Select Command
Update Command
Delete Command
Login form
Database security can protect confidentiality, integrity and availability of data. Database
security is secure database from threats. Database security threats in following situation,
• Theft fraudulent
• Confidentiality loss
• Data privacy loss
• Integrity loss
• Data availability loss
Access control
Access control can protect database on unauthorized access.
Data encryption
Encryption give protection on sensitive data communicate on public networks.
Below are Select, where, update, Between, in, Group By, Order By statements.
‘Where’ statement
‘Update’ statement
‘Between’ statement
Learner has developed a relational database system according to the ER diagram using
DDL statements.but need to provide more source code.
Activity 3.1
Database Testing can check schemas, tables etc. of the database. Database system testing
is effectively and validate to ensure quality of the system.
Test case – 01
Test case – Enter incorrect username or password
Test name – Pamudi Manushika
Test 01
Figure 30
Figure 31
Figure 32
Learner has provided a suitable test plan and test cases to test the system against user
and system requirements.
Activity 4.1
User guide
Learner has prepared a user manual to assist the users of the system.
www.javatpoint.com. 2021.
SQL Commands: DDL, DML, DCL, TCL, DQL - javatpoint. [online]
Available at: https://www.javatpoint.com/dbms-sql-command [Accessed 17 October
2021].