Professional Documents
Culture Documents
Database Assignment
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title PEARSON BTEC IN HND COMPUTING
Ms.Ishani
Assessor Internal Verifier
Unit 04 -Database Design & Development
Unit(s)
Smart Movers Database System
Assignment title
F. Thameena Banu
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
LO1 Use an appropriate design tool to design a relational database system for a substantial problem
Pass, Merit & Distinction P1 M1 D1
Descripts
LO2 Develop a fully functional relational database system, based on an existing system design
Pass, Merit & Distinction P2 M2 D2
Descripts
Resubmission Feedback:
Assignment Feedback
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Action Plan
Summative feedback
Assessor Date
signature
thamibanu@gmail.co
Student m Date
signature
Student Declaration
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct way. I further
understand what it means to copy another’s work.
Pearson
F.Thameena Banu /COL/E-005293 Unit 04 Assignment-01 Page 5
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Higher Nationals in
Computing
Databas
e
Design
&
Develo
pment
Assignment Brief
Student Name /ID Number F.Thameena Banu
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 1 – (LO1) Use an appropriate design tool to design a relational database system
for a substantial problem
Task 1.1
(P1) Design a relational database system using appropriate design tools and techniques,
containing at least four interrelated tables, with clear statements of user and system
requirements.
a. Identify the user and system requirements to design a database for the above
scenario.
b. Identify entities and attributes of the given scenario and design a relational
database system using conceptual design (ER Model) by including identifiers
(primary Key) of entities and cardinalities, participations of relationships.
c. Convert the ER Model into logical database design using relational database
model including primary keys foreign keys and referential Integrities. It should
contain at least five interrelated tables.
Note:-It is allowed to have your own assumptions and related attributes within the
scope of the case study given.
Task 1.2
(M1) Produce a comprehensive design for a fully functional system, which includes
interface and output designs, data validations and data normalisation.
a. Explain data normalization with examples. Check whether the provided logical
design in task 1.1 is normalised. If not, normalize the database by removing the
anomalies.
b. Design set of simple interfaces to input and output for the above scenario using
Wireframe or any interface-designing tool.
c. Explain the validation mechanisms to validate data in the tables with examples.
Task 1.3
(D1) Assess the effectiveness of the design in relation to user and system requirements
a. Check whether the given design (ERD and Logical design) is representing the
identified user and system requirements to access the effectiveness of the design.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
d. Display the details payment with the job details and the customer details using
Join queries
Task 2.2
(P3) Implement a query language into the relational database system
a. Explain the usage of DML with below mentioned queries by giving at least one
single example per each case from the developed database.
Select
Update
Delete
Note: - The queries you have selected should be meaningful and relevant to the
given scenario.
Task 2.3
(M2) Implement a fully functional database system, which includes system security and
database maintenance.
a. Explain how security mechanisms have been used and the importance of these
mechanisms for the security of the database. Implement proper security
mechanisms (EX: -User groups, access permissions) in the developed database.
Task 2.4
(M3) Assess whether meaningful data has been extracted using query tools to produce
appropriate management information.
a. Explain the usage of the below SQL statements with the examples from the
developed database
Group by
Order by
Having
Between
Where
Task 3 - LO3 Test the systems against user and system requirements
Task 3.1
(P4) Test the system against user and system requirements.
a. Provide a suitable test plan to test the system against user and system
requirements
b. Provide relevant test cases for the database you have implemented
Note:- Learner needs to give expected results in a tabular format and screenshots
of the actual results with the conclusion
Task 3.2
(M4) Assess the effectiveness of the testing, including an explanation of the choice of test
data used.
a. Explain how the selected test data in task 3.1 b) can be used improve the
effectiveness of testing.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 3.3
(D2) Evaluate the effectiveness of the database solution in relation to user and system
requirements, and suggest improvements.
a. Get independent feedback on your database solution from the non-technical
users and some developers (use surveys, questioners, interviews or any other
feedback collecting method) and make recommendations and suggestions for
improvements in a separate conclusion/recommendations section.
Task 4.2
(M5) Produce technical and user documentation for a fully functional system, including
diagrams showing movement of data through the system, and flowcharts describing how
the system works.
a. Your technical documentation should include some of the UML diagrams (Use
case diagram Class diagram, etc.), flow charts for the important functionalities,
context level DFD and the Level 1 DFD
Task 4.3
(D3) Assess any future improvements that may be required to ensure the continued
effectiveness of the database system.
a. Suggest the future improvements that may be required to ensure the continued
effectiveness of the database system.
Table of contents
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Contents
Acknowledgement..............................................................................................................15
Task 1.1..............................................................................................................................16
a. User and system requirements.............................................................................16
c. Designing ER Diagram.........................................................................................17
ER Diagram..............................................................................................................18
Task 1.2..............................................................................................................................20
Data Normalization......................................................................................................20
First Normal Form..........................................................................................................21
Second Normal Form.....................................................................................................23
Third normal form..........................................................................................................24
Boyce and Codd Normal Form......................................................................................25
b. Wireframe for the above scenario..............................................................................26
c. Validation mechanism..............................................................................................30
Task 1.3..............................................................................................................................34
a. Effectiveness of the database...................................................................................34
Task 2.1..............................................................................................................................35
Task 2.2..............................................................................................................................49
Task 2.3..............................................................................................................................51
Task 2.4..............................................................................................................................53
Usage of SQL statements.............................................................................................53
Group by.....................................................................................................................53
Order by......................................................................................................................55
Having........................................................................................................................55
Between......................................................................................................................56
Where.........................................................................................................................56
Task 3.1..............................................................................................................................57
Test plan.........................................................................................................................57
Introduction................................................................................................................57
Assumptions...................................................................................................................57
Tasks...............................................................................................................................58
Hardware requirements..................................................................................................58
Risks Involved................................................................................................................58
b. Test case.....................................................................................................................58
Case 2.........................................................................................................................59
Case 3.........................................................................................................................59
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Case 4.........................................................................................................................60
Case 5.........................................................................................................................61
Conclusion.................................................................................................................61
Task 3.2..............................................................................................................................62
Task 3.3..............................................................................................................................62
Task 4.1..............................................................................................................................63
Task 4.2..............................................................................................................................70
Task 4.3..............................................................................................................................72
References..........................................................................................................................72
Tables
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figures
Figure1. 1 ER Diagram........................................................................................................19
Figure1. 2 Sign In................................................................................................................27
Figure1. 3 Create new account...........................................................................................27
Figure1. 4 . Profile...............................................................................................................28
Figure1. 5. Payment............................................................................................................28
Figure1. 6. Make new delivery...........................................................................................29
Figure1. 7. Order Registered..............................................................................................29
Y
Figure2. 1............................................................................................................................35
Figure2. 2............................................................................................................................36
Figure2. 3 Customer table..................................................................................................36
Figure2. 4 Product table.....................................................................................................37
Figure2. 5 Job table............................................................................................................37
Figure2. 6 Load table..........................................................................................................38
F.Thameena Banu /COL/E-005293 Unit 04 Assignment-01 Page 13
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Acknowledgement
Before heading into the proceedings of this assignment I would like to thank my lecturer
Ms.Ishani for all her effort made to coach me and my colleagues. Miss your guidance and
support was most needed and the motivations helped.
And I would like to thank Esoft organization for giving me this opportunity to reveal out
my talents though the assignment.
I would like to thank my friends in batch 79 for all the support.
Thank you
F.Thameena Banu
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
HND-COM-79
Task 1 – (LO1) Use an appropriate design tool to design a relational database system
for a substantial problem
Task 1.1
(P1) Design a relational database system using appropriate design tools and
techniques, containing at least four interrelated tables, with clear statements of
user and system requirements.
a. Identify the user and system requirements to design a database for the
above scenario.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
User requirements are the things users expect from the system. A list of features a
system must have which is used as guidance when developing a system.
System requirements are the things that the software needs the host to support.
User requirements
Updated information
Record all the details about the customers, products, payments, jobs, loads, depots
and transport unit
The data should be secured
System requirements
In hardware requirement the initial disk space of 160 MB is required .The SQL server
requires a minimum of 6 GB.
b. Identify entities and attributes of the given scenario and design a relational
database system using conceptual design (ER Model) by including
identifiers (primary Key) of entities and cardinalities, participations of
relationships.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
c. Designing ER Diagram
Entities Fields
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
ER Diagram
Figure1. 1 ER Diagram
d. Convert the ER Model into logical database design using relational database
model including primary keys foreign keys and referential Integrities. It should
contain at least five interrelated tables.
Payment Job
Customer Job_no
Invo_no S_loc
Pay_Id Des
Amount Deport_no
Cus_no
F.Thameena Cus_no Invo_no
Page 18
C_name Banu /COL/E-005293 Unit 04 Assignment-01
Job_no Load_no
Add
T_no
P_id Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Product
Deport
Load
Deport_no
Product d-loc Load_no
Job_no L_type
Job_no
P_id P-id
Type
Cus_n
o
Load_no
Transport unit
Cont_no
Dri_id
Amo
Lor_no
Job_no
Task 1.2
(M1) Produce a comprehensive design for a fully functional system, which includes
interface and output designs, data validations and data normalisation.
a. Explain data normalization with examples. Check whether the provided
logical design in task 1.1 is normalised. If not, normalize the database by
removing the anomalies.
Data Normalization
Normalization is a technique of organizing the data into multiple related tables to
minimize data redundancy. Normalization is the process of decomposing relations with
anomalies to create smaller and well-structured relations.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Anomalies are the problems which occur in an un-normalized database. Where all data
are stored in one table.
Types of Anomalies
Deletion Anomaly- Deleting the data from the current existing data.
E.g.: In a student table both student data and branch data
are together. If the student records are deleted then we will
be losing the data on branch as well
Normalization types
1.
First normal form
2.
Second normal form
3.
Third normal form
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
4.
BC normal form
First normal form sets fundamental rule for database normalization and relates to a
single table within a relational database system.
In a first normal form table the table should contain atomic values and there are no
repeating groups.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Table1. 4
St_id Club
T
S_ID 001 St_name Cl_ID ScienceClub
he
0001 001 Sam 28 SoccerSoccer
0002 001 Nive 31 LiteraryCheer
Second normal form and third normal form handle with functional dependency and
transitive dependency.
A functional dependency means that it meets the requirements of First Normal Form
(1NF), and all non-key attributes are fully functionally dependent on the primary key. A
database t be fully functional dependency it must be in first normal form. Each
attributes holds a single atomic value.
e.g.: If attribute A determines the value of B, we write this A -> B — meaning that B is
functionally dependent on A. In this relationship, A determines the value of B, while B
depends on A.
Table1. 5
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Table1. 6
34 Media
Third normal form is the third step of normalization. A table is in third normal
form if: A table is in 2nd normal form. It contains only columns that are non-
transitively dependent on the primary key.
Transitive dependency
Transitive dependency means if we have a primary key A and a non-key domain B and
C where C is more dependent on B than A and B is directly dependent on A, then C can
be considered transitively dependent on A.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
E.g.: As the below table is 2nd normal form fails to meet 3rd normal form
Table1. 8
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
b. Design set of simple interfaces to input and output for the above scenario using
Wireframe or any interface-designing tool.
Wireframe is a design tool to create or develop web. It helps to create the basic
structure of a website. Wireframe is a site’s blue print and visual guide the provides
details of website navigation, content category and organization, content layout and
structure, functionality items, user interaction items, methods of displaying the content.
According to the scenario the following are the functionalities of the system
Customer details
Job details
Transport details
Payment details
Deport details
Product details
Load details
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure1. 2 Sign In
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure1. 4 . Profile
Figure1. 5. Payment
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
c. Explain the validation mechanisms to validate data in the tables with examples.
c. Validation mechanism
Validation is a process that ensures the delivery of a clear data to the program.
It checks for the integrity and validity of data that is being input to different software
and its components. Data validation is also known as input validation.
Check digit - A redundancy check used for error detection. It is used to check if
the range of numbers are entered correctly
Example, the ISBN-10 numbering system for books uses ‘Modulo-11’ division,
where it outputs the remainder of the division as the result of the
operation[ CITATION tea20 \l 1033 ].
Type Check – this is a way to confirm that the correct data type is inputted.
Example, in an application form age may range from 0 to 100. A number data type
would be an appropriate choice for this data. By defining the data type as number,
only numbers are allowed in the field (e.g. 18, 20, 25) and it would prevent people
from inputting verbal data, like ‘eighteen’[ CITATION tea201 \l 1033 ].
Length check- Allows checking if the data entered is not short or long. this is used
to make sure that the correct number of characters are entered into the field
Example, consider a password that needs to be 8 characters long. The length check
will ensure that exactly 8 characters are entered into the field[ CITATION tea20 \l
1033 ].
Format check- Checks if the entered data is in the right and appropriate format.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Constraints
Constraints ensure the data entered into a relational database within a limit. Purpose of
constraints is to maintain data integrity during an update, insert and delete into a
relation.
Types of constraints
Not null
Unique
Check
Primary key
Foreign key
Not null
Not null ensures that a column does not hold any null or empty value.
e.g.:
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Unique
Unique constraint ensures the column in a table contain unique values. If a column
contains unique constraints then the column cannot have duplicate values in the table.
Check
Ensure that the specific column have value with specified range.
e.g.:
CREATE TABLE Job
(Job_ID int NOT NULL UNIQUE,
Job_title varchar (255) NOT NULL,
Des_km int CHECK (km>=150)
)
Primary key
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Foreign key
Foreign key is taken from a primary key of another relation. They act as the cross
reference between the tables.
e.g.:
Job table
Job_no Job_title Department
00011 Junior executive Operations
00012 Assistant HR
executive
Table 11
Payment table
Invoice_no Name Job_no
1238 Mike 00011
1239 James 00012
Table 12
e.g.:
CREATE TABLE payment
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 1.3
(D1) Assess the effectiveness of the design in relation to user and system
requirements
a. Check whether the given design (ERD and Logical design) is representing the
identified user and system requirements to access the effectiveness of the design.
The design consists the records of all the information and data about customer, product,
transport unit, load, deport, payment and job the user requirements according to the
scenario. As a customer makes an order on one or more product it will be recorded as
loads for transport unit. The loads are of three types named as small, medium, large and
products are of two types no risk and high risk.
In every relation of database all the tables are connected using primary keys.
The user requirements in the scenario should be recorded in the system. The user can
enter his or her information in the Smart Movers website. E.g.: One of the requirements
in the scenario (Customer) should enter the details in the website. Similarly all user
requirements are made recorded in the system. According to the design of the database
all information are stored in one place. Therefore database is an important system to be
monitored and kept safe. As a database developer necessary steps should be taken to
secure the database system.
The design mentioned above describes and represents the system requirements to
retrieve the effectiveness and the efficiency of the database design.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 2.1
(P2) Develop the database system with evidence of user interface, output and data
validations, and querying across multiple tables.
a. Develop a relational database system according to the ER diagram you have
created (Use SQL DDL statements).
Figure2. 1
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
3. Create Tables
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure2. 24
‘
F.Thameena Banu /COL/E-005293 Unit 04 Assignment-01 Page 46
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Primary key
Primary key is the unique identification in the table. As a record is created as primary
key that cannot be duplicated. A table can have only one primary key. Primary key is a
specific choice to minimal set of attributes that uniquely specify a row in a table. The
purpose of primary key in a table is to ensure row level accessibility.
e.g.:
Customer ID
Job number
Invoice number
Load number
Foreign key
Foreign key is taken from a primary key of another relation. They act as the cross
reference between the tables. Foreign key helps to identify a row of another table.
Foreign key do not have to be linked specifically to primary key in another table.
Unique
Unique constraint ensures the column in a table contain unique values. If a column
contains unique constraints then the column cannot have duplicate values in the table.
The primary key automatically has a unique constraint.
Not null
Not null ensures that a column does not hold any null or empty value. Not null
constraint does not allow updating new records or inserting new records.
d. Display the details payment with the job details and the customer details
using Join queries
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure2. 25
Task 2.2
(P3) Implement a query language into the relational database system
a. Explain the usage of DML with below mentioned queries by giving at least
one single example per each case from the developed database.
Select
Update
Delete
SELECT: This command is used to retrieve rows from a table. The syntax is
SELECT [column name(s)] from [table name] where [conditions]. SELECT is
the most widely used DML command in SQL.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure2. 26
Figure2. 27
DELETE: This command removes one or more records from a table according to
specified conditions. Delete command syntax is DELETE FROM [table name]
where [condition].
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure2. 28
Task 2.3
(M2) Implement a fully functional database system, which includes system security
and database maintenance.
a. Explain how security mechanisms have been used and the importance of
these mechanisms for the security of the database. Implement proper
security mechanisms (EX: -User groups, access permissions) in the
developed database.
Security mechanisms
Database security is a top priority for today’s organizations. Database security concerns
the use of a broad range of information security controls to protect databases against
compromises of their confidentiality, integrity and availability. It involves various types
or categories of controls, such as technical, procedural/administrative and
physical. Database security is a specialist topic within the broader realms of computer
security, information security and risk management.
Access control
Auditing
Authentication
Encryption
Integrity controls
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Backups
Application security
Access control (AC) is the selective restriction of access to a place or other resource. The
act of accessing may mean consuming, entering, or using. Permission to access a resource
is called authorization.
Authentication is the first step in access control, and there are three common factors
used for authentication. It is the process or act of confirming that a user who is attempting
to log in to a database is authorized to do so, and is only accorded the rights to perform
activities that he or she has been authorized to do.
Encryption is the process that uses an algorithm to transform data stored in a database into
"cipher text" that is incomprehensible without first being decrypted. Encryption does not
itself prevent interference, but denies the intelligible content to a would-be interceptor. In
an encryption scheme, the intended information or message, referred to as plaintext, is
encrypted using an encryption algorithm. For technical reasons, an encryption scheme
usually uses a pseudo-random encryption key generated by an algorithm.
Data integrity is the overall completeness, accuracy and consistency of data. Data
integrity is usually imposed during the database design phase through the use of standard
procedures and rules.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Backups are copies of data from your database that can be used to reconstruct that data.
Backups can be divided into physical backups and logical backups.
Physical backups are the foundation of any sound backup and recovery
strategy. Logical backups are a useful supplement to physical backups in
many circumstances but are not sufficient protection against data loss
without physical backups.
Task 2.4
(M3) Assess w2`hether meaningful data has been extracted using query tools to
produce appropriate management information.
a. Explain the usage of the below SQL statements with the examples from the
developed database
Group by
Order by
Having
Between
Where
Group by
The statement is used to group the data by one or more column.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure2. 29
Figure2. 30
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Order by
The statement used to set data in ascending or descending order.
e.g.:
Figure2. 31
Having
It used to apply a condition to the aggregate results to limit the groups of returned rows.
e.g.:
Figure2. 32
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Between
It is used to get set of values in a range.
e.g.:
Figure2. 33
Where
It is apply condition to select, update, insert and delete data.
e.g.:
Figure2. 34
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 3 - LO3 Test the systems against user and system requirements
Task 3.1
Test plan
Introduction
The purpose of Smart Movers database is to enter, retrieve and delete data about the
customers, product, transport unit, load, deport payment and job. The customer should
be able to enter all the details using smart movers.
The purpose of test plan is to test:
1. What happens if additional data are added to the tables?
2. What happens wrong if data types are entered to the system
3. Data can be inserted to the system
4. Data can be updated
5. Data can be deleted from the system
Assumptions
There can be only four or five customers in the system
Four transport units are available in the system with four drivers, four containers and
four Lorries.
With four starting locations and four destination locations that the product (chemicals)
can be transported
When the customer makes orders an invoice number will be issued for that customer at
that time
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Tasks
1. Check whether the system give an error message when trying to delete data from a
non-existing table in the database
2. Check whether a value is update
3. Check whether an error message is represented
4. Check whether a created table is in the system
5. Check whether a deleted data still exist.
Hardware requirements
1. A PC with a minimum speed of 1.0 GHz for 32-bit and a minimum speed of 1.4 GHz
for 64-bit implementation. (Recommended 2.0GHz)
2. A system with 4GB RAM
3. A reasonable storage to store data
Risks Involved
1. In the process of testing few or some wanted data would be deleted.
2. In the process of testing some important information could be changed
b. Provide relevant test cases for the database you have implemented
Note:- Learner needs to give expected results in a tabular format and screenshots
of the actual results with the conclusion
b. Test case
Table3. 1. Case 1
Test Thameena
Engineer:
Test Case ID: 1
Test Scenario: Insert data into the database with correct data type
Test Steps: Insert the data into the Depot table with correct SQL syntax
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
PASS/FAIL PASS
Case 2
Table3. 2.Case 2
Test Thameena
Engineer:
Test Case ID: 2
Test Scenario: Insert data into the database with wrong data types
Test Steps: Insert the wrong data type into the Load table fields with correct
SQL syntax
PASS/FAIL PASS
Case 3
Table3. 3. Case 3
Test Thameena
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Engineer:
Test Case ID: 3
Test Steps: Update the data in the Customer table fields with correct SQL
syntax
PASS/FAIL PASS
Case 4
Table3. 4.Case 4
Test Thameena
Engineer:
Test Case ID: 4
Test Steps: Delete data from the Invoice table with correct SQL syntax
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
PASS/FAIL PASS
Case 5
Table3. 5. Cash 5
Test Thameena
Engineer:
Test Case ID: 5
Test Steps: Insert a null value to the Load_Product table ProductID field with
correct SQL syntax
PASS/FAIL PASS
Conclusion
As the all the above test case was positive the developed Smart Movers database has no
errors and it is well created and organized as it is ready to be executed.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 3.2
(M4) Assess the effectiveness of the testing, including an explanation of the choice of test
data used.
a. Explain how the selected test data in task 3.1 b) can be used improve the effectiveness
of testing.
Task 3.3
(D2) Evaluate the effectiveness of the database solution in relation to user and system
requirements, and suggest improvements.
a. Get independent feedback on your database solution from the non-
technical users and some developers (use surveys, questioners, interviews or any
other feedback collecting method) and make recommendations and suggestions for
improvements in a separate conclusion/recommendations section.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 4.1
(P5) Produce technical and user documentation.
a. Prepare a simple users’ guide and a technical documentation for the support and
maintenance of the software.
User’s Guide
This is the Smart Movers automated system for operational activities. The users’ guide
will help you to work with the system.
Image of home page
Figure 4. 1 Sign In
This is the welcome page which will be shown soon after you run the program.
If you are a existing user
1. Enter your User ID
2. Enter your password
If you are a new user click “Sign up” to create a new account.
This is the new account page for new customers. Enter your details correctly, create a new
password and remember the password for your sign in purpose. After entering all the
relevant details click on “Submit” button to register your account.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
If you are a new user click “Sign up” to create a new account.
This is the new account page for new customers. Enter your details correctly, create a new
password and remember the password for your sign in purpose. After entering all the
relevant details click on “Submit” button to register your account and mae your payment.
Figure 4. 3. Payment
In this page type your card details to register with SmartMovers and importantly select
your type of membership from “Category 1/2/3”. And after click on “Pay”to complete
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure 4. 4. Profile
This is the Profile of the SmartMovers. After you log in to the system you will get here.
In this page you can make a new delivery by clicking “New Delivery” button, see your
current deliveries by clicking “Current Deliveries” and see your delivery history by
clicking on “Delivery History”.
When you click on “New Delivery” you will be directed to the following Page.
In this window you have to give your product and load details to make an order. After you
complete filling the details then click on the “Confirm and pay” button and it will
F.Thameena Banu /COL/E-005293 Unit 04 Assignment-01 Page 64
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
redirect to the merchant payment site. After you completed the payment your order details
will be shown like this following window.
And then finally you can go to the homepage again by clicking on the “Continue to
homepage” button
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Technical Documentation
To run the program smoothly and for better performance and maintenance following
requirements is needed.
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Component Requirement
Processor Minimum:
Speed x86 Processor: 1.0 GHz
x64 Processor: 1.4 GHz
Recommended: 2.0 GHz or faster
Processor x64 Processor: AMD Opteron, AMD Athlon 64, Intel Xeon with
Type Intel EM64T support, Intel Pentium IV with EM64T support
x86 Processor: Pentium III-compatible processor or faster
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 4.2
(M5) Produce technical and user documentation for a fully functional system, including
diagrams showing movement of data through the system, and flowcharts describing how
the system works.
b. Your technical documentation should include some of the UML diagrams (Use
case diagram Class diagram, etc.), flow charts for the important functionalities,
context level DFD and the Level 1 DFD
Figure 51
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Figure 52
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
Task 4.3
(D3) Assess any future improvements that may be required to ensure the continued
effectiveness of the database system.
b. Suggest the future improvements that may be required to ensure the continued
effectiveness of the database system.
References
Downloaded by cm mc (preethika24chandrakumar@gmail.com)
lOMoARcPSD|12877748
https://teachcomputerscience.com/validation/
Downloaded by cm mc (preethika24chandrakumar@gmail.com)