Professional Documents
Culture Documents
Assignment No (DAD-16-001-V2)
By
Vagish Kirubaharan
COL/A-051935
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 2
Task 1
1.1
1.2
Advantages Disadvantages
Clients can comprehend this model Consistent information model might be hard
effortlessly to adjust and on the grounds that other elated
data connected to them.
Logical data models help the users to identify Spotting errors within logical data model can
the activities of the business become difficult at times as they are not easy
to identify
When constructing logical data model itself, Attributes are not described properly and
it is very easy and all information is does not have fine details
transferred into diagram with less words
Advantages Disadvantages
The social information show keeps away Relational information show is costly
from multifaceted nature. Information are information framework
sorted out normally inside the model,
streamlining the improvement and utilization
of the database
Information honesty is a fundamental If the quantity of tables between which
element of the social model. Information connections to be set up are vast and the
trustworthiness guarantees exactness and tables themselves impact the execution in
consistency of the data. reacting to the sql questions
The social information show is normally If the information is normally sorted out in a
adaptable and extensible, giving an adaptable progressive way and put away all things
structure to meet changing necessities and considered, the various leveled approach may
expanding measures of data give brisk significance for that information
A database configuration is by and large Database frameworks utilizing object-
considered standardized when it meets the situated information models have been touted
prerequisites of the third typical form. as the developing structure for the up and
coming age of the frameworks
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 3
Advantages Disadvantages
Utilizing a progressive information display Hierarchical information structures have a
sets up clear specialist for work and tendency to adjust gradually to evolving
departments needs
Associations can't adjust to new market The various leveled structure makes clear
requests or propelling advancements lines of correspondence and gives
correspondence direction.
Hierarchical display experience the embed The progressive system is that it doesn't urge
erase and refresh inconsistencies, individuals to team up and share data over
additionally recovery operation is entirely the announcing structure.
hard.
It is really perplexing to incorporate in spite The underlying database demonstrates that
of the fact that it is sans inconvenience and proposed the information security was
simple to plan Hierarchical model that is given by the
DBMS.
Advantages Disadvantages
The system show is reasonable The system demonstrate is can deal with the
straightforwardness and simple to design. one to numerous and many to numerous
All the records are kept up utilizing pointers connections
and subsequently the entire database
structure turns out to be extremely intricate
That mean numerous connections can be Since the information get to strategy in the
handled system database display is a navigational
framework, rolling out basic improvements
to the database is extremely troublesome
much of the time and inconceivable now and
again
The system display does not enable a part to Making auxiliary alterations to the database
exist without a proprietor. This guarantees is extremely troublesome in the system
the information integrity database show as the information get to
technique is navigational
The various leveled display was the non-
accessibility of widespread norms for
database plan and demonstrating.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 4
Advantages Disadvantages
Having planned an E-R graph for a database Physical configuration got from E-R Model
application, the social portrayal of the may have some measure of ambiguities or
database display turns out to be generally irregularity
straightforward
Transformation from E-R chart to a system Popular for abnormal state outline The E-R
or progressive information demonstrate can• information display is especially well known
effectively be accomplished for abnormal state
Advantages Disadvantages
Protest situated advancement is the We have just specified that there isn't
confirmation that the framework will generally concurred information demonstrate.
appreciate a more drawn out life while Essentially, there is no standard protest
having far littler upkeep costs. There is a arranged question dialect
general absence of benchmarks of
OODBMSs
Protest situated framework tend to There is no all-around concurred information
demonstrate this present reality in a more show for an OODBMS, and most models do
entire manner than do conventional methods not have a hypothetical establishment
This .detriment is viewed as a critical At the point when another protest is made, it
downside, and is practically identical to pre- will consequently acquire the information
social frameworks qualities and attributes of the class from
which it was brought forth.
In contrast with RDBMSs the utilization of This implies we don't yet have the level of
OODBMS is still generally constrained experience that we have with customary
frameworks
The essential information demonstrates which is utilized generally around the globe for
information stockpiling and handling is called Relational Data Model.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 5
There are no different records changes required additionally there is more stockpiling
productive, points of interest can be erased basically or adjusted and all records in different
tables having a connection to that passage will demonstrate the change. That mean
information is just put away once. And furthermore complex questions can be done. At the
point when the individual logs on with their client name and watchword, the framework
would then be able to restrict get to just to those tables whose records they are approved to
view thus that it is better security. And furthermore it is less demanding to change and
information arrange.
Social information demonstrates is more adaptable than progressive and system database
models are additionally convenience.
1.2
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 6
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 7
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 8
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 9
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 10
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 11
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 12
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 13
There are two methodologies for building up any database, the best down approach and base
up approach. All these methodologies are distinctive they share the shared objective of
joining a framework by depicting the greater part of the communication between the
procedures. The database configuration process plans to make database structures that will
effectively store and oversee information.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 14
The procedure includes the distinguishing proof of various substance sorts and the meaning
of each of the element's characteristics. Top-down methodologies stretch an underlying
spotlight on learning of larger amount builds, for example, ID of populaces and
accumulations of things and element sorts, participation guidelines, and connections between
such populaces. On the off chance that you have a major issue to tackle, this technique is
extremely compelling. Top down outline is a choice to make new parts inside gathering. All
things considered, imperatives are the current geometry components from different parts
inside get together: lines, planes, surfaces, focuses, vertices.
The primary preferred standpoint of the best down approach is the representation of the
framework which can be utilized for discourses with the client and for advance following
• The main usage turns into a feature for the character administration arrangement.
• When the stages are finished for the overseen application, you have actualized a more
profound more develop execution of the character administration arrangement.
• Operation and upkeep assets are not at first affected as seriously as with the base up
approach.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 15
• The support and general business won't understand the advantage of the arrangement
as quickly.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 16
With base up plan, a structure graph is important to decide the request of execution, and the
improvement of drivers is important to finish the base up approach
• User and business consciousness of the item. Advantages are acknowledged in the
early stages.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 17
• Tivoli Identity Manager is acquainted with your business with less interruption to
your operations.
• The hierarchical structure you build up might need to be changed in a later take off
stage.
• Because of the prompt changes to store proprietors and the client populace, the
takeoff will have a higher effect prior and require more noteworthy participation.
• This system is driven by the current foundation rather than the business forms.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 18
Task 2
2.1
2.2
Assumption
A Student is referred by only Course Section and Professor in University.
All the different types of Courses were recorded in a single profile per a student
A student will receive only the report once he finishes the exam
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 19
2: 3
When all is said in done every substance will be changed over specifically into the
connection. The credited of the substance turn into the properties of the connection. The
identifier of the element turns into the key of the social outline. Connections will be mapped
as 'outside keys' of the element
Doctor (doctor No, name, address, phone Number, qualifications, fees per call, specialization
….)
Patient (patient Number, name, age, sex, address, city, referred Doctor, department)
Operation (operation Number, patient Number , date of Admission, date of Operation, name
of Doctor, operation Theater Number , type of Operation … )
Doctor (Charges, balance Charges, treatment given, treatment Advice, payment Made, mode
of payment…)
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 20
Task 3
In the above framework the connections and custom outlines which will be helpful in day by
day operations can be actualize utilizing question instruments. The structure of SQL inquiry
is simpler to catch than numerous other database question dialects in the business. SQL can
be utilized with a few free and open source database frameworks
SQL inquiries can be utilized to recover a lot of records from a database rapidly and
proficiently.
SQL databases utilize since a long time ago settled standard, which is being received
by ANSI and ISO. Non-SQL databases don't hold fast to any reasonable standard.
Databases enable you to interface diverse wellsprings of data together so you can see
imperative things about your business you may never have taken note.
SQL for the most part comprises of English explanations and it is anything but
difficult to learn and comprehend a SQL inquiry.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 21
SQL is the database dialect which is utilized by organizations and undertakings all
through the globe.
Utilizing remote key devices there are 6 sorts of connections can be actualized.
Likewise somebody can choose numerous connections by holding down the CONTROL key
as you click an association. This can be helpful for featuring particular connections on an
EER chart.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 22
EER Diagrams
Physical Schemata
Schema Privileges
SQL Scripts
Model Notes
SQL Development
Database Administration
Database Migration
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 23
3.3
Inquiry programming apparatuses used to build up and execute inquiries from the regular
database administration systems (DBMS). We can utilize the accompanying apparatuses to
access and change information in occasions of SQL Server.
sulcmd utility
bcp utility
sqlps utility
Inquiry plan by utilizing database particular question dialects, for example, SQL or OQL
ends up being awkward or even outlandish when end-clients need to posture inquiries to
expansive database plans. This is because of the challenges which emerge out of the wrong or
outlandish understandings of capacity models and the absence of instruments to implant
application space semantics inside inquiry dialects.
Utilizing inquiry instruments the proficient of the database question process can be upgrade.
Database question apparatuses permits to oversee scope of information in a database and
gives broad offices to working specifically with SQL code. Before working specifically with
a live server, an association must be made. After an association is built up, it is conceivable to
execute SQL code specifically on the server and control the server utilizing SQL code.
Information is important in the event that we have some approach to follow up on it. Else, we
are negligible observers. This is a standout amongst the most tricky parts of the present
fixation of information representation, which seems to regard information as a certain
legitimization for itself, instead of as an intermediary for things that we really need to
comprehend or test.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 24
• Available
Accessibility starts with great plan, It implies keeping frameworks up and recoverable, and
upgrading forms like information extraction and change
• Accurate
• Actionable
Information dependably recounts a story. In any case, the story needs to go someplace.
Important information drives activity to comprehend its customer's objectives and power
significant decisions.
• There are three sorts of information extractions that the MDE can create:
• �Snapshot inquiry: Resource property (metadata) extraction for a set point in time
• �Raw time arrangement inquiry: Raw information extraction between a begin and
end time
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 25
3.1 Provide reasonable experiments and tests intend to test the database.
Output parameters, which can return either information, (for example, a whole
number or character esteem) or a cursor variable (cursors are result sets that can be recovered
one column at once).
A result set for each SELECT articulation contained in the put away method or some
other put away techniques called by the put away strategy.
A worldwide cursor that can be referenced outside the put away method.
There are distinctive layers through which information passes and there are diverse sorts of
tests.
Application layer
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 26
Database layer
Validation in the database layer is favored in light of the fact that you can have
diverse applications associating with a similar database and keeping in mind that this is
something to be thankful for, the approval in those applications isn't really the same, and
consequently approval that is actualized on the database layer is better as far as information
trustworthiness
at a similar time approval in the database layer ought to be speediest in light of the
fact that the database layer is nearest to the (information does not have to go through different
layers to be handled, for this situation approved)
the special case is if the approval manage is static and does not rely upon other
information from the database (for instance testing if the info is an even positive number), at
that point the customer can approve the information before the database and maintain a
strategic distance from superfluously entrusting application layer or potentially database
layer. (in the meantime you need to actualize approval at the database layer likewise, just on
the off chance that there is a bug or different applications will interface with the database).
same rule applies to application layer - if there is an approval that application layer can
perform without hitting the database server it ought to do it, however the same ought to be
done (ensured) in the database layer.
Domain approval (illustration: is the information a positive whole number?). This can
be checked at the database layer utilizing CHECK requirement
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 27
Relationship approval (case: for the record you are including is there as of now a
record in another table). This can be checked at the database layer by appropriate utilization
of FOREIGN KEYS
business rules approval (these can be intricate, for instance 'if the esteem you are
attempting to record is > 100 at that point ensure that you can record IP of the client,
generally wipe out exchange; if not don't trouble'.) these sort of approvals should be possible
through triggers and put away systems. in certifiable business rules approval are frequently
executed at the application layer (for different reasons - from relative non-viability and non-
versatility of PL/SQL, which is normally the dialect you should compose triggers in, to the
way that actualizing muddled triggers can decrease execution lastly make the framework
exceptionally intricate)
MySQL Fabric is worked around an extensible and open source system for overseeing
ranches of MySQL Servers. MySQL Workbench is a graphical apparatus for working with
MySQL Servers and databases. MySQL Workbench completely bolsters MySQL Server
variants 5.1 or more. It is good with MySQL Server 5.0, however only one out of every odd
component of 5.0 might be bolstered. It doesn't bolster MySQL Server adaptations 4.x.
Data Modeling : The Table Editor gives offices to altering Tables, Columns,
Indexes, Triggers, Partitioning, Options, Inserts and Privileges, Routines and Views.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 28
MySQL Enterprise Support: Support for Enterprise items. (Ex: MySQL Enterprise
Backup, MySQL Audit)
Planning a Microsoft® SQL Server™ application for ideal execution can appear an
overwhelming test. Devices, for example, dialect compilers or mediators, debuggers, and run-
time sending stages regularly limit the advancement show decisions. One of the capacities of
SQL is its capacity to channel information at the server with the goal that exclusive the base
information required is come back to the customer.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 29
Task 4
Security Policies
Security notice extend from expecting reinforcements to be done frequently and put away
off-site. Since which incorporate guaranteeing that unapproved access to delicate
information.
Security agenda.
User Authentication.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 30
Every database has at least one heads who are in charge of keeping up the security
arrangement: the security chairmen, if the database framework is huge, at that point a unique
individual or gathering of individuals may have duties constrained to those of a security
overseer..
Number of executives with freedom to oversee database client’s regardless, just trusted
people ought to have the intense freedom to direct database clients.
Client Authentication
Database clients can be checked by utilizing database passwords, the host working
framework. To be checked utilizing system validation administrations or SSL requires.
Database overseers must have the working framework freedom to make and erase
documents.
Typical database clients ought not have the working framework freedom to make or
erase documents identified with the database.
If the working framework recognizes database parts for clients, at that point the
security managers must have the working framework freedom to alter the security area of
working framework accounts.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 31
Information security incorporates the systems that control the entrance to and utilization of
the database .information security strategy figures out which clients approach a particular
mapping object, and the particular sorts of activities took into consideration every client on
the protest.
Principally, the levels of security you need to build up for the information in your database
decides your information security arrangement concede get to freedom for their articles to
some other client of the framework.
Perspectives can likewise execute information security in light of the fact that their definition
can limit access to table information. They can bar segments containing delicate information.
Administrator Security.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 32
• Password Security.
• Privilege Management
In the event that client confirmation is overseen by the database, at that point security
managers ought to build up a secret word security strategy to keep up database get to
security. For instance, database clients ought to be required to change their passwords at
general interims, and obviously, when their passwords are uncovered to others. By driving a
client to alter passwords in such circumstances, unapproved database access can be lessened.
Passwords are utilizing the AES (Advanced Encryption Standard) calculation, before sending
them over the system.
Benefit Management
Security directors ought to consider issues identified with benefit administration for a wide
range of clients. For instance, in a database with numerous client names, it might be
advantageous to utilize parts (named gatherings of related freedom that you give to clients or
different parts) to deal with the freedom accessible to clients. Then again, in a database with a
modest bunch of client names, it might be simpler to give freedom unequivocally to clients
and maintain a strategic distance from the utilization of parts.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 33
End-User Security
Security directors must characterize an approach for end-client security. On the off chance
that a database has numerous clients, at that point the security overseer can choose which
gatherings of clients can be ordered into client gatherings, and after that make client parts for
these gatherings. At that point security head can concede the important freedom.
Overseer Security
Security overseers ought to likewise have an arrangement tending to database executive
security. For instance, when the database is vast and there are a few sorts of database heads,
the security executive may choose to bunch related regulatory freedom into a few managerial
parts. The regulatory parts would then be able to be allowed to suitable chairman clients. On
the other hand, when the database is little and has just a couple of managers, it might be more
advantageous to make one regulatory part and concede it to all overseers.
Creating parts for an application and dealing with the freedom of every application
part
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 34
Database security frameworks that are subject to passwords require that passwords be kept
mystery consistently. Since passwords are powerless against robbery, imitation, and abuse,
Oracle Database utilizes a watchword administration arrangement. DBAs and security
officers control this approach through client profiles, empowering more prominent control
over database security.
Account Locking
Password History.
Password Complexity
Password alters.
Record Locking
At the point when a specific client surpasses an assigned number of fizzled login endeavors
Utilize the CREATE PROFILE proclamation to determine a most extreme lifetime for
passwords.
The accompanying two parameters control client capacity to reuse an old secret key:
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 35
Prophet test secret key multifaceted nature check routine can be indicated utilizing a SQL
content which sets the default profile parameters.
The secret word unpredictability check routine guarantees that the watchword meets the
accompanying prerequisites:
Has no less than one alpha, one numeric, and one accentuation stamp character
A DBA with ALTER ANY USER benefit can adjust any client secret key without providing
the old one.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 36
Conclusion
I have clearly explained the entire task that I have given to me and I have given some
knowledge about the Data Analysis and Design which I have learnt
Here I have explained about database and shown ER Diagram for the scenario and also
described query tools with some instructions. So I think this assignment will give clear view,
image about this system and how databases are used.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 37
Gant Chart
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 38
References
Eskimo. (). Advantages & Dis advantages of Logical Data Modeling? Available:-
https://answers.yahoo.com/question/index?qid=20090524074401AAsqig7. Last accessed
17th January 2015 at 8.00P.M.
Deborah Lee Soltesz. (1999-2015). What are the Advantages of a Relational Database
Model?. Available:- http://www.ehow.com/list_6328507_advantages-relational-database-
model_.html. Last accessed 17th January 2015 at 8.30P.M.
Azhar. (). What are the advantages and disadvantages of using relational models in a
database?. Available: -
https://answers.yahoo.com/question/index?qid=20091005032104AAFwMmT. Last accessed
18th January 2015 at 6.30A.M.
Sophie Johnson. (2015). What Are the Advantages & Disadvantages of Hierarchical
Structure?. Available:- http://smallbusiness.chron.com/advantages-disadvantages-
hierarchical-structure-66002.html. Last accessed 18th January 2015 at 7.09A.M.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )
Page 39
Audra Bianca. (2015) . Pros & Cons of a Hierarchical Organizational Structure Available:-
http://smallbusiness.chron.com/pros-cons-hierarchical-organizational-structure-24276.html.
Last accessed 18th January 2015 at 9.10A.M.
Dinesh Thakur. (). What is ER-Model? Advantages and Disadvantages of E-R Model
Available:- http://ecomputernotes.com/fundamental/what-is-a-database/advantages-and-
disadvantages-of-e-r-model. Last accessed 18th January 2015 at 12.05P.M.
Dan Power . (1995-2014). What are advantages and disadvantages of data warehouses?.
Available:- http://dssresources.com/faq/index.php?action=artikel&id=180. Last accessed 20th
January 2015 at 6.30P.M.
Dinesh Thakur . (). What is Data Warehouse? Benefits & Problems of Data Warehousing
Available:- http://ecomputernotes.com/database-system/adv-database/data-warehouse. Last
accessed 20th January 2015 at 7.25P.M.
Vagish Kirubaharan
Data Analysis and Design
(DAD-16-001-V2 )