lOMoARcPSD|16927252 Database design and Development 1152 1619622711350 Unit 0 Internet Research (ICT-ED Institute of Science and Technology, Inc.) StuDocu is not sponsored or endorsed by any college or university Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS BTEC HND in Computing Programme title Mr.Laksahan Gamage Assessor Internal Verifier Unit 04: Database Design & Development Unit(s) Database Solution for Polly Pipe Assignment title Umesha Lakshani Kir/A-14790 Student’s name List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Higher Nationals - Summative Assignment Feedback Form Student Name/ID Umesha Lakshani Unit Title Unit 04: Assignment Number 1 Kir/A-14790 Database Design & Development Mr.Laksahan Gamage Assessor Submission Date Date Received 1st submission Re-submission Date Date Received 2nd submission Assessor Feedback: LO1 Use an appropriate design tool to design a relational database system for a substantial problem Pass, Merit & Distinction P1 M1 D1 Descripts LO2 Develop a fully functional relational database system, based on an existing system design Pass, Merit & Distinction Descripts P2 P3 M2 M3 D2 LO3 Test the system against user and system requirements. Pass, Merit & Distinction Descripts P4 M4 D2 LO4 Produce technical and user documentation. Pass, Merit & Distinction Descripts Grade: P5 Assessor Signature: M5 D3 Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Student signature Date lakshanimgu@gmail.co m Date Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Pearson Higher Nationals in Computing Unit 04: Database Design & Development Assignment 01 Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. The font size should be 12 point, and should be in the style of Time New Roman. 2. Use 1.5 line spacing. Left justify all paragraphs. 3. Ensure that all the headings are consistent in terms of the font size and font style. 4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 3. Ensure that you give yourself enough time to complete the assignment by the due date. 4. Excuses of any nature will not be accepted for failure to hand in the work on time. 5. You must take responsibility for managing your own time effectively. 6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 7. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. lakshanimgu@gmail.com Student’s Signature: (Provide E-mail ID) ........./.../2021 Date: (Provide Submission Date) Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Higher National Diploma in Computing Assignment Brief Student Name /ID Number Umesha Lakshani Unit Number and Title Unit 4: Database Design & Development Academic Year 2021/22 Kir/A-14790 Unit Tutor Assignment Title Data base system for Polly Pipe Issue Date Submission Date IV Name & Date Submission format Part 1: The submission should be in the form of an individual written report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide in-text citation and bibliography using Harvard referencing system. The recommended word limit is 3,000–3,500 words, although you will not be penalised for exceeding the total word limit. Part 2: The submission should be in the form of a fully functional relational database system demonstrated to the Tutor; and an individual written report (please see details in Part 1 above). Part 3: The submission should be in the form of a witness statement of the testing completed by the Tutor; technical documentation; and a written report (please see details in Part 1 above). Unit Learning Outcomes: LO1 Use an appropriate design tool to design a relational database system for a substantial problem. LO2 Develop a fully functional relational database system, based on an existing system design. LO3 Test the system against user and system requirements. LO4 Produce technical and user documentation. Assignment Brief and Guidance: Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Assignment brief Polly Pipe is a water sports provider and installer based in Braintree, England. They need you to design and implement a database that meets the data requirements. These necessities are defined in this scenario and below are samples of the paper records that the Polly Pipe preserves. Polly Pipe is focused in placing aquariums at business customers. Customers can request several installations, but each installation is tailor-made for a specific customer. Facilities are classified by type. One or more employees are assigned to each facility. Because these facilities are often very large, they can include carpenters and masons as well as water installers. The facilities use equipment such as aquariums, air pumps and thermostats. There can be multiple computers in a facility. Below are examples of paper records that Polly Pipe currently maintains. Staff Management Record Staff Number SHA1 SHA8 SHA2 SHA11 SHA23 SHA66 SHA55 Name Dave Clark John Smith Freddy Davies McCloud Satpal Singh Winstn Kodogo Alison Smith Type Plumber Installation Manager Aquatics installer Aquatics installer Plumber Aquatics installer Brick Layer Equipment Type Table Type Tanks Thermostats Air Pumps Filters Equipment 20 gallon tank, 50 gallon tank, 100 gallon tank, 200 gallon tank Standard, Super Standard, Super Air driven, Undergravel Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Instillation Management Form Installation Installation Installation ID Type Name and Address 234 Freshwater Oak House, Tropical 17 Wroxton Road, Hertfordshire, H5 667 654 Freshwater Bayliss Cold House, Orange Street, Kent, K7 988 767 Marine Eaglestone Castle, Eaglestone, Kent 943 Marine 23 Sackville Street, Wilts. W55 157 Freshwater Humbertson Tropical Castle, Kent, K8 Customer Equipme Types of Staff nt Required 2 air pumps 200 gallons fish tank 1x standard thermost at Sally 2 air Dench pumps 200 gallons fish tank Large Gravel Bag 2x standard thermost ats Perry 2 x 200 Vanderrun gallons e fish tanks 500 Wood panels Eric 2 air Mackintos pumps h 200 gallons fish tank 1x standard thermost at Perry 2 air Vanderrun pumps e 400 gallons fish tank 3x standard thermost at Lee A. sun 1 x Carpenter 1 x Aquatics installer 1 x Electrician 5 x Carpenters 1 x Installation Manager 1 x Aquatics installer 1 x Plumber 3 x Labourers Period of Staff assignme nt From 1st Septemb er 2012 1st June 2005 – 1st June 2011 10 x Carpenters From 30th 2 x Installation June Manager 2012 1 x Aquatics installer 1 x Plumber 3 x Labourers No staff required 1 x Aquatics installer Downloaded by udara gunathilake (udara14all@gmail.com) 1st Septemb er 2005 – 1st Septemb er 2012 lOMoARcPSD|16927252 Activity 1 1.1. Identify the user and system requirements to design a database for the above scenario and design a relational database system using conceptual design (ER Model) by including identifiers (primary Key) of entities and cardinalities, participations of relationships. Convert the ER Model into logical database design using relational database model including primary keys foreign keys and referential Integrities. It should contain at least five interrelated tables. Check whether the provided logical design is normalised. If not, normalize the database by removing the anomalies. (Note:-It is allowed to have your own assumptions and related attributes within the scope of the case study given) 1.2. Design set of simple interfaces to input and output for the above scenario using Wireframe or any interface-designing tool. Evaluate the effectiveness of the given design (ERD and Logical design) in terms of the identified user and system requirements . Activity 2 Activity 2.1 a. Develop a relational database system according to the ER diagram you have created (Use SQL DDL statements). Provide evidence of the use of a suitable IDE to create a simple interface to insert, update and delete data in the database. Implement proper security mechanisms in the developed database. Evaluate the database solution developed and its effectiveness with relevant to the user and system requirements identified, system security mechanisms (EX: -User groups, access permissions) and the maintenance of the database. Activity 2.2 a. Explain the usage of DML with below mentioned queries by giving at least one single example per each case from the developed database. Assess the usage of the below SQL statements with the examples from the developed database to prove that the data extracted through them are meaningful and relevant to the given scenario. Select/ Where / Update / Between / In / Group by / Order by / Having Activity 3 Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Activity 3.1 Provide a suitable test plan to test the system against user and system requirements. provide relevant test cases for the database you have implemented. Assess how the selected test data can be used to improve the effectiveness of testing. Note:- Learner needs to give expected results in a tabular format and screenshots of the actual results with the conclusion Activity 3.2 Get independent feedback on your database solution from the non-technical users and some developers (use surveys, questioners, interviews or any other feedback collecting method) and make recommendations and suggestions for improvements in a separate conclusion/recommendations section. Activity 4 Produce a technical documentation and a user guide for the developed database system. Suitable diagrams diagrams (Use case diagram, class diagram, flow charts, DFD level 0 and 1) should be included in the technical documentation to show data movement in the system. Assess the developed database by suggesting future enhancements to ensure the effectiveness of the system. Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Grading Criteria Achieved Feedback LO1 Use an appropriate design tool to design a relational database system for a substantial problem P1 Design a relational database system using appropriate design tools and techniques, containing at least four interrelated tables, with clear statements of user and system requirements. M1 Produce a comprehensive design for a fully functional system that includes interface and output designs, data validations and data normalization. D1 Evaluate the effectiveness of the design in relation to user and system requirements. LO2 Develop a fully functional relational database system, based on an existing system design P2 Develop the database system with evidence of user interface, output, and data validations, and querying across Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 multiple tables. P3 Implement a query language into the relational database system M2 Implement a fully functional database system that includes system security and database maintenance. M3 Assess whether meaningful data has been extracted using query tools to produce appropriate management information. LO3 Test the systems against user and system requirements P4 Test the system against user and system requirements. M4 Assess the effectiveness of the testing, including an explanation of the choice of test data used. LO2 & LO3 D2 Evaluate the effectiveness of the database solution in Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 relation to user and system requirements, and suggest improvements. LO4 Produce technical and user documentation P5 Produce technical and user documentation. M5 Produce technical and user documentation for a fully functional system, including diagrams showing movement of data through the system, and flowcharts describing how the system works. D3 Evaluate the database in terms of improvements needed to ensure the continued effectiveness of the system. Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Downloaded by udara gunathilake (udara14all@gmail.com) lOMoARcPSD|16927252 Table of Contents Table of Contents.........................................................................................................................1 Acknowledgement.......................................................................................................................1 Summary......................................................................................................................................6 Activity 1.....................................................................................................................................7 1.1 User and System requirements......................................................................................7 1.1.1 Functional requirements........................................................................................7 1.1.2 Nonfunctional requirements..................................................................................8 1.1.3 System Requirement Specification........................................................................8 1.1.4 Design a relational database system using conceptual design (ER Model) by including identifiers (primary Key) of entities and cardinalities, participations of relationships.........................................................................................................................9 1.1.5 Convert the ER Model into logical database design using relational database model.................................................................................................................................10 1.1.6 Check whether the provided logical design is normalised. If not, normalize the database by removing the anomalies.................................................................................10 1.2 Design sets of simple interfaces to input and output for the above scenario using Wireframe or any interface-designing tool. Evaluate the effectiveness of the given design (ERD and Logical design) in terms of the identified user and system requirements............13 1.3 Evaluate the effectiveness of the given design (ERD and Logical design) in terms of the identified user and system requirements .......................................................................17 Activity 2...................................................................................................................................20 2.1 Develop a relational database system according to the ER diagram you have created (Use SQL DDL statements)...................................................................................................20 2.1.1 Insert, Update, Delete...............................................................................................25 2.1.2 Implement proper security mechanisms in the developed database.........................27 Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 1 lOMoARcPSD|16927252 2.1.3 Evaluate the database solution developed and its effectiveness with relevant to the user and system requirements identified, system security mechanisms (EX: -User groups, access permissions) and the maintenance of the database....................................28 Activity 2.2................................................................................................................................29 Activity 3...................................................................................................................................31 Activity 3.1 Provide a suitable test plan to test the system against user and system requirements. Provide relevant test cases for the database you have implemented. Assess how the selected test data can be used to improve the effectiveness of testing.....................31 3.1.1 Test plan....................................................................................................................31 3.2 Get independent feedback on your database solution from the non-technical users and some developers (use surveys, questioners, interviews or any other feedback collecting method) and make recommendations and suggestions for improvements in a separate conclusion/recommendations section......................................................................38 Activity 4...................................................................................................................................44 4.1 Screenshots of system......................................................................................................45 4.2 Produce a technical documentation and a user guide for the developed database system....................................................................................................................................49 4.2.1 Diagrams...................................................................................................................50 Recommendations......................................................................................................................56 Future enhancements.................................................................................................................57 References..................................................................................................................................58 Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 2 lOMoARcPSD|16927252 Table of Figures Figure 1 Erd Diagram-------------------------------------------------------------------------------------9 Figure 2 Relational Schema-----------------------------------------------------------------------------10 Figure 3 Normalizing The Database-------------------------------------------------------------------12 Figure 4 1nf------------------------------------------------------------------------------------------------12 Figure 5 2nf------------------------------------------------------------------------------------------------12 Figure 6 2nf – 2-------------------------------------------------------------------------------------------12 Figure 7 3nf------------------------------------------------------------------------------------------------13 Figure 8 Login Form Sample---------------------------------------------------------------------------13 Figure 9 Main Menu Sample----------------------------------------------------------------------------14 Figure 10 Staff Sample-----------------------------------------------------------------------------------14 Figure 11 Staff Type Sample----------------------------------------------------------------------------15 Figure 12 Equipment Sample---------------------------------------------------------------------------15 Figure 13 Equipment Type Sample--------------------------------------------------------------------16 Figure 14 Installation Sample---------------------------------------------------------------------------16 Figure 15 Login Query-----------------------------------------------------------------------------------20 Figure 16 Staff Query------------------------------------------------------------------------------------20 Figure 17 Staff Type Query-----------------------------------------------------------------------------21 Figure 18 Equipment Query-----------------------------------------------------------------------------21 Figure 19 Equipment Type------------------------------------------------------------------------------21 Figure 20 Login Form------------------------------------------------------------------------------------22 Figure 21 Main Menu------------------------------------------------------------------------------------22 Figure 22 Staff Form-------------------------------------------------------------------------------------23 Figure 23 Staff Type Form------------------------------------------------------------------------------23 Figure 24 Equipment Form------------------------------------------------------------------------------24 Figure 25 Equipment Type------------------------------------------------------------------------------24 Figure 26 Installation Form-----------------------------------------------------------------------------25 Figure 27 Insert Statement------------------------------------------------------------------------------26 Figure 28 Update Statement-----------------------------------------------------------------------------26 Figure 29 Delete Statement-----------------------------------------------------------------------------27 Figure 30 Select Command-----------------------------------------------------------------------------29 Figure 31 Update Command----------------------------------------------------------------------------29 Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 3 lOMoARcPSD|16927252 Figure 32 Delete Command-----------------------------------------------------------------------------30 Figure 33 Where Command-----------------------------------------------------------------------------30 Figure 34 Technical Documentation-------------------------------------------------------------------49 Figure 35 Class Diagram--------------------------------------------------------------------------------50 Figure 36 Dfd Level 0------------------------------------------------------------------------------------51 Figure 37 Dfd Level 1------------------------------------------------------------------------------------52 Figure 38 Login Flowchart------------------------------------------------------------------------------53 Figure 39 Add User---------------------------------------------------------------------------------------53 Figure 40 Update User-----------------------------------------------------------------------------------54 Figure 41 Delete User------------------------------------------------------------------------------------54 Figure 42 Use Case Diagram----------------------------------------------------------------------------55 Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 4 lOMoARcPSD|16927252 Acknowledgement I would like to express my special thanks and gratitude to my lecturer _______________ for giving me full support throughout this module known as Database Design and Development. Most importantly thank you for giving me sufficient feedbacks for this assignment. Next, I would like to thank all my friends and parents who assisted me in completing this assignment successfully I am overwhelmed in all humbleness and gratefulness to acknowledge my depth to all who have helped me put these ideas to the assignment. I would like to thank all for collecting essential data that is suitable for this document. By giving me different ideas was the main thing that made this assignment unique Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 5 lOMoARcPSD|16927252 Summary In other words, this assignment known as Database design and development, it fortells about certain new things that we have never known about We would be confused when everyone talks about it, mentioning about Databases and all those stuff. But what is a Database. As we mention about Databases it is known as an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. Besides that, although we mentioned about Databases behind all that it’s barely a design known as Database design. Database design is the process of producing a detailed data model of a database. This data model contains all the needed logical and physical design choices and physical storage parameters needed to generate a design in a data definition language, which can then be used to create a database. A fully attributed data model contains detailed attributes for each entity. It can be used to describe many different parts of the design of an overall database system. Principally, and most correctly, it can be thought of as the logical design of the base data structures used to store the data. However, the term database design could also be used to apply to the overall process of designing, not just the base data structures, but also the forms and queries used as part of the overall database application within the database management system Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 6 lOMoARcPSD|16927252 Activity 1 Identify the user and system requirements to design a database for the above scenario and design a relational database system using conceptual design (ER Model) by including identifiers (primary Key) of entities and cardinalities, participations of relationships 1.1 User and System requirements User requirements – Polly Pipe maybe a water sports provider and installer based in Braintree, England. they have to create and implement a database that meets the info requirements. These necessities are defined during this scenario and below are samples of the paper records that the Polly Pipe preserves. Polly Pipe is concentrated on placing aquariums at business customers. Customers can request several installations, but each installation is tailor-made for a selected customer. Facilities are classified by type. One or more employees are assigned to every facility. Because these facilities are often very large, they will include carpenters and masons also as water installers. The facilities use equipment like aquariums, air pumps and thermostats. There are often multiple computers during a facility. (Author’s work) System requirements System Requirements are what the developers use, to build the system. These are the requirements that involve a much deeper view of the system. System requirements can be classified as: Functional requirements Nonfunctional requirements 1.1.1 Functional requirements Functionality requirements specify what the system developer needs to include in the system in order to develop the required system i.e. these are compulsory for the system to exist. E.g. All the necessary requirements that the developer needs to have in the system in order to develop the ‘complete’ system expected by the customer. Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 7 lOMoARcPSD|16927252 1.1.2 Nonfunctional requirements They are also called qualities of a system. Non-functional requirements define all the remaining requirements that are not included in functional requirements. There are many types of non-functional requirements. There are two types mainly: Execution qualities: - security and usability, which are observable at run time. Evolution qualities: - testability, maintainability, extensibility and scalability, which are embodied in the static structure of the software system. 1.1.3 System Requirement Specification This is the System Requirement Specification of the Polly Pipe system that is to be designed. This will provide a summary of the system and why it is built. The Purpose The reason for this SRS is to give the software developer who is going to develop the system for Polly Pipe, a clear idea of what the system should be and what its requirements should be. It is developed for the basic staff of Polly Pipe so that their manual work that involves paper-based operations easier. After the software is made the only thing that has to be done is to update the master database accurately so that the computerized system will help the employees in their daily office chores. The Scope The software helps the staff of Polly Pipe who deals with paper-based operations to keep track of the equipment and other data up to date and do their respective works efficiently and accurately, without knowingly or unknowingly misplacing the orders, hence, delaying the customers to get their orders. (Techtarget, 2021) Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 8 lOMoARcPSD|16927252 1.1.4 Design a relational database system using conceptual design (ER Model) by including identifiers (primary Key) of entities and cardinalities, participations of relationships Figure 1 ERD Diagram Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 9 lOMoARcPSD|16927252 1.1.5 Convert the ER Model into logical database design using relational database model including primary keys foreign keys and referential Integrities. It should contain at least five interrelated tables. Figure 2 Relational Schema 1.1.6 Check whether the provided logical design is normalised. If not, normalize the database by removing the anomalies. What is Database Normalization? Database Normalization can be defined as the process of arranging the data into tables in a manner in which the results of using the database are always explicit as expected. They are inherent to a relational database. This also has the effect of duplicating data within the database, hence, results in the creation of an additional database. Certain important elements form up a database. They are: Key Primary Key Composite Key Foreign key Transitive Functional dependency Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 10 lOMoARcPSD|16927252 What is a key? A key can be defined as a value to identify a record in a table uniquely. It is a single column or a combination of multiple columns. Columns in a table that don’t identify a record particularly are referred as non-key columns. What is a composite key? Composite key can be defined as a primary key composed of multiple columns used to identify a record specifically. Foreign key Foreign key can be defined as a column of data in one table that connects to the primary key data in the original table acting as a bridge. Transitive Functional dependency Transitive dependency can be defined as an indirect relationship between values of a table that results in functional dependency. In order to achieve the normalization standard of Third Normal Form (3NF) any transitive dependency must be eliminated. Examples of Database Normalization There are a few methods of Database Normalization. They are: First Normal Form Second Normal Form Third Normal Form Boyce Codd Normal Form (or 3.5 Normal Form) 5. Fifth Normal Form 6. Sixth Normal Form But the most widely used forms of Normalization are First Normal Form Second Normal Form Third Normal Form Boyce Codd Normal Form (or 3.5 Normal Form) For example, in a rent a car database without any normalization, all information is stored in one table as shown below. Name Phone no Umesha Lakshani Kir/A-14790 Vehicle No Vehicle type Payment type Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 11 lOMoARcPSD|16927252 Smith 0718562594 CDS-7895 Car Cash David 0779564853 NB-3656 Van Cheque John 0756594831 BFA-5643 Car Cash Figure 3 Normalizing the database 1NF (First Normal Form) • Each table cell should contain a single value. • Each record needs to be unique. Name Phone no Vehicle No Vehicle type Smith 0718562594 CDS-7895 Car David 0779564853 NB-3656 Van John 0756594831 BFA-5643 Car Raj 0776943591 KN-6945 Car Figure 4 1NF 2NF (Second Normal Form) • Rule 1- Be in 1NF • Rule 2- Single Column Primary Key It is clear that we can't move forward to make our simple database in 2nd Normalization form unless we partition the table above. Customer ID Name Phone no 01 Smith 0718562594 02 David 0779564853 03 John 0756594831 Figure 5 2NF Customer ID Vehicle No 01 CDS-7895 02 NB-3656 03 BFA-5643 Figure 6 2NF – 2 I have divided my 1NF table into two Tables viz. Table 1 and Table2. Table 1 contains customer information. Table 2 contains information on this specific database. We have introduced a new column called Customer ID which is the primary key for table 1. Records can be uniquely identified in Table 1 using Customer ID. 3NF (Third Normal Form) • Rule 1- Be in 2NF Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 12 lOMoARcPSD|16927252 • Rule 2- Has no transitive functional dependencies To move our 2NF table into 3NF, we again need to divide our table. Customer ID Name Phone no Payment ID 01 Smith 0718562594 01 02 David 0779564853 02 03 John 0756594831 03 (Author’s work) 1.2 Design sets of simple interfaces to input and output for the above scenario using Wireframe or any interface-designing tool. Evaluate the effectiveness of the given design (ERD and Logical design) in terms of the identified user and system requirements. Login form of PollyPipe Figure 7 3NF Figure 8 login form sample Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 13 lOMoARcPSD|16927252 Main Menu Figure 9 Main menu sample Staff Figure 10 staff sample Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 14 lOMoARcPSD|16927252 Staff type Figure 11 staff type sample Equipment Figure 12 equipment sample Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 15 lOMoARcPSD|16927252 Equipment Type Figure 13 Equipment type sample Installation Figure 14 Installation sample Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 16 lOMoARcPSD|16927252 1.3 Evaluate the effectiveness of the given design (ERD and Logical design) in terms of the identified user and system requirements . The accomplishment of a framework lies on how well it resolves the customers' issues. Customer responsibility during the improvement of the framework is transforming into a standard philosophy in the transport of framework convenience reliant upon customer needs settled in get-together their business targets. The customer network has no hankering for holding up broad stretches to see new/redesignd framework limits made operational. Therefore, frameworks/methodologies, for instance, "handy" improvement have ended up being astoundingly acclaimed. These methodologies require the demonstration of framework capacities during the headway of the framework. Framework progression associates present their headway during short social occasions, called "scrums," in which a sensible picture ascents of the course of occasions of the provisioning of framework limits that meet customer necessities. Detectability and Verification Process A significant evaluation of a construction's ability to meet framework necessities centers around "recognisability." Traceability is required to endorse that the passed on plan fulfills the operational need. For example, if a boat is attempted to have a maximum velocity of 32 packs, there should be a path of necessities joined to execution watch that legitimizes the prerequisite for the additional planning, advancement, and sustainment to give a speed of 32 bundles. The continuum of necessities age and perceptibility is perhaps the main methodology in the arrangement, improvement, and course of action of limit. Perceptibility is moreover the foundation for the change technique inside an errand or program. Without the ability to follow necessities beginning to end, the impact of changes can't be suitably evaluated. Also, change should be evaluated concerning the beginning to end influence on various essentials and overall execution (e.g., see the SEG's Enterprise Engineering fragment). This bidirectional movement of requirements should be supervised carefully all through an endeavor/program and be joined by a well-directed necessities measure. For logically effective recognisability, affirmation, and when everything is said in done necessities the board, it is fitting to use devices open in the business hence. Prerequisites Flow Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 17 lOMoARcPSD|16927252 The organized handiness and limits that a framework offers ought to be finished various periods of necessities (operational, down to earth, and framework) headway and advancement. Necessities should reinforce more elevated level legitimate exercises and destinations. It may not be the endeavor's responsibility to follow necessities to greater association goals. Regardless, it will in general be a best practice in ensuring a motivating force to the council. In a financing constrained condition, requirements recognisability to the two plans similarly as progressive destinations is principal to use headway and sustainment resources. As an element of the requirements perceptibility measure, a need should stream two distinct ways: toward greater and dynamically broad progressive goals and Close to the plan expected to engage the ideal limit. This beginning to end recognisability ensures an indisputable linkage between progressive targets and concentrated plans. Necessities Verification Since the ability to test and check is a vital part of adventure/program accomplishment, necessities appended to operational requirements should be delivered all along and kept up all through the essentials life cycle considering test and affirmation. Appeal on the ability to test necessities can be incredibly convincing in aiding an endeavor or program. Frameworks, for instance, prototyping and experimentation can help assess necessities early and give a significant gadget to coming about affirmation and endorsement. For more information, see the SEG article Competitive Prototyping. Test and affirmation plan improvement and execution should be joined directly back to the principal necessities. This is the way the reasonability of the ideal capacity will be evaluated before a dealing with decision. Endless collaboration with the accomplice organization can help recognize accomplishment. All test and check tries should relate authentically to engaging the treatment of the necessary limit. Making test plans that don't energize affirmation of required execution are a silly channel on resources and should be kept an essential separation from. Before a framework design stage is begun, it should be ensured that the framework necessities, trapped in vaults or a framework essentials document, can be planned to viable necessities, for example, in a utilitarian requirements record (FRD). The necessities in the Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 18 lOMoARcPSD|16927252 FRD should be noticeable to operational requirements, for example, in an operational essentials document or a limits improvement report. Ensuring this perceptibility improves the likelihood that the arrangement of the framework will meet the mission needs articulated in a thought of exercises or possibly the mission needs verbalization of the program. Plan Assessment Considerations The construction of a framework should obviously highlight framework limits that meet each framework essential. Two-way conspicuousness among construction and framework necessities engages a higher probability of a viable test consequence of each framework essential and of the framework generally, similarly as the movement of a significant limit. As the organization masterminded plan (SOA) approach creates, there is extended highlight on interfacing framework essentials to unequivocal organizations. Consequently, the old rarities or parts of framework setup should be packaged such that supports provisioning of organizations offered inside SOA (expecting that SOA course of action is a target of an endeavor). For example, acknowledge that the framework requirements can be accumulated in three groupings: Ingest, Analysis, and Reporting. To meet framework essentials inside these classes, the design of the framework needs to highlight each framework part in a manner that keeps an eye on how it would fulfill the framework necessities for Ingest, Analysis, and Reporting, independently. The arrangement information should join schematics or other fitting antiquated rarities that show data, taking care of, and yields of framework parts that all in all meet framework necessities. Missing a sensible guide demonstrating how data, getting ready, and yields of a framework section meet a given framework essential, meeting that specific framework need is at serious risk. Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 19 lOMoARcPSD|16927252 Activity 2 2.1 Develop a relational database system according to the ER diagram you have created (Use SQL DDL statements). Provide evidence of the use of a suitable IDE to create a simple interface to insert, update and delete data in the database. Implement proper security mechanisms in the developed database. Evaluate the database solution developed and its effectiveness with relevant to the user and system requirements identified, system security mechanisms (EX: -User groups, access permissions) and the maintenance of the database The Integrated Development Environment (IDE) is an application that facilitates software development. In general, an IDE is a GUI- (graphical user interface) based working environment designed to help a developer build software application in an integrated environment with all the tools needed. Common features such as debugging, controlling the copy, and reviewing the data structure help a developer to quickly move things to other applications without changing them. Therefore, it helps maximize productivity by providing the user interface (UI) for relevant components and reducing time to learn languages. An IDE supports single or multiple languages Login Query Figure 15 Login query Staff Query Figure 16 staff query Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 20 lOMoARcPSD|16927252 Staff Type Query Figure 17 Staff type query Equipment query Figure 18 Equipment query Equipment type Figure 19 Equipment type Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 21 lOMoARcPSD|16927252 Installation Query Login form Figure 20 Login form Main Menu Figure 21 Main menu Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 22 lOMoARcPSD|16927252 Staff Form Figure 22 Staff form Staff Type form Figure 23 Staff type form Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 23 lOMoARcPSD|16927252 Equipment form Figure 24 Equipment form Equipment type form Figure 25 Equipment type Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 24 lOMoARcPSD|16927252 Installation form Figure 26 Installation form 2.1.1 Insert, Update, Delete The Integrated Development Environment (IDE) is an application that facilitates software development. In general, an IDE is a GUI- (graphical user interface) based working environment designed to help a developer build software application in an integrated environment with all the tools needed. Common features such as debugging, controlling the copy, and reviewing the data structure help a developer to quickly move things to other applications without changing them. Therefore, it helps maximize productivity by providing the user interface (UI) for relevant components and reducing time to learn languages. An IDE supports single or multiple languages Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 25 lOMoARcPSD|16927252 Insert statement Figure 27 insert statement Update statement Figure 28 update statement Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 26 lOMoARcPSD|16927252 Delete statement Figure 29 delete statement 2.1.2 Implement proper security mechanisms in the developed database. Database security controls - Database security encompasses multiple controls, including system hardening, access, DBMS configuration, and security monitoring. These different security controls help to manage the circumventing of security protocols. System hardening and monitoring - The underlying architecture provides additional access to the DBMS. All systems must be patched consistently, hardened using known security configuration standards, and monitored for access, including insider threats. DBMS configuration - The DBMS must be properly configured and hardened to take advantage of security features and limit privileged access that may cause a misconfiguration of expected security settings. Monitoring the DBMS configuration and ensuring proper change control processes helps ensure that the configuration stays consistent. Authentication - Database security measures include authentication, the process of verifying if a user’s credentials match those stored in your database, and permitting only authenticated users access to your data, networks, and database platform. Access - A primary outcome of database security is the effective limitation of access to your data. Access controls authenticate legitimate users and applications, limiting what they can access in your database. Access includes designing and granting appropriate user attributes and roles and limiting administrative privileges. Database auditing - Monitoring (or auditing) actions as part of a database security protocol delivers centralized oversight of your database. Auditing helps to detect, deter, and reduce the overall impact of unauthorized access to your DBMS. Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 27 lOMoARcPSD|16927252 Backups - A data backup, as part of your database security protocol, makes a copy of your data and stores it on a separate system. This backup allows you to recover lost data that may result from hardware failures, data corruption, theft, hacking, or natural disasters. Encryption - Database security can include the secure management of encryption keys, protection of the encryption system, management of a secure, off-site encryption backup, and access restriction protocols. Application security - Database and application security framework measures can help protect against common known attacker exploits that can circumvent access controls, including SQL injection. (LookerDataSciences, 2021) 2.1.3 Evaluate the database solution developed and its effectiveness with relevant to the user and system requirements identified, system security mechanisms (EX: -User groups, access permissions) and the maintenance of the database. Choosing a data set framework is a significant endeavor and can affect the association. A few frameworks are being advertised today may not be viewed as effective in quite a long while. The main advance is the determination cycle and it is an exhaustive comprehension of client necessities. The powerlessness of a data set can fulfill even a moderately minor client and may make an extreme information preparing issue. Simultaneously, one should be mindful so as not to mistake a requirement for accommodation. Another significant viewpoint is the assessment interaction and the thought should be given to the working climate in which the information base framework will fit. Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 28 lOMoARcPSD|16927252 Activity 2.2 Explain the usage of DML with below mentioned queries by giving at least one single example per each case from the developed database. Assess the usage of the below SQL statements with the examples from the developed database to prove that the data extracted through them are meaningful and relevant to the given scenario. Select/ Where / Update / Between / In / Group by / Order by / Having Data manipulation is the changing of data to make it easier to read or be more organized. For example, a log of data could be organized in alphabetical order, making individual entries easier to locate. Data manipulation is often used on web server logs to allow a website owner to view their most popular pages, and their traffic sources. Select command Figure 30 select command Update command Figure 31 update command Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 29 lOMoARcPSD|16927252 Delete command Figure 32 Delete command Where command Figure 33 where command Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 30 lOMoARcPSD|16927252 Activity 3 Activity 3.1 Provide a suitable test plan to test the system against user and system requirements. Provide relevant test cases for the database you have implemented. Assess how the selected test data can be used to improve the effectiveness of testing. 3.1.1 Test plan Test Case Name : Staff details System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Staff Details form Adding Staff, Update Staff and Delete Staff Step Action User Expected Result 1 Adding Records Display Message Pass Display Message Pass Display Message Pass 2 3 Update Records Delete Records Umesha Lakshani Kir/A-14790 System Response Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) Pass/ Fail pg. 31 lOMoARcPSD|16927252 Test Case Name : Staff Type details System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Staff Type Details form Adding Staff Type, Update Staff Type and Delete Staff Type Step Action User Expected Result 1 Adding Records Display Message Pass Display Message Pass Display Message Pass 2 3 Update Records Delete Records Umesha Lakshani Kir/A-14790 System Response Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) Pass/ Fail pg. 32 lOMoARcPSD|16927252 Test Case Name : Equipment details System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Equipment Details form Adding Equipment, Update Equipment and Delete Equipment Step Action User Expected Result 1 Adding Records Display Message Pass Display Message Pass Display Message Pass 2 3 Update Records Delete Records Umesha Lakshani Kir/A-14790 System Response Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) Pass/ Fail pg. 33 lOMoARcPSD|16927252 Test Case Name : Equipment Type details System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Equipment Type Details form Adding Equipment Type, Update Equipment Type and Delete Equipment Type Step Action User Expected Result 1 Adding Records Display Message Pass Display Message Pass Display Message Pass 2 3 Update Records Delete Records Umesha Lakshani Kir/A-14790 System Response Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) Pass/ Fail pg. 34 lOMoARcPSD|16927252 Test Case Name : Installation details System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Installation Details form Adding Installation, Update Installation and Delete Installation Step Action User Expected Result 1 Adding Records Display Message Pass Display Message Pass Display Message Pass 2 3 Update Records Delete Records Umesha Lakshani Kir/A-14790 System Response Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) Pass/ Fail pg. 35 lOMoARcPSD|16927252 Test Case Name : DDL statements System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Execute database tables and get following results 1 Record Successfully Display Message 2 Syntax Errors Display Message Object Errors Display Error Message 3 4 DDL Statements Data Type Display Errors Error Message Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 36 lOMoARcPSD|16927252 Test Case Name : DML statements System: Polly Pipe management system Design By : LAKSHANI Design Date : 3/5/2021 Description: Every DML Query’s execute and get these messages. Step Action User System Response Expected Result 1 Insert Record Display Successfully Message 1 Display Data Pass Display Massage Pass 3 Object Errors Display Error Massage Pass 3 Column Errors Display Error Massage Pass 4 Table Definition don’t Match Display Error Message Pass 2 Display Record Successfully Syntax Errors Pass / Fail Pass Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 37 lOMoARcPSD|16927252 3.2 Get independent feedback on your database solution from the non-technical users and some developers (use surveys, questioners, interviews or any other feedback collecting method) and make recommendations and suggestions for improvements in a separate conclusion/recommendations section. Interview Person: Jessica Interviewer: LAKSHANI Date: 28th June 2019 Location: Esoft Metro Campus Very dissatisfied Dissatisfied Neutral Satisfied Very Satisfied User Satisfaction User friendliness Performanc e Interface Font & Color Comments: ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………… Future recommendations: ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………… ………………………. Signature ………………………… Date Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 38 lOMoARcPSD|16927252 Was it easy to install this software to your computer? Yes No Is the information provided for the system is easy to understand? Yes No Are the interfaces of the Polly Pipe system pleasant? Yes No Is the system performance good? Yes No Are the colors and the font sizes of the system is comfortable? Yes No Did you have any difficulty when using this system? Yes No Is the system very user friendly? Yes No Is the software successful in performing its task? Yes No Do you think that our system can recommend to other people? Yes No Are you satisfied with the Polly Pipe Management System? Yes No Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 39 lOMoARcPSD|16927252 Interview Person: Nita Interviewer: LAKSHANI Date: 28th June 2019 Location: Esoft Metro Campus Very dissatisfied Dissatisfied Neutral Satisfied Very Satisfied User Satisfaction User friendliness Performance Interface Font & Color Comments: ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………… Future recommendations: ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………… ………………………. Signature ………………………… Date Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 40 lOMoARcPSD|16927252 Was it easy to install this software to your computer? Yes No Is the information provided for the system is easy to understand? Yes No Are the interfaces of the Polly Pipe system pleasant? Yes No Is the system performance good? Yes No Are the colors and the font sizes of the system is comfortable? Yes No Did you have any difficulty when using this system? Yes No Is the system very user friendly? Yes No Is the software successful in performing its task? Yes No Do you think that our system can recommend to other people? Yes No Are you satisfied with the Polly Pipe Management System? Yes No Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 41 lOMoARcPSD|16927252 Interview Person: Yvonne Interviewer: LAKSHANI Date: 28th June 2019 Location: Esoft Metro Campus Very dissatisfied Dissatisfied Neutral Satisfied Very Satisfied User Satisfaction User friendliness Performance Interface Font & Color Comments: ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………… Future recommendations: ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………… ………………………. Signature ………………………… Date Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 42 lOMoARcPSD|16927252 Was it easy to install this software to your computer? Yes No Is the information provided for the system is easy to understand? Yes No Are the interfaces of the Polly Pipe system pleasant? Yes No Is the system performance good? Yes No Are the colors and the font sizes of the system is comfortable? Yes No Did you have any difficulty when using this system? Yes No Is the system very user friendly? Yes No Is the software successful in performing its task? Yes No Do you think that our system can recommend to other people? Yes No Are you satisfied with the Polly Pipe Management System? Yes No Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 43 lOMoARcPSD|16927252 Activity 4 USER DOCUMENTATION FOR POLLY PIPE Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 44 lOMoARcPSD|16927252 4.1 Screenshots of system Login form Logging in the system using correct username and password After logging in, the main menu appears Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 45 lOMoARcPSD|16927252 After entering the menu, the user presses the first form known as Staff In order to input data, the user can continue to the next form The next form is based on the equipment. It is shown as follows: Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 46 lOMoARcPSD|16927252 This specific form has another, and it is based on the type of equipment Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 47 lOMoARcPSD|16927252 The last and final form is the Installation form Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 48 lOMoARcPSD|16927252 4.2 Produce a technical documentation and a user guide for the developed database system Item Specification Quantity Have to purchase or Available Hardware RAM 3GB 01 Available Hard disk 3GB 01 Available Processor Core i5 01 Available Windows 7 01 Available 2010 01 Available 2008 R2 01 Available Software Operating system Visual Ultimate Sql Server Studio Figure 34 Technical documentation Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 49 lOMoARcPSD|16927252 4.2.1 Diagrams Class Diagram Figure 35 class diagram Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 50 lOMoARcPSD|16927252 DFD level 0 Figure 36 DFD level 0 Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 51 lOMoARcPSD|16927252 DFD level 1 Figure 37 DFD level 1 Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 52 lOMoARcPSD|16927252 Flowchart Login flowchart Figure 38 Login flowchart Add user Figure 39 add user Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 53 lOMoARcPSD|16927252 Update user Figure 40 Update user Delete user Figure 41 delete user Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 54 lOMoARcPSD|16927252 Use case diagram Figure 42 use case diagram Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 55 lOMoARcPSD|16927252 Recommendations Strictly evaluate that the system has been effectively developed and implemented. The function and how it works have been defined for the administrator and the user who is visiting, and this gadget is applied to the destination. During the reconnaissance, various benefits and problems or limitations found in the test equipment. One restriction on topic is machine safety. The device is programmed in a very simple way, in which the simplest legal entity can manage the menu. But since you need to have many usernames to log into the machine, because the device can be used by many users, each consumer really needs someone to call. To protect any password from unauthorized persons, the password should be changed regularly. In the case of this machine, the password cannot be changed, when the same password is used for a long time, anyone can learn it. Another obstacle or annoyance is that this method no longer provides any useful equipment to produce difficult copies of output within the print copy type. This machine does not provide this function. Well, if we also appear in the system, this machine will not generate any backups. The system may be interrupted due to human error or other technical failures. Therefore, this can also be considered a problem or a problem inside the device. No intruder inside the device can reveal this single administrator login, because login requires the most practical user name and password, and absolutely everyone can analyze and keep it. This may be a hacking method. Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 56 lOMoARcPSD|16927252 Future enhancements The main effort to create this system more user-friendly and creating the system with more features like advanced graphical user interfaces that will make the user to attract to interact and helpful to use the system efficiently and effectively. There might be a great advantage if there is a new feature to add any new fields and details to the management system. This will reduce in time consumption. An improvement should be done in the way of inserting, updating and deleting the records in the Polly pipe management system. The user documentation will give a brief knowledge to the user to interact and should improve the graphical interfaces in user documentation. If I can make the system more attractive and user-friendly, it will be more points in development. The Administrator in the Polly pipe management system should be given more options to increase the security. Finally, by considering the security in a database. There should be a critical improvement in order to protect the database form various kinds of threats using different kinds of control mechanisms Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 57 lOMoARcPSD|16927252 References What is Data Manipulation?. 2021. What is Data Manipulation?. [ONLINE] Available at: https://www.computerhope.com/jargon/d/datamani.htm. [Accessed 15 June 2021]. Looker. 2021. What is Database Security? Definition, Types & Importance | Looker . [ONLINE] Available at: https://looker.com/definitions/database-security. [Accessed 15 June 2021]. SQL ORDER BY Clause . 2021. SQL ORDER BY Clause . [ONLINE] Available at: http://beginner-sql-tutorial.com/sql-order-by-clause.htm. [Accessed 15 June 2021]. IT Pro. 2021. Certifiably SQL: Data Constraints and Integrity | IT Pro. [ONLINE] Available at: http://www.itprotoday.com/microsoft-sql-server/certifiably-sql-dataconstraints-and-integrity. [Accessed 15 June 2021]. Techopedia. 2021. What is a Not Null Constraint? - Definition from Techopedia. [ONLINE] Available at: https://www.techopedia.com/definition/27370/not-null-constraint. [Accessed 15 June 2021]. Techopedia. 2021. What is an Integrated Development Environment (IDE)? - Definition from Techopedia. [ONLINE] Available at: https://www.techopedia.com/definition/26860/integrated-development-environment-ide. [Accessed 15 June 2021]. SQL - ORDER BY Clause - Tutorialspoint. 2021. SQL - ORDER BY Clause Tutorialspoint. [ONLINE] Available at: https://www.tutorialspoint.com/sql/sql-orderby.htm. [Accessed 15 June 2021]. SQL - WHERE Clause - Tutorialspoint. 2021. SQL - WHERE Clause - Tutorialspoint. [ONLINE] Available at: https://www.tutorialspoint.com/sql/sql-where-clause.htm. [Accessed 15 June 2021]. Umesha Lakshani Kir/A-14790 Database Design and Development Downloaded by udara gunathilake (udara14all@gmail.com) pg. 58