0% found this document useful (0 votes)
50 views

Ali MBIS403 Data Modelling and Database Development Week 9

The document discusses the student's experience in week 9 gaining practical experience in database management. Key concepts covered include database views, security techniques like user-level security and encryption, and advanced techniques like indexes, joins, stored procedures and triggers. Modern database management systems provide flexibility and power for data manipulation.

Uploaded by

Sheraz Irshad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Ali MBIS403 Data Modelling and Database Development Week 9

The document discusses the student's experience in week 9 gaining practical experience in database management. Key concepts covered include database views, security techniques like user-level security and encryption, and advanced techniques like indexes, joins, stored procedures and triggers. Modern database management systems provide flexibility and power for data manipulation.

Uploaded by

Sheraz Irshad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Canterbury Institute of Management (CIM)

MBIS403-Data Modelling and Database Development


Reflective Journal Week 9

Student Name: Ali Raza


Student I’d: CIM 5053

1
Reflective Journal:

In week 9, I gained detailed practical experience in database management. I can’t help


but be fascinated by the wealth of concepts and techniques that are the basis of this
constituent part of information technologies. All the study modules in classes have been
a critical source of conceptual and applied knowledge about the underlying principles
and methodologies used in data organization, security, and data crunching in a
database environment (Qi, 2020).

A directive regarding the exploration of points of view for producing and using has
brought in the most enlightenment. I am finally in a position to understand how a view is
a logical representation of data (encapsulating data from more than one table),
providing streamlined access to information and a secure gate through which it can be
debugged and changed if needed. Bespoke ways of arranging items can be applied in
the case of various operations on data records, including sorting them or carrying out
calculations. This is a clear proof of their flexibility and usefulness.

Thus, the security issues discussed point out the inevitable necessity of preventing
anyone from getting unauthorized access to confidential data. Notions, like user-level
security, encrypted records, and wall-stay firewalls, conceptualize the multidimensional
nature of database security and move beyond checking the password as one aspect of
data protection to altogether creating an inclusive data protection strategy.

Apart from the risk, we have discussed clustered indexes, and touching on SQL join
commands and the utilization of stored procedures and triggers has added insight into
the advanced techniques of data retrieval and automation tasks. The fact that today’s
database management systems empower database designers to easily manipulate data
from queries to triggers mirrors the fact that modern DBMS systems provide the
required power and flexibility (Kobeissi et al., 2023).

2
References:

Kobeissi, M., Assy, N., Gaaloul, W., Defude, B., Benatallah, B., & Haidar, B. (2023).
Natural language querying of process execution data. Information Systems, 116,
102227.
Qi, C.-c. (2020). Big data management in the mining industry. International Journal of
Minerals, Metallurgy and Materials, 27(2), 131-139.

You might also like