Database basics 2
Database basics 2
development
2.1 Study the Problem
2.2 Determine the Requirement
2.3 Design the Database
2.3.1 E.R Modeling
2.3.2 Data Dictionary
2.3.3 Normalization
2.4 Create the Database
2.5 Design the application
2.6 Create the Application
2.7 Test the application
🠶 1. The Database Initial Study:
🠶 In the Database initial study, the designer must examine the current
system’s operation within the company and determine how and why the
current system fails. The overall purpose of the database initial study is
to:
🠶 • Define objectives.
• Will the system interface with other existing or future systems in the company?
• Will the system share the data with other systems or users?
d. Define Scope and Boundaries:
🠶 The designer must recognize the existence of two sets of limits: scope
and boundaries. The system’s scope defines the extent of the design
according to operational requirements. Will the database design
encompass the entire organization, one or more departments within the
organization, or one or more functions of a single department? Knowing
the scope helps in defining the required data structures, the type and
number of entities, the physical size of the database, and so on.
🠶 The proposed system is also subject to limits known as boundaries,
which are external to the system. Boundaries are also imposed by
existing hardware and software.
🠶 Database Design:
🠶 The second phase focuses on the design of the database model that will
support company operations and objectives. This is arguably the most
critical DBLC phase: making sure that the final product meets user and
system requirements. As you examine the procedures required to
complete the design phase in the DBLC, remember these points:
🠶 • The process of database design is loosely related to the analysis and
design of a larger system. The data component is only one element of a
larger information system.
🠶 During this step, the DBA tests the database to ensure that it maintains
the integrity and security of the data. Data integrity is enforced by the
DBMS through the proper use of primary and foreign key rules. In
database testing you must check Physical security allows, Password
security, Access rights, Data encryption etc.