StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database Management System - Coursework Example

Cite this document
Summary
The paper "Database Management System" discusses that the basic security requirement is identifying the user, the system user must be well known.  They should be identified before their privileges can be determined and can be given access rights so that user action can be audited…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Database Management System
Read Text Preview

Extract of sample "Database Management System"

Software Development Question A) Before Database Crash Set online database redo log Most databases has an online redo long. The background activites of the database uses the online redo log so that it can recover all record changed when a failure happen through the associated instance. Every record will contain both the the old and the new data. Every redo record will contain all values both new and the old values to the rollback block. 2. set the archived redo log Usually, you can configure a database to archive files of the online redo log by the time they fill. This online redo log file will uniquely be identified in their log sequence number hence this will make up the archived redo log. When archiving online redo log files previous redo log information is also preserved for tasks such as media recovery. You can set the pre-allocated online redo log file continue to be in use for storage of the resent database changes. 3. Set the redo log and rolling forward This is a set of the operating system files which keep record of all changes made in any database buffer, these changes include data, rollback segments and index, these a\changes are recorded whether they are committed or not committed. Every redo entry is a combination of vector like structure illustrating atomic change to the database. Always the redo secures changes made to database buffer in the memory which has not been written to a data file. After database crash 1. Identify the corrupted database After the crash identify the corrupted or crashed database. Once you identify the corrupted database investigate the possible cause of the failure. 2. Use database recovery software Once you have established the cause of the crash use database recovery software to recover the crashed database from the crashed database. In the process of database recovery make sure you restore it to the point where the database was that is ensuring you have the latest database data that was recorded before it had crashed. Question 1(B) Updating data Since changing of database information before doing anything on the problem at hand I will back up the database so that I may avoid future problems which may arise due to change of database records. After the database backup now I will interrogate the user on what kind of data was entered wrongly. Depending on the nature of the information I may take another action by involving the relevant authorities before I make any changes. After getting the green light on what to do I will now make correction by updating the information so that the system can give the right information. Question 2(A) Importance of data ware housing in organization management decision support. Business progress evaluation Data warehousing help in having the current and the previous data on the organization performance. Customer retention To evaluate the retention of customers is by queering the data ware house to determine whether the older customers still make transactions if not the organization should make follow up in order to bring them back on board. Management decision support The presence of information will have a great impact on the decision made by the top management of an organization. Question 2(B) I. Parallel server technology Parallel server technology coordinator looks individual operation in a SQL statement’s execution plan and then determines way in which each row operated on in the operation should be divided or shared among the parallel execution servers. The absence of parallel query features, the functionality of the SQL commands will always be carried out by single server process. III. Star queries The star query separates business operations data facts, of which has measurable quantitative information about the business, also the dimensions which are descriptive attributes related to the fact information. IV. Bitmapped indexes Bitmap indexes are most helpful in a data warehouse environment because they are generally great when you are only selecting data.. Question 3(A) Authentication The basic security requirement is identifying the user, the system user must be well known. They should be identified before their privileges can be determined and can be given access rights, so that user action can be audited. Authorization Authorization is the ability of a database to give permission of a user to have access of a database information after authentication has been done. Audit Auditing is the monitoring and recording of selected user database actions. Question 3 (B) SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. Example txtUserpassword = getRequestString("UserPassword"); txtSQL = "SELECT * FROM UserTable WHERE Userpassword = @0"; db.Execute(txtSQL,txtUserpassword); (II). Detecting SQL injection 1. Presence of Addition of a UNION clause 2. Presence of Addition of a foreign or strange subquery 3. Presence of Additional dummy conditions in the WHERE clause such as a=a or 1=1 4. Presence of SQL where supplied packages are called in inappropriate places 5. Presence of Access being made to system tables and/or application user and authentication tables 6. Presence of SQL in which the WHERE clause has been truncated with a comment. 7. Presence of Multiple errors indicating that select clauses have the wrong number of items or wrong data types 1. Indicates someone trying to create an extra select using a UNION 8. Presence of SQL accessing a honey pot row Preventing SQL injection Use BIND variables For one to prevent SQL injection should use bind variables all the time Create white lists Construct SQL from a list, not from user input Check for the use of || / " Check for high frequency of errors Question 3(C) To avoid the data manipulation by intruders To ensure data integrity Question 3(D) Enhance system security Promote data integrity Scalability: Determine the predictability of your data growth. Key management needs: From a security best practices perspective, management should be an independent entity from backup. Operational integration and management: All encryption options have some operational impact, but the specifics vary.  Question (4) 9. Roles in database management They ensure data integrity by ensuring there is limits of access among different system users at different levels of the organization. Information security some people may not have access to other information in the database since they do not have the rights of access. Question 4(II) a. Amy can update employees this is because the users in role 1 have the rights to update the content of the data base b. delete records since role to is granted to role one it mean that amy can delete records from the database. c. Explain why two different error messages are given in these circumstances. In the first one user has no privileges for changing any information. In error two the user privileges are also limited d. The view can be used to implement security at this level by ensuring all data in both row and column is consistent with the required data. e. In the columns for the view, the permissions for a column name apply across a CREATE VIEW or ALTER VIEW statement, regardless of the source of the underlying data. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database server manager Coursework Example | Topics and Well Written Essays - 1250 words”, n.d.)
Database server manager Coursework Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1693594-database-server-manager
(Database Server Manager Coursework Example | Topics and Well Written Essays - 1250 Words)
Database Server Manager Coursework Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1693594-database-server-manager.
“Database Server Manager Coursework Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1693594-database-server-manager.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database Management System

Object Database Management System

This essay "Object Database Management System" will talk about the organization of databases which use objects as the main measure tool.... The computer program used to control and query a database is known as a Database Management System.... The majority of these applications use a Relational Database Management System (RDBMS) because their data store while using an object oriented programming language for development.... Moreover, the paper will cover the management system for this kind of databases, particularly the implementing aspects....
8 Pages (2000 words) Essay

Database Management System Assignment

This thesis provides a benchmark to assess the performance of storing binary large objects (BLOB) in a relational Database Management System.... This thesis provides a benchmark to assess the performance of storing binary large objects in a relational Database Management System.... Deciding which database system, operating system, or hardware configuration is best suited for the application is now feasible.... The storage and retrieval of these items can be accomplished through a database system using a column type capable of storing binary data (commonly referred to as a "binary large object" or a BLOB)....
19 Pages (4750 words) Assignment

Relational Database Management System

This essay "Relational Database Management System" discusses RDMS, which is employed when it is required to store information about a number of different entities and the relationships that exist between them.... A Table is a basic storage structure of a Relational Data-Base management system and consists of columns and rows.... Relational database components include:• Table• Row• Column• Field• Primary key• Foreign keyA Column is a collection of one type of data in a table....
6 Pages (1500 words) Essay

Enterprise Database Management System

The paper "Enterprise Database Management System" discusses that growing demands of an organization that needs to be managed and the necessity to analyze such data effectively for the betterment of the organization have clearly forced the need for a better data management systems.... Such a demand has yielded in the development of database management Systems.... Every organization needs some sort of information to be stored and accessed all the time and as a result, database management Systems have become an integral part of every organization....
8 Pages (2000 words) Coursework

The Database Management System

The paper "The Database Management System" suggests that good decision-making skills are vital to solving any problems in information and support systems.... The Database Management System allows managers to perform qualitative analysis on data stored in the company's database.... The management information system (MIS) can be described as an integrated collection of people, procedures and databases.... t also uses internal data stored in a computer system to allow users to develop customs reports....
2 Pages (500 words) Essay

Database Management System - Fitness Club

From the paper "Database Management System - Fitness Club " it is clear that Fitness Club is an organization's effort aimed at boosting its staff's job performance by providing them with a health and fitness service to release stress.... To summarize, the current manual club management system is unable to provide an insight into the intricate financial queries that can ascertain the financial costs and identify areas of the club's financial growth....  System CapabilitiesFitness Club management system aims to provide the following system-level capabilities;• Manage Classeso System will store the detailed outline of the various classes (Zumba, Salsa, Combat, Body Conditioning, Pilates, Yoga etc....
7 Pages (1750 words) Case Study

IPR Law Firm's Distributed Database Management System

This paper aims to study the architecture and requirements of the distributed Database Management System of an Intellectual Property Rights Law firm in the United States.... The distributed Database Management System of an IPR law firm is a client/server and 2-tier structure.... Furthermore, the distributed Database Management System acts as a single application that has multiple databases working for it.... ray and Metz postulated that one of the basic purposes of a distributed Database Management System is to place the data in easily accessible places for the users to retrieve it on a regular basis (183)....
10 Pages (2500 words) Term Paper

Relational Database Management System Critique

The paper "Relational Database Management System Critique" focuses on discussing the alternatives of RDBMS and big data under the subtopics of volumes of data, types of data, data storage, and security.... Database Management System (DBMS) was introduced in the 1960s.... A decade later in the 1970s, the Rational Database Management System was introduced which out-shined the old DBMS for various reasons among them is the speed of queries.... DBMS can be defined as computer software or system software for creating, retrieving, updating, and managing databases....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us