Discuss the database server architecture

Assignment Help Database Management System
Reference no: EM132358294

Database Administration Assignment -

Learning Outcomes -

Create and maintain a database server - Critical Thinking, Analytical, Comparing, Contrasting, Decision-making, Researching, Making judgment about complex issues, Communicate conclusions effectively.

Implementing Database security policies - Critical Thinking, Analytical, Comparing, Contrasting, Decision-making, Researching, Making judgment about complex issues, Communicate conclusions effectively.

Tasks - Objectives:

1. Create and maintain a database server.

2. Implementing Database security policies.

Task 1 -

Submit a work proposal for this assignment which must include:

  • Understanding of deliverables - a detail description of deliverables.
  • General overview of proposed plan - initial understanding of solution for the task-2 and task-3.
  • Resources identified.

The work proposal must be submitted in a word file.

Task 2 -

Shams Hospital is one of the leading health care service provider in Oman. It is established in the year 1996 and has a current patient's strength of over 500 patients. The patient belong to different parts of the country. It employs full-time and part-time personnel. It offers various medical services in the field of outpatient and Inpatient. The hospital has an online system operational round the clock.

As a Database Administrator (DBA) working for Shams Hospital, discuss the following:

a) Discuss the various reasons with relevant examples of your own that how Database administrator can provide database security to the Shams Hospital database.

b) Discuss the database server architecture which will include memory structure and storage structure.

Note: Solution for this task (a and 1b) must be written in your own words with relevant diagram wherever necessary and to be written in maximum of five pages.

Task 3 -

a) Discuss the key security features available in the data management software that can be applied for the scenario given in task 2a.

Note: The solution must be written in your own words with relevant examples not exceeding 3 pages. You can use research papers for your reference only and your answer should not be limited to the research paper only. You may refer various other resources and provided references for the same.

b) Consider the scenario given in task-2a and create any four users (e.g. User1, User2, User3, and User4) in the Shams Hospital database and assign the privilege to connect to the database. Out of the four users, one user (i.e. User1) is for doctor and two users (i.e. User2 and User3) are for the managers. The fourth user (i.e. User4) is for the admin staff.

Create two roles with the following privileges:

  • Data_Entry: can only insert and view the records on the table created by User4.
  • HoD: can only edit and delete the records on the table created by User4.

Assign the roles created above to the users as indicated below:

  • Assign the role Data_Entry to the doctor (i.e. User1)
  • Assign the role HoD to the managers (i.e. User2 and User3)
  • For the admin staff (i.e. User4) assign the privilege to create a new table. You may create any new table relevant to the task- 2a scenario.

Your solution must include the necessary SQL commands as screenshots and brief explanation for each of the steps.

Note: The names of the four users must be based on your first name. For example, if your name is Ahmed, the user names should be Ahmed1, Ahmed2, Ahmed3 and Ahmed4. If the user names are inappropriate, marks shall be deducted accordingly.

Note - Need only answer task 2 (a and b) they should maximum 5 pages and task 3 only (a) not more than 3 pages no need to solve (b).

Verified Expert

The security features that can protect the data of the organizations were analyzed and arvhitecture of the server was explained. Security features were implemented in the oracle database. The users were assigned different privileges.

Reference no: EM132358294

Questions Cloud

Financial statements analysis of Walmart : Financial statements analysis of Walmart. Provide a background of firm, I dusty, economy, and outlook for future. Analyze operating efficiency of firm
Discussion on Networked Applications targeted by Botnet : MN502 Overview of Network Security Assignment, MIT Australia. Discussion on Networked Applications targeted by Botnet
Explain the leadership characteristics exhibited in the case : MN601 Network Project Management Assignment, MIT Australia. Explain the leadership characteristics that Erich Taube exhibited in the case
Develop an architectural internetworking design for business : MN503 Overview of Internetworking Assignment - Network Requirement Analysis and Plan. Develop an architectural internetworking design for the business
Discuss the database server architecture : COMP 30021 Database Administration Assignment, Middle East College, Oman. Discuss the database server architecture
Write Theoretical Framework on Oaks International Inc : Write 3 pages on Oaks International Inc. Include the following points: Background information, Theoretical Framework and Conclusion
Write about Oaks International Inc : Write 3 pages on Oaks International Inc. Include the following points: Background information and Theoretical Framework
Build the foundation for a social media application : 2703ICT Web Application Development Assignment, Griffith University, Australia. Build the foundation for a social media application
Provide a system vison and requirement models for subsystem : HS2011 Systems Analysis and Design Assignment Holmes Institute, Australia. Provide a system vison and requirement models for subsystem

Reviews

len2358294

8/17/2019 2:22:37 AM

No Of Pages/Words: 7 or 8 pages. Only answer task 2 (a and b) they should maximum 5 pages and task 3 only (a) not more than 3 pages no need to solve (b). Guidelines - Follow the guidelines mentioned below for your assignment: Code developed (Soft Copy) should be included. Assignment must be submitted through Moodle and it will undergo plagiarism detection test through turnitin. Handwritten assignments / hard copy will not be accepted. Use Page Number & proper References. Assignment should have a Title Page. Title Page should contain the following information - Assignment Name, Section Name, Student name, Student ID Number, and Faculty Name.

len2358294

8/17/2019 2:22:30 AM

The Table of Contents Should have, each deliverable task number, content, page number. Assignment should be typed in your own words using Times New Roman font size 12. Heading should be with Font Size 14, Bold, Underline. Feedback shall be given in Moodle within four days from the last date of submission of work proposal and within one week after submission of final assignment document.

len2358294

8/17/2019 2:22:24 AM

Evaluation Criteria: There will be no marks without a viva. Viva will be used as a means to measure the originality of your work. You would be evaluated on the following: Originality of answer, i.e. writing in your own words with some amount of referenced material. Simply copy and paste of information must be avoided. Oral examination: Your Assignment marks are based on the VIVA which will be conducted upon submission of assignment. The VIVA will be based on the tasks given in the assignment. ZERO marks will be awarded to the student if she / he is absent for VIVA. Correct information analysis and presentation in document form. Adequate referencing and citation provided. Examples can be provided if needed.

Write a Review

Database Management System Questions & Answers

  Percentage of elapsed time

Let us assume that a program takes 400 seconds of elapsed time to execute. Out of these 400 seconds, 320 seconds is the CPU time and the rest is I/O time. What percentage of elapsed time is spent on I/O operations?

  Create a query using list of values match

Create a list the holds the student grade (A, A-, B+,..), modify the appropriate table to accept only the grades in the list(you need to explain why you selected the above table to record the student grade).

  Design a sequence diagram for the use case

CI5310 Database & UML Modelling - During the elaboration phase, a use case diagram is required to capture the user requirements for the system.

  Transform the table into one or more tables in bcnf

Transform this table into one or more tables in BCNF. State the primary keys, candidate keys, foreign keys, and referential integrity constraints.

  Create an entity-relationship diagram of a database

create an entity-relationship diagram of a database for the ACF company and Set the minimum and maximum cardinalities of the relationships among entities

  Evaluate maximum rate at which data can be read from disk

What is the maximum rate at which data can be read from disk, assuming that we can only read data from one surface at a time? What is the average rotational latency?

  Prototyping part of a database systems application

The assignment comprises designing and prototyping part of a database systems application. Students should form themselves into groups of up to 4 members and pass details of the members of their group to the course leader.

  Create an entity diagram showing all your attributes

Create an entity/relationship diagram (ERD) showing all your entities, attributes, and relationships. Sketch your ERD by hand or use a drawing program. Your diagram must beon a single page.

  Explain importance of denormalization as part of data design

Identify questions that need to be addressed as part of physical design process. Describe the importance of denormalization as part of data warehouse design.

  What is difference between authentication and authorization

What is the difference between authentication and authorization? What are six problems with using operational data for BI processing? What is an SQL injection attack? What is the difference between a database and a DBMS?

  Determine what type of database they are

You are the Database Administrator for "Data R Us" and you have been asked to research a set of online databases and determine what type of database they are; based of the four explanations of the DBMS above

  Write a research paper about privacy preserving data mining

Write a minor research paper about the Privacy Preserving Data Mining. Two parties owning confidential databases wish to run a data mining algorithm on the union of their databases

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd