Write the introduction and corporate data security practices

Assignment Help Database Management System
Reference no: EM132358606

Database Systems Administration Assignment -

Learning Outcomes - This assignment will assess the following learning outcomes:

1. Create and maintain a Database System.

2. Design an enterprise data model that incorporates all of the data used by an organization's business processes.

3. Devise and implement database security policies.

Analyze the following scenario and answer the following questions:

Muscat Opera House wants to maintain records about the different concerts performed in a season. A concert is identified by a concert number and another attribute is concert date, which consists of month, day, year, and time. For each concert there is one conductor, a person who will conduct the concert. Information stored about conductor includes conductor id and conductor name. A conductor may conduct any number of concerts, or may not conduct any concerts. A concert includes the performance of one or more compositions, which are music or songs to be performed in a concert. A composition may be performed at one or more concerts, or may not be performed.

A composition has composition id, composer name, composition name as attributes. Each composition may require one or more soloist, or may not require a soloist. A soloist is a person who performs a given composition on a concert. A soloist may perform one or more compositions or may not perform any composition. Attributes of soloist are soloist id and soloist name. Muscat Opera House wishes to record the date when a soloist last performed a given composition.

Task 1 - Work Proposal: Submit a work proposal for this assignment which must include:

  • Understanding of deliverables - a detail description of deliverables
  • General overview of task 2 - initial understanding of solution to tasks 2 and 3.

Task 2: Discuss about the following:

a) architecture of ORACLE Memory Structure. [Your research must covers Oracle SGA, PGA and User Session Information].

b) ORACLE Disk Utilization Structures.

(The total number of words for this session would be max. 250 words in addition to relevant diagrams)

Task 3: As a database administrator perform the following tasks for the scenario given above:

i. Create separate physical structures for the new schema as per OFA guidelines [Create and rename the table space].

ii. Create a Schema with appropriate privileges.

iii. Identify the tables from above scenario and create database tables with correct relationships and constraints.

iv. Create one complex VIEW to any two tables you created above and select data by using it.

v. Create two SEQUENCES and the use it for insert data into any two different tables.

Task 4: "Oracle's security practices are multidimensional and reflect the various ways Oracle engages with its customers"

In the view of above statement choose an organization in Sultanate of Oman where the security of the data is critical as well as strict security policies are applied on each transactions.

You answer should cover the following:

a) Write the introduction and corporate data security Practices.

b) Discuss about the Security Practices imposed in database server of the organization chosen.

c) Discuss about Oracle Software Security Assurance.

You need to provide the solution to ALL questions. You are required to use appropriate literature review and use of many library resources to complete this assignment. You will achieve maximum marks for using correct Citation and CU-Harvard Referencing Style in your assignment.

Verified Expert

Oracle software was used for the task. The memnory archtitecture and disk storage structure of the oracle were explained. The queries asked in the software were solved using oracle software..the security practices prevailing in the organization were highlighted.

Reference no: EM132358606

Questions Cloud

Explain the difference between virus-worm and trojan : Explain the difference between a virus, a worm, and Trojan. Explain why it is safer for administrators to use two different accounts when working with computer.
Signature-based prediction of cybersecurity threats : Discuss THREE (3) arguments which support the use of Behavioral Analysis over Signature-based prediction of Cybersecurity Threats.
Risk identification and impact assessment : Risk identification and impact assessment. Risk management and reporting. Identify and critically analyse the impact of possible risks for the case study.
The physical body of descartes : What is the nature of the "I" for Descartes and why doesn't it refer to the physical body of Descartes?
Write the introduction and corporate data security practices : COMP 1011 Database Systems Administration Assignment, Middle East College, Oman. Write the introduction and corporate data security Practices
Discussing specific species of plant and the benefit : Writing a full paragraph (a 150-words minimum) for your initial blog post discussing a specific species of plant and the benefit you chose.
Components of course change proposal capstone project : Confidence to further develop and synthesize progressively more complex assignments that constitute components of course change proposal capstone project
Create effective organisations work environment : MGT600 Management, People and Teams Assignment - Part B: Peer Review, Torrens University, Australia. Create effective organisations work environment
Select piece of land where hypothetical sampling of soil : Select a piece of land where a hypothetical sampling of soil could be made. You may choose land you are familiar with or a digital option.

Reviews

len2358606

8/19/2019 12:20:35 AM

Guidelines - Follow the guidelines mentioned below for your assignment: Assignment documents must be submitted through Moodle. Handwritten assignments / hard copy will not be accepted. ? Use Page Number & References should be academic quality from quality sources and Harvard Reference Notation should be used. Assignment should have a Title Page. Title Page should contain the following information - Assignment Name, Section Name, Student name, Student ID Number, Faculty Name and The Table of Contents Should have, each deliverable task number, content, page number. Assignment should be typed in your own words using Times New Roman font size 12. Heading should be with Font Size 14, Bold, Underline.

len2358606

8/19/2019 12:20:30 AM

Evaluation Criteria - Detailed evaluation criteria has been given in evaluation grid at the end of the document. Lab demonstration and written viva. There will be no marks without written Viva . The written Viva is to measure originality of your work. ZERO marks will be awarded to the student if she / he is absent for VIVA. During presentation, you may asked to write SQL queries for checking the originality of the student work. You are required to use appropriate literature review and use of many library resources to complete this assignment. You will achieve maximum marks for using correct Citation and CU-Harvard Referencing Style in your assignment.

Write a Review

Database Management System Questions & Answers

  Open source relational database management system

Imagine you are a part of a team that is tasked with writing a mobile application (app) that will allow users to send pictures to their friends. The manager does not want to waste time creating code modules.

  Create an xy plot of ecg vs. time

Create an XY plot of ECG vs. time, and place the plot on the Plots worksheet. Give the plot an appropriate title and labels for axes, and adjust various parameters of the plot to make it look pleasing and professional. Resize it to approximately..

  Write the sql statements to create the database structures

ITECH 1006 - Database Management Systems Assignment. For this assignment you will implement and query a database from a supplied ER Diagram and Schema. You will be required to write the SQL statements to create the database structures, to fill the ..

  Encryption in ensuring confidentiality

Discuss the role of encryption in ensuring confidentiality; use a popular encryption to make your point if needed.

  Write the file, type wq!, and then press enter

Enter the following text and make sure you press Enter at the end of each line. (Each row is considered an employee record with colons separating the fields. The first field is the employee number. The second field is the employee name, and the th..

  What are you researching and what are you doing

What are you researching and/or what are you doing? A discussion about why the research needs to be accomplished clearly describing the technological problem.

  Compare the pros and cons of consolidating data

Compare the pros and cons of consolidating data on a SAN central data facility versus the dispersed arrangement it replaces. Evaluate the issues raised from the Carlson SAN mixing equipment from a number of vendors and determine the management option..

  Develop a flowchart and provide a brief explanation for it

Develop a flowchart and provide a brief explanation for it

  Use cases perform a requirements analysis for the case study

Use Cases Perform a requirements analysis for the Case Study

  Implement drupal workloads on the aws cloud

NEST 206 Cloud Infrastructure - Create a webpage on your Drupal application that allows you to write posts and upload media - Write a small post on your blog

  Return the empid firstname lastname for the employee

Return the empid, firstname, lastname, and city for the employee with empid 9. Return a list of employee id's, last names, and first names for employees hired on or after January 1, 2004. Retrieve the product name and unit price of all products that ..

  Case study- data breaches and regulatory requirements

Case Study: Data Breaches and Regulatory Requirements, The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd