Database Development

Database Development

 

Write a two to three (2-3) page paper in which you:

  1. Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.
  2. Recommend the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.
  3. Suggest three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.
  4. From the software development methodologies described in the article titled, “Process-centered Review of Object Oriented Software Development Methodologies,” complete the following.
    1. Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment. 
    2. Analyze how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.
  • Describe the basic mechanisms for accessing relational databases from various types of application development environments.
  • Explain the key principles of data security and identify data security risk and violations in data management system design.
  • Use technology and information resources to research issues in the strategic implications and management of database systems.
  • Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions.

Dual Assessment of Data Quality in Customer Databases, Journal of Data and Information Quality (JDIQ), Volume 1 Issue 3, December 2009, Adir Even, G. Shankaranarayanan.

Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. Paige.

 

Points: 50

Case Study: Database Development 

Criteria

Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

1. Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.
Weight: 20%

Did not submit or incompletely recommended at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Did not submit or incompletely included a thorough description of each activity per each phase.

Partially recommended at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Partially included a thorough description of each activity per each phase.

Satisfactorily recommended at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Satisfactorily included a thorough description of each activity per each phase.

Thoroughly recommended at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Thoroughly included a thorough description of each activity per each phase.

2. Recommend the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.
Weight: 20%

Did not submit or incompletely recommended the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

Partially recommended the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

Satisfactorily recommended the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

Thoroughly recommended the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

3. Suggest three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.
Weight: 20%

Did not submit or incompletely suggested three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.

Partially suggested three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.

Satisfactorily suggested three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.

Thoroughly suggested three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.

4a. Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment. 
Weight: 15%

Did not submit or incompletely evaluated which method would be efficient for planning proactive concurrency control methods and lock granularities. Did not submit or incompletely assessed how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

Partially evaluated which method would be efficient for planning proactive concurrency control methods and lock granularities. Partially assessed how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

Satisfactorily evaluated which method would be efficient for planning proactive concurrency control methods and lock granularities. Satisfactorily assessed how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

Thoroughly evaluated which method would be efficient for planning proactive concurrency control methods and lock granularities. Thoroughly assessed how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

4b. Analyze how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.
Weight: 15%

Did not submit or incompletely analyzed how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Partially analyzed how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Satisfactorily analyzed how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Thoroughly analyzed how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record- level locking while the database is in operation.

5. Clarity, writing mechanics, and formatting requirements
Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present