University : | Middle East College UniLearnO is not sponsored or endorsed by this college or university. |
---|---|
Subject Code : | COMP1011 |
Module Learning Outcomes
The following LOs are achieved by the student by completing the assignment successfully
1. Manage database instances and database storage
2. Devise and implement database security policies
Assignment Objective
As a Database Administrator, to configure the database server, choose and apply skills relevant client/server environment and manage the data in an organization’s business processes.
Assignment Tasks
1. Submit a work proposal for this assignment on or before 13/06/2020, 23:59 Hrs. which must include:
The work proposal must be submitted in a word file through the Turnitin link available in Moodle
2. Consider faculties (users) of a certain college, initiates remote database connections using the college application and saves attendance of their students in the class. Students’ attendance details are saved in the college database server.
Using the above context as an example, draw the diagram and briefly elaborate on the series of actions done in a transaction server process architecture.
Your solution must include the use of user process, server process, log writer, database writer process and checkpoint process in performing the transaction. Solution should also include the shared memory areas (buffer pool, log buffer and query plan cache) and physical structures (data files and log files).
3. Write the relevant SQL commands for the following. In your own words, briefly elaborate the commands/keywords. Use your first name or College Id while naming the objects.
a. Create a user (e.g. user1) and assign the privilege to connect to the database and create any table (e.g. Table1)
b. Create three more users (e.g. user2, user3 and user4), and assign the privilege to connect to the database.
c. Create two roles e.g. R1 and R2.
d. Role R1 should be assigned the privileges to insert and update records on table created by user1.
e. Role R2 should be assigned the privileges to view the rows of table created by user1.
f. Assign the role R1 to user2.
g. Assign the role R2 to user3 and user4.
h. Login as user2 and insert at least two rows in the table
i. Login as user3 and user4 and view the rows of table
4. Create any two related tables of your choice and insert at least two records in each of the table. Tables should include primary key and foreign key column(s). Demonstrate the usage of views by creating any two views on the created tables. At least one of the view should be based on two tables. Solution should also include the SQL commands to retrieve the data using the views.
Important Policies to be followed
1. Student Academic Integrity Policy*:
MEC upholds the spirit of academic integrity in all forms of academic work and any form of violation of academic integrity shall invite severe penalty. Any benefit obtained by indulging in the act of violation of academic integrity shall be cancelled.
All cases of violation of academic integrity on the part of the student shall fall under any of the below mentioned categories:
1. Plagiarism
2. Malpractice
3. Ghost Writing
4. Collusion
5. Other cases
If the student fails a module and has a proven case of academic integrity violation in this module, the student is required to re-register the module. This is applicable to first and second offenders of plagiarism.
1. Plagiarism
A. First offence of plagiarism
I. If a student is caught first time in an act of plagiarism during his/her course of study in any assignment other than project work, the student will be allowed to re-submit the assignment once, within a maximum period of one week. However, a penalty of deduction of 25% of the marks obtained for the resubmitted work will be imposed.
II. Period of re-submission: The student will have to re-submit the work one week from the date he or she is advised to re-submit.
III. If the re-submitted work is also found to be plagiarized, then that assessment will be awarded a zero mark. Re-submission of the work beyond the maximum period of one week will not be accepted and the assessment will be awarded a zero mark.
Research Ethics and Biosafety Policy
This COMP 1011: Computer Science Assignment has been solved by our Computer Science Experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!