0% found this document useful (0 votes)
27 views18 pages

Dynamic Web Design A Database A1

The document outlines the assessment tasks for ICTWEB502 and ICTDBS502 courses, focusing on dynamic web pages and database design. It includes student instructions, performance and knowledge evidence requirements, assessment conditions, and a marking guide. The student, Ameer Hamza, has completed various tasks related to web programming concepts and database design, with some satisfactory and some requiring resubmission.

Uploaded by

Irfan Haider
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views18 pages

Dynamic Web Design A Database A1

The document outlines the assessment tasks for ICTWEB502 and ICTDBS502 courses, focusing on dynamic web pages and database design. It includes student instructions, performance and knowledge evidence requirements, assessment conditions, and a marking guide. The student, Ameer Hamza, has completed various tasks related to web programming concepts and database design, with some satisfactory and some requiring resubmission.

Uploaded by

Irfan Haider
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

ICTWEB502 – Create Dynamic Web Pages

ICTDBS502 – Design a Database

ASSESSMENT 1 TASK

Q & A – Dynamic Web Pages, Database Design

ICT50118 Diploma of Information Technology


ASSESSMENT 1 ACTIVITY COVER SHEET

Please ensure this form is fully completed prior to submitting.

This page should be on the front of your assessment and needs to be easily accessible.

Student Number: Win200209

Student Name: Ameer Hamza

ICTWEB502 – Create Dynamic Web Pages


Subject: ICTDSB502 – Design a Database

ICT50118 Diploma of Information Technology


Course:

STUDENT DECLARATION
I hereby certify that:
1. This assessment task is my own work based on my personal study/research and not the work of
another student and/or source.
2. I have acknowledged all material and sources used to prepare this assessment task.
3. I have not plagiarised or copied any part of this assessment task from the work of any other student
or source either. (I know the penalties for plagiarism include $200 re-assessment fee)
4. This assessment task has not previously been submitted.
5. I am aware of the requirements set by my Trainer & Assessor.
6. I have retained a copy of this assessment task for my own records.
7. I have completed all my assessments, tasks & activities (on Moodle®) successfully.

Student’s Signature: Ameer Hamza Date: 31 January 2025

/conversion/tmp/activity_task_scratch/845445466.docx
Page 2 of 18
Student instructions

This assessment must be based on where you work (or have worked most recently).

This Assessment is designed to test the knowledge that you have acquired throughout the unit. Use the
following tips to help you answer the questions:

Read each question carefully. Check with your trainer or assessor if you are not sure what the question is
asking.

HINT: Use these questions as subheadings to create a business style report to answer your assessment

Your response to each question should aim to provide enough information to answer the question. In most
cases, this can be done with just a few paragraphs. Don’t forget to refer to attachments under the heading
(question) applicable, e.g. ‘See attached email’.

Important: Your assessment must contain this coversheet and your own coversheet (for your “report”)

Your answers & assessment submission must be professional in style (Business), content and format.
Maximum font size 11 points: Font Arial or Times New Roman; single spacing; clear paragraphs with
appropriate punctuation, spellchecking and final submission will need to be proof-read. (i.e. few missing
words or typo’s)

In particular:
- Use clear, non-discriminatory language
- Avoid the use of jargon
- Write clearly using plain English
- Consider your target audience
- Ensure that your responses meet the needs of the target audience (in this case your trainer or
assessor).
- All of your work must be original.

ICTWEB502 – Create Dynamic Web Pages

Performance Evidence

Evidence of the ability to:


- include client and server-side dynamic content in each web page
- create and debug code
- test web page and code on at least two different web browsers and at least two different devices
- comply with organisational and legislative standards and procedures – not same

/conversion/tmp/activity_task_scratch/845445466.docx
Page 3 of 18
Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:
- web programming concepts, including:
o authentication and web security
o hypertext transfer protocol (HTTP)
o session management
o stateless programming
- types of technologies, including:
o programming control structures
o hypertext mark-up language (HTML) and mark-up languages
o cascading style sheets (CSS)
o syntax and uses of programming languages
- client and server-side scripting and its application to dynamic web page design
- data storage requirements
- debugging methods
- coding techniques
- cyber security protocols and procedures
- legislative and organisational procedures and standards applicable to creating dynamic web pages.

Assessment Conditions

Skills in this unit must be demonstrated in a workplace or simulated environment where the conditions are
typical of those in a working environment in this industry.
This includes access to:
- technical requirements
- a development environment
- a server
- a database server
- web browsers and devices
- web page testing and debugging tools required for creating dynamic web pages
- hardware, software and its components required for creating dynamic web pages.
- Assessors must satisfy NVR/AQTF assessor requirements.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 4 of 18
ICTDBS502 – Design a Database

Performance Evidence

Evidence of the ability to:


- design, develop and implement a simple database on at least one occasion.
- document the database requirements, design plan and procedures.

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:
- process for conducting data analysis, data types and data structures, query and report design
- data modelling procedures related to conceptual data model development
- data redundancy identification methodologies
- database management system (DBMS) design phase fundamentals
- encryption and authentication database security features
- functions and features of data types and data structures, and of databases
- logical design concepts, including those for data structures, queries screens and reports
- object model design concepts, including those for data structures, queries, screens and reports
- database scalability.

Assessment Conditions

Skills in this unit must be demonstrated in a workplace or simulated environment where the conditions are
typical of those in a working environment in this industry.

- industry standard equipment and materials


- industry standard database software
- network and other systems required for remote or multi-user access
- organisational requirements and deliverables
- computer-aided software engineering (CASE) or diagramming software.
- Assessors must satisfy NVR/AQTF assessor requirements.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 5 of 18
Marking and Criteria guide:
Assessor and student must read this carefully before assessment.
- All parts of the assessment must be completed successfully in accordance with the guidance provided
in the Marking guide for the student to achieve competence in this unit.
- Students & assessors must note that professionally critical aspects/concepts must be included (e.g.
develop an action plan).
- All parts (criteria) in the marking guide must be completed successfully for the student to achieve
competence in this unit

EDUCATOR to complete

Observation/assessment Satisfactory/not Comments


Satisfactory
All assessments, tasks & activities (on Refer to comments below and resubmit. Keep up
Moodle®) successfully
NS the good work.

Assessment 1 Task 1 – Q & A – Dynamic Web Pages


1. The student has explained web Ameer has explained web programming concepts
programming concepts for for authentication and web security. Answers to
authentication and web security. S this question is to have a word count of 75-250
Answers to this question is to have words
a word count of 75-250 words
2. The student has explained web Ameer has explained web programming concepts
programming concepts for for hypertext transfer protocol (HTTP). Answers
hypertext transfer protocol (HTTP). S to this question is to have a word count of 75-250
Answers to this question is to have words
a word count of 75-250 words
3. The student has explained web Ameer has explained web programming concepts
programming concepts for session for session management. Answers to this
management. Answers to this S question is to have a word count of 75 -250 words
question is to have a word count of
75 -250 words
4. The student has explained web Ameer has explained web programming concepts
programming concepts for for stateless programming. Answers to this
stateless programming. Answers S question is to have a word count of 75-250 words
to this question is to have a word
count of 75-250 words
5. The student has described the Ameer has described the internet technologies
internet technologies regarding regarding programming and control structures.
programming and control Answers to this question is to have a word count
structures. Answers to this
S of 75
question is to have a word count of
75

6. The student has described what is Ameer has described what is syntax. (word count
syntax. (word count of 50 words)
S of 50 words)

7. The student described the uses of Ameer described the uses of syntax in
syntax in programming languages. S programming languages. (word count of 50
(word count of 50 words) words)

/conversion/tmp/activity_task_scratch/845445466.docx
Page 6 of 18
8. The student has described what is Ameer has described what is HTML (word count
HTML (word count of 50 words)
S of 50 words)

9. The student has described what is Ameer has described what is CSS (word count of
CSS (word count of 50 words)
S 50 words)

10. The student has explained the Ameer has explained the difference between
difference between server-side server-side technology and client-side technology.
technology and client-side S (word count of 75 words)
technology. (word count of 75
words)

Assessment 1 Task 1 – Q & A – Dynamic Web Pages


11. The student has determined why Ameer has determined why server-side, client-
server-side, client-side is used in a side is used in a dynamic website environment
dynamic website environment
S (word count of 75 words)
(word count of 75 words)

12. The student has determined what Ameer has determined what does it mean by data
does it mean by data storage storage requirements? (word count of 75 words)
requirements? (word count of 75
S
words)

13. The student has reported on the Ameer has reported on the different debugging
different debugging techniques and S techniques and methods. (word count of 75
methods. (word count of 75 words) words)

14. The student has reported on the Ameer has reported on the different types of
different types of coding coding techniques. (word count of 75 words)
techniques. (word count of 75
S
words)

15. The student has determined what Ameer has determined what cyber security and
cyber security and security security protocols are used in the protection of a
protocols are used in the protection S website environment. (word count of 100 words)
of a website environment. (word
count of 100 words)

16. The student has reported on the You need to review the tutorials and do research
standards (legislation and regarding the current ICT Legislation as well as for
organisational procedures) that NS Web Development.
applicable when creating a website

Assessment 1 Task 2 – Q & A – Database Design


17. The student has answered the Ameer has answered the question as to what is
question as to what is the process S the process for conducting data analysis.
for conducting data analysis.
18. The student has explained the Ameer has explained the different types of data
different types of data types and S types and data structures.
data structures.
19. The student has explained what is Ameer has explained what is a query?
a query?
S

/conversion/tmp/activity_task_scratch/845445466.docx
Page 7 of 18
20. The student has answered the Ameer has answered the question what does it
question what does it mean by S mean by reporting design?
reporting design?
21. The student has answered the Ameer has answered the question what is the
question what is the different types different types of model design processes for a
of model design processes for a
S database?
database?
22. The student has answered the Ameer has answered the question what does it
question what does it mean by data S mean by data redundancy?
redundancy?
23. The student has answered the Ameer has answered the question what is meant
question what is meant by S by identification methodologies?
identification methodologies?
24. The student has answered the Ameer has answered the question what is a
question what is a database S database management system (DBMS)?
management system (DBMS)?
25. The student has given 2 examples Ameer has given 2 examples of a DBMS.
of a DBMS.
S

26. The student has answered the Ameer has answered the question what does it
question what does it mean to use mean to use encryption and authentication in a
encryption and authentication in a
S database?
database?
27. The student has answered the Ameer has answered the question what does it
question what does it mean by S mean by Database Scalability?
Database Scalability?
28. The student has answered the Ameer has answered the question what is a Data
question what is a Data Dictionary?
S Dictionary?

Practical Checklist

Assessor to complete:
Did you observe the student? Yes

Further comments required

Assessor Comments

Ameer has answered all the questions satisfactory in order to determine the rest of the
project requirements and to gather previous knowledge and to understand ICT Terminology
but needs to implement information regarding the current ICT Legislation. Keep up the
good work Ameer and resubmit.

Resubmission required Yes

Date resubmission must be handed in: 20th November 2020

Assessor’s name and signature: VM

Date: 31 January 2025

/conversion/tmp/activity_task_scratch/845445466.docx
Page 8 of 18
Task 1 – Q & A – Dynamic Web Pages

1. Explain web programming concepts for authentication and web security.


Answers to this question is to have a word count of 75-250 words

Authentication:
In simple words, authentication is a process or action to prove whether the something’s identity is true or not. It is
genuine or real. It is cycle of confirming the identity of client whether it belongs to this system or not.

In web programming, authentication as mentioned here it is a cycle of confirming the identity of client r. It is
combination of client’s id and password. The Id is unique for each user. It is the traditional logic that a user enters his
email id and password and then using the programming logic, it is checked whether this Client presents in the data base
or not. If he exists, he allows to use this system else not. There are also verifying providers like OpenID and Oath
which provides the service of authentication.

Web Security:
Web security means to secure the system and make a defensive parameter against the external attacks from the
attackers. It includes various type of attacks from the attackers. There basic aim is to steal the data from this. There are
different tools and techniques available to provide web security. The bank hire third parties which provide them web
security for their web system.

The techniques and tools include:

1. Authentication, to block the access of unwanted or un-authorized user to the system.


2. Hexing algorithms, Algorithms like sh256 and md5 are used in order to protect the attackers to
breach the passwords.
3. Firewalls provide a barrier from the attackers.

2. Explain web programming concepts for hypertext transfer protocol (HTTP).


Answers to this question is to have a word count of 75-250 words

HTTP:
HTTP is an application-level convention. HTTP (Hypertext Transfer Protocol) is the plan of rules for moving
archives, for instance, text, reasonable pictures, sound, video, and other blended media records, on the
World Wide Web. At the point when a web customer opens their web program, the customer is in an indirect
way using HTTP. HTTP is an application show that unexpected spikes sought after for top of the TCP/IP set-
up of conventions (the foundation conventions for the Internet).

The default port is TCP 80, anyway various ports can be used moreover. It gives a standardized way to deal
with PCs to talk with each other. It is connectionless, media autonomous and stateless, HTTP is
connectionless, and it is a prompt outcome of HTTP being a stateless show. The worker and customer think
around each other simply during a current solicitation

/conversion/tmp/activity_task_scratch/845445466.docx
Page 9 of 18
The HTTP convention is a requesting/response show reliant on the customer/worker-based designing where
web programs, robots and web lists, etc act like HTTP customer and the Web worker carries on like a
worker.

Server:
The HTTP customer sends a solicitation to the worker as a solicitation methodology, URL, and show
variation, followed by a MIME-like message containing request modifiers, customer information, and possible
body content over a TCP/IP affiliation.

Client:
The HTTP worker responds with a status line, including the message's show structure and a victory or botch
code, followed by a MIME-like message containing worker information, substance meta information, and
possible component body content.

3. Explain web programming concepts for session management. Answers to


this question is to have a word count of 75 -250 words

Session management:
Web applications are very superior and normally handle complex activities which take more than one sets of
request/response to finish, this expects something to follow the current situation with activity. These
applications additionally present custom-made substance to every client. This requires distinguishing a client
over different request. HTTP uses customer worker plan and uses TCP as its transmission convention and
different solicitations can be sent over just a single TCP affiliation, yet these are similarly seen as free by
customer and worker. Destinations and projects use HTTP to pass on, and a gathering is a movement of
HTTP solicitation and trades began by a comparative customer.

Seek parameter: Token that speaks to the present status of a multistep cycle or discriminates client can be
put away by the server on the site page in a structure field, which will be auto-presented each time client
plays out an activity. Token have data of info fields. This can be submitted as either a GET or a POST
request parameter. The request parameter in GET uses URL history to store and POST boundaries demand
as a body and doesn’t store URL history

Cookies: Cookies are name-esteem matches that are put away on the program and submitted consequently
in ensuing solicitations. The server produces them and sends them to the client by utilizing "set-cookies"
HTTP header. Cookies is submitted utilizing "cookies" Header .The most widely recognized limits are-
territory, way and ends while the orders are – "secure" and "http only.

4. Explain web programming concepts for stateless programming. Answers to


this question is to have a word count of 75-250 words

Stateless programming:

Stateless writing computer programs is a model wherein the errands (limits, methods, techniques, whatever
you call them) you execute are not fragile to the state of the count. That infers all the data used in a
movement are passed as commitments to the action, and all the data used by whatever undertakings
summoned that action are passed back as yields. Before long, this suggests the program must have Value
semantics (it isn't permitted to alter shared/related data structures, and things don't have a character), must
not use worldwide or class components, and all information/yield must be managed uncommonly, (for

/conversion/tmp/activity_task_scratch/845445466.docx
Page 10 of 18
instance, through monads or by hanging an I/O state through any bits of the estimation that perform I/O).
Exclusion managing may similarly make the count dignified.

The benefits of stateless programming join the way that you never need to consider what else an action you
have to use does, other than what it says. In a stateless program, what a movement does is what it returns.
A resulting advantage is that stateless counts are much less difficult to parallelize; since no part of the
figuring will change any data structures, you don't get data races.

5. Describe internet technologies regarding to programming and control


structures. Answers to this question is to have a word count of 75-250
words.

Internet technologies regarding to programming and control structures:


A control structure is a square of programming that analyses factors and picks a course where to go reliant
on given limits. The term stream control nuances the course the program takes (what bearing system control
"streams"). Thus, it is the basic powerful cycle in figuring; stream control chooses how computer will respond
when given certain conditions and limits. There is three essential control structure of stream of programming
or control stream

Sequence
Sequential logic as the name proposes follows a chronic or successive stream where the stream
depends upon the plan of rules given to the machine. But in the event that new bearings are given, the
modules are executed in the prominent plan.

Conditional
Selection Logic incorporates different conditions or limits which picks one out of a couple of made
modules. The structures which use such a reason are known as Conditional Structures and these are

 Single Alternative
 Double Alternative
 Multiple Alternative
Iterative
The Iteration justification uses a circle which incorporates an intermittent enunciation followed by a
module known as the body of a circle. There are two kind of structures and these are

 Repeat For loop


 Repeat While loop

6. Describe what is syntax. Answers to this question is to have a word count of


50 words

Syntax:
Syntax is a linguistic structure of sentences. The configuration wherein words and expressions are ordered
to make sentences is called syntax and it is sample on which sentences are written, readable and
understandable so every language contains its syntax for inscrutability and provide ease to vendors.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 11 of 18
7. Describe the uses of syntax in programming languages. Answers to this
question is to have a word count of 50 words

Uses of syntax:
Every language has its own rules and arrangements and specific methods to define its implementation and
workings, so every language uses different syntax to define its rule. Syntax made it easier to understand,
readable, writeable and etc. By understanding the syntax programmers can easily identify the language.

8. Describe what is HTML Answers to this question is to have a word count of


50 words

HTML:
HTML represents Hypertext Mark-up Language .It allows the customer to make and structure regions,
entries, headings, joins, and fastens for pages and applications. HTML (Hypertext Mark-up Language) does
not make websites functions dynamic and it is like that writing something on MS word and arranging it
statically.

9. Describe what is CSS Answers to this question is to have a word count of 50


words

CSS:
CSS represents Cascading Style Sheets. It serves HTML how to display the content and design the page
and content that how it will look like which colour will be suited and which style is preferable for the specific
area and text. It is only responsible of how Html elements will show.

10. Explain the difference between server-side technology and client-side


technology. Answers to this question is to have a word count of 75 words

Server-side technology is used at the backend, where the source code isn't discernible or concealed at the
customer side (program). Of course, customer side innovation is used at the front end which customers can
see from the program.

Exactly when a worker side substance is dealt with it confers to the worker and roll out powerful
improvements. As against, customer side innovation needn't bother with mess with any worker association
and limit the heap.

11. Determine why server-side, client-side is used in a dynamic website


environment Answers to this question is to have a word count of 75 words
A Server-side Dynamic page whose advancement is obliged by mentioning Server dealing with
Server-side substance. In Server side, boundaries choose how the new pages will continue and run on
customer side page.

A customer side Dynamic page gauges the page using HTML code runs in program as it loads. JavaScript
and other code choose the way wherein the HTML in the got content is render into the Document Object
Model.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 12 of 18
12. Determine what does it mean by data storage requirements? Answers to this
question is to have a word count of 75 words
Data Capacity prerequisites is an advancement comprising of PC fragments and recording media used to
store robotized data. It is a focal limit and most computers. A computer's CPU is what checks data by
performing figuring. Generally, all computers utilize a progressive system of limit that puts quick yet costly
and hardly any stock options close to the processor and slower yet better decisions.

13. Reported on the different debugging techniques and methods. Answers to


this question is to have a word count of 75 words
Reported on different debugging techniques and methods

The technique which is used to find and resolve the error from any program is called debugging. There is a
lot of techniques which is used to debug the program by using different tools and some are listed here

 Brute force attack


 Induction-deduction strategy
 Backtracks
 Data insertion testing
 Bug detector tools
 Bug clusters
 Binary search
The bug may not be the place where you are finding so keep minded open and always answered to other
parts.

14. Report on the different types of coding techniques. Answers to this question
is to have a word count of 75 words

Coding Techniques:
The first and the most fundamental tip, is to keep your code as straightforward and coherent as could
reasonably be expected. As individuals develop and gain insight as coders, they will in general overlook one
of the most fundamental tips that they got in their beginning of programming leave remarks. Be your own
instructor and attempt to investigate as much as could be expected under the circumstances. Firstly, dry run
the code then code it on editor.

15. Determine what cyber security and security protocols are used in the
protection of a website environment. (word count of 100 words)

Cyber security and security protocols are used in the protection of a website

Environment:
Website security shields a site from digital dangers on the web. Extensive site security
incorporates ensuring a site's information base, applications, source code, and records. Much the same as
network safety, site security can likewise be utilized as an umbrella term to depict the different programming,
instruments, and approaches one can take to ensure their site. Cyber security protocols are plans,
conventions, activities and measures that intend to protect your attachment from malignant assaults,

/conversion/tmp/activity_task_scratch/845445466.docx
Page 13 of 18
information breaks and other security episodes. By applying restrictions and checks on our sources we can
avoid all of these attacks.

16. The student has reported on the standards (legislation and organisational
procedures) that applicable when creating a website. Answers to this
question is to have a word count of 75
 Minimize the risk of user-generated content: to provide the credibility and authority to a website.

 Obtain the necessary licenses for content: It depends upon the content you want to display and it
avoids Plagiarism.

 Privacy policy: It should be displayed by the website that which kind of data it is collecting and for
which purpose the data will be used.

 E-Commerce Rules should be followed

 Copy Rights of the content used: The Data must be unique and copy righted which is used in the
website

Task 2 – Q & A – Database Design

17. What is the process for conducting data analysis? Answers to this question
is to have a word count of 50 words
First of all, we should define our questions clearly and then breakdown the process into sub processes
and set a goal and focus on it how to achieve it. Collect the data from all the resources and analysing the
data carefully and interpret the result whether it accomplished the goal or not.

18. Explain the different types of data types and data structures. Answers to this
question is to have a word count of 75-250 words

Data type:
A data type is a nature of data which tells the compiler (or interpreter) how the designer
intends to use the data. Data Type is the sort or type of a variable which is being utilized all through the
program. It characterizes that the specific variable will uses the estimations of the given information type as it
were. That whole information can be spoken to utilizing an object and can be utilized all through the whole
program. It can hold values and not information

Primitive: integer, float, character etc.

Composite: struct , array , string etc.

Abstract: tuple, set, stack, queue and graph etc.

Data Structure:
An information structure is an assortment of information type 'values' which are put away and composed so
that it considers productive access and alteration. Sometimes an information structure can turn into the basic

/conversion/tmp/activity_task_scratch/845445466.docx
Page 14 of 18
usage for a specific information type. Data Structure is the assortment of various types of data.
Implementation through Data Structures are called solid execution. It can hold distinctive kind and sorts of
data inside one single article. There are various type of data structures which are listed here.

 Linear is a data structure which contains array and lists.


 Tree is a data structure which contains binary trees and heaps etc.
 Hash is a data structure which contains hash table and hash tree etc.
 Graph is a data structure which contains decisions and acyclic graph etc.

19. Explain what is a query? Answers to this question is to have a word count of
50 words.
In database terms, an inquiry predicts to the activity of recovering data from the information base.
Questions are something that make information bases so ground-breaking. It is a solicitation for information
results, and for activity on information. For instance, you may just need to perceive the number of people in
your information base live in a given city.

20. What does it mean by reporting design? Answers to this question is to have
a word count of 50 words.
Reporting design means finding and organizing data. It involves classifying the data. Basically,
it is the organized aftereffect of information base questions and contains valuable information for dynamic
and investigation. Most great business applications contain an inherent announcing apparatus; this is just a
front-end interface that gets back to or runs end information base questions that are organized for simple
application utilization.

21. What are the different types of model design processes for a database?
Answers to this question is to have a word count of 70 words.
The database design is the term we used in the databases is that the data design is the process of producing
a detailed data of a database which contains all the needed logical and physical choices.

There are two strategies which exists while evaluation of the database design.

1. Bottom up design approach or top-down design approach


2. Centralized design vs decentralized design approach
The objectives of the database design are to produce both physical and logical model of the
database. The logical model consists of the internal structure while the physical design outlooks the
other structure of the database.

22. What does it mean by data redundancy? Answers to this question is to have
a word count of 50 words.
A condition made inside an information base or information stockpiling innovation in which a
similar bit of information is held in two separate spots. This can mean two distinct fields inside a solitary
information base, or two unique spots in different programming conditions or stages is called data
redundancy.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 15 of 18
23. What is meant by identification methodologies? Answers to this question is
to have a word count of 50 words.
The identification methodologies mean that the methods to identify the database. There are a lot of
methodologies related to it like inspection method, which inspect the database the database attributes and
the values inside it. These inspection methodologies are the very effective when we talk about the integrity of
database.

24. What is a database management system (DBMS)?


A database management system (DBMS) is a framework programming for making and overseeing data sets.
A DBMS makes it workable for end clients to make, perused, refresh and erase information in an information
base.

25. Give 2 examples of a DBMS.


Some DBMS examples are

 MySQL
 PostgreSQL
 SQL Server
 Oracle

26. What does it mean to use encryption and authentication in a database?


Answers to this question is to have a word count of 70 words.
Encryption changes important information into what resembles rubbish utilizing a mystery that can likewise
be utilized to switch the cycle. Verification is the way toward persuading a guardian that you are who you
state you are, regularly by demonstrating that you know a mystery. What's more, it is utilized to make touchy
information safer and more averse to be caught by those unapproved to see it.

27. What does it mean by Database Scalability? Answers to this question is to


have a word count of 50 words.
Scalability means the ability of any system to scale up or down depending on the workload.
Database adaptability is the capacity of an information base to deal with changing requests by
including/eliminating assets and holding increasing amount of data without sacrificing performance.

28. What is a Data Dictionary? Answers to this question is to have a word count
of 50 words.

A Data Dictionary is an assortment of names, definitions, and characteristics about information


components that are being utilized or caught in an information base, data framework, or part of an examination
venture. A Data Dictionary also provides metadata about data elements. It is used to control access to and manipulation
of database.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 16 of 18
References:
Rescorla, E. (2000). Http over tls.

Silberschatz, A., Korth, H. F., & Sudarshan, S. (1997). Database system concepts (Vol. 5). New York:
McGraw-Hill.

Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE
Transactions on Dependable and secure computing, 2(1), 2-19.

Pratt, P. J., & Adamski, J. J. (2011). Concepts of database management. Cengage Learning.

Banerjee, J., Hsiao, D. K., & Baum, R. I. (1978). Concepts and capabilities of a database computer\. ACM
Transactions on Database Systems (TODS), 3(4), 347-384.

Kumpati, M. (1988). U.S. Patent No. 4,774,661. Washington, DC: U.S. Patent and Trademark Office.

Uhrowczik, P. P. (1973). Data dictionary/directories. IBM Systems Journal, 12(4), 332-350.

Jones, W. P., Kaufmann, A. F., Luck, C., & Saukkonen, J. I. (1997). U.S. Patent No. 5,689,698. Washington,
DC: U.S. Patent and Trademark Office.

Wang, S. V., Schneeweiss, S., Berger, M. L., Brown, J., de Vries, F., Douglas, I., ... & Nguyen, M. D. (2017).
Reporting to improve reproducibility and facilitate validity assessment for healthcare database studies V1.
0. Value in health, 20(8), 1009-1022.

Tabb, L., & Herrmann, C. (1997). U.S. Patent No. 5,603,025. Washington, DC: U.S. Patent and Trademark
Office.

Westaby, S., Archer, N., Manning, N., Adwani, S., Grebenik, C., Ormerod, O., ... & Wilson, N. (2007).
Comparison of hospital episode statistics and central cardiac audit database in public reporting of congenital
heart surgery mortality. Bmj, 335(7623), 759.

Maxwell, J. E., McDowell, I. D. J., & Schaefle, S. W. (1997). U.S. Patent No. 5,675,784. Washington, DC:
U.S. Patent and Trademark Office.

McKay, C., Skillcorn, S., & Douvikas, J. (2004). U.S. Patent Application No. 10/350,326.

https://www.motocms.com/blog/en/website-legal-requirements/

/conversion/tmp/activity_task_scratch/845445466.docx
Page 17 of 18
Specifications

What you have to Submit/Upload.

1. Answers to these all the questions uploaded to A1 in Moodle/Learn under A1 Assessment


Submission.

/conversion/tmp/activity_task_scratch/845445466.docx
Page 18 of 18

You might also like