Draft the requirements for the new web site

Assignment Help Database Management System
Reference no: EM13723246

Part A:

Case 1: Developing an Online Database

A new dot-com company has decided to launch an affiliated Web site specifically for individuals interested in database issues. The main mission of the website is to provide a forum for database technical tips, issues, and scripts. The CIO and his technical team held a meeting to draft the requirements for the new Web Site and decided that it should include the following:

- Technical documents
- A forum where members can exchange ideas and share experiences
- Online access so that members can query or try the site's technical examples and scripts.
- A tips section.
- Technical support for error messages

Immediately after the meeting, the newly appointed project manager asks you to implement security for the site. She mentions that the security of a public database is so important that the CIO himself outlined the security requirements, as follows:

- The online database will have 10 public host database accounts that allow multiple sessions.
- The password of a public host account must be reset to its original setting whenever disconnects or logoffs occur.
- The maximum duration for a session is 45 minutes.
- Allocations will be set on memory and CPU usage to make sure the database is not overloaded due to excessive burden caused by badly written queries.
- Storage for each public host account must be limited to 1 MB
- The public host accounts will have privileges to create the most common database objects.
- All newly created objects must be removed before logoff.
- The database must have the default human resources (HR) user account enabled. All other accounts will be removed. All public host accounts must be able to view the data owned by HR, but must not be allowed to modify the data or structure of the database objects.
- When a member logs onto the database, all session information, such as IP address, terminal, and user session information, must be recorded for future analysis.

You may add other security or auditing features, as long as you don't overlook any of the requirements in this list.

You will need to submit responses to the questions including all the SQL scripts that you may have created. You also must provide screen shots of specific portions of the work you have done, especially the final results and some important intermediate steps.

To make a screen shot for Word, use the following steps:

* Have the image you want to copy visible on your computer screen.
* Simultaneously, hold down the Control (Ctrl), Alternate (Alt) and Print Screen (PrntScrn) keys on your keyboard.
* Go to an open Word Document
* Paste the image (either right click on your mouse and choose the Paste option, or simultaneously hold down the Control (Ctrl) and V keys.
* Resize the image by clicking and holding on one corner, then dragging the box size toward the center of the image (make sure the entire image is visible on a single page).

Part B: Answer the following questions with a narrative response in complete sentences.

Note: You will need to submit responses to the questions including all the SQL scripts that you may have created. You also must provide screen shots of specific portions of the work you have done, especially the final results and some important intermediate steps.

To make a screen shot for Word, use the following steps:

* Have the image you want to copy visible on your computer screen.
* Simultaneously, hold down the Control (Ctrl), Alternate (Alt) and Print Screen (PrntScrn) keys on your keyboard.
* Go to an open Word Document
* Paste the image (either right click on your mouse and choose the Paste option, or simultaneously hold down the Control (Ctrl) and V keys.
* Resize the image by clicking and holding on one corner, then dragging the box size toward the center of the image (make sure the entire image is visible on a single page).

1. Use Oracle10g to modify the DML audit mode (Simple 2) to include the INSERT statement.

2. Use Oracle10g to modify the DML audit model (Simple 2) to register a type of operation applied on the row.

3. Use Oracle10g to develop a data history model based on the AFTER INSERT, UPDATE, or DELETE trigger.

4. Using the Audit Simple 1 model, modify the PL/SQL code presented for this model in the chapter to include auditing columns.

5. Using Oracle10g and any of the audit designs presented in this chapter or Chapter 7, produce an audit trail of any DML statement activities on any table belonging to a schema other than SYS or SYSTEM.

Reference no: EM13723246

Questions Cloud

Description of organization chart technique : In addition to the description of organization chart technique using MS Publisher, described in the article listed in OTHER REQUIRED CONTENT, above, there are many free templates that can be used with Word, PowerPoint and drawing programs. Followi..
Present a more balanced view of edison the man and inventor : What would you do to present a more balanced view of Edison the man and inventor? Based on my lecture, discuss why or why not Edison should be considered the creator of the light bulb?
Develop the strategy with a third-party logistics provider : Modern Book Distribution, Inc. Case Study Evaluation. Richard Guy, CEO of Modern Book Distribution, Inc. Develop the strategy with a third-party logistics provider
Describe the organization : Research Zappos. Develop a 3-5 page paper by answering the following questions: Describe the organization & it's history.
Draft the requirements for the new web site : Draft the requirements for the new Web Site - questions including all the SQL scripts that you may have created. You also must provide screen shots of specific portions of the work you have done, especially the final results and some important inte..
Ethical concerns for your intended research topic : Develop a paper which includes an assessment of any ethical concerns for your intended research topic as well as a brief review of the IRB Application
Cost of health care : Question 1: List and explain reasons why the health status of a country plays an important role in its economic status. Question 2: Create a table that shows how the access, quality, and cost of health care are influenced by the low-income, middle-..
Explain participation for the organization : Write a site agreement that includes terms and conditions of participation for the organization. Include specifics on the responsibilities of both parties.
What you have learned about worksite protection : Explain in a paper what you have learned about worksite protection for employees to address the following: Under the decision in this case, when does a duty arise for the defendant Metro-North to protect its employees

Reviews

Write a Review

Database Management System Questions & Answers

  Create a table with the following column headings

You learned that WIPO is the global arbitrator for all intellectual property-related issues. Read any two cases for the year 2007 on cybersquatting. Create a table with the following column headings.

  Design an entity-relationship model of the problem

Design an entity-relationship model of the problem, convert the model into a relational model, and assess the normal form of each schema.

  What is the functionality of the tool

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool - how will you evaluate the tool based on your own experience?

  Describe the ongoing maintenance that will be required

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

  Write select statement which returns three columns

Write a SELECT statement which returns three columns: VendorName, InvoiceCount, and InvoiceSum. InvoiceCount is the count of the number of invoices, and InvoiceSum is the sum of the InvoiceTotal column.

  Explaining database security relate to data integrity

In talking about database security, some aspects to regard as are Data Integrity, Confidentiality, and Malicious Activity. Illustrate how does database security relate to data integrity?

  How many of the artist works have been sold

List the names of the deceased artists and the number of years of age they were when they died (for example, an artist born in 1950 and deceased in 2001 has an age of 51).

  Creating database structure using sql

creating database structure using SQL

  Create application owner and stored in schema

One of the tenets of database development is to never permit developers to create or own objects during development. All objects are created by application owner and stored in that schema.

  What tools does your organization use to deliver rich

q 1 name 3 common vulnerabilities in web applications. how does a company protect against these vulnerabilities?q 2

  Create database for university to monitor students

A database is to be created for University to monitor students' progress throughout their course of study. Students are reading for degree (such as BTech, BTech(Hons) MCA, etc) within framework of modular system.

  What type of databases and database servers myspace use

What kind of databases and database servers does MySpace use? Why is database technology so important for a business such as MySpace?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd