COMPUTERISED DATABASE SYSTEMS MANAGEMENT
ISCED UNIT CODE: 0612 451 09A
TVET CDACC UNIT CODE: ICT/CU/SD/CR/04/5/MA
Relationship to Occupational Standards
This unit addresses the Unit of Competency: Manage Computerised Database System
Duration of Unit: 340 Hours
UNIT DESCRIPTION
This unit covers the competencies required to manage computerized database system. It
involves, designing database system, creating database system, Manipulating Computerized
Database, managing database security and performing database maintenance
Summary of Learning Outcomes
Learning Outcomes Duration (Hours)
m
1. To design database system 60
o
.c
et
tv
2. To create database system 100
sy
ea
3. To manipulate computerized database 90
4. To manage database security 50
5. To perform database maintenance 40
TOTAL 340
Learning Outcomes, Content and Suggested Assessment Methods
Learning Content Suggested
Outcome Assessment Methods
1. Design 1.1. Identification of Database design ❖ Practical Activities
database approaches ❖ Project work
system 1.1.1. Design approaches ❖ Demonstration
[Link]. Top – down design ❖ Group Work
method
❖ Observation
[Link]. Bottom – up design
method ❖ Third Party report
[Link]. Centralized design ❖ Portfolio of
[Link]. Decentralized design Evidence
1.2. Identification of database design tools ❖ Written tests
1.2.1. Types of design tools
1.3. Database structures.
1.3.1. Database structure
m
1.3.2. Database models
o
.c
et
tv
sy
[Link]. Record-based model
ea
● Hierarchical models
● Network Models
● Relational Models
[Link]. Object-based data models
● Entity-Relationship (ER)
● Semantic
● Functional
● Object-oriented
[Link]. Physical data models
● unifying model and
● the frame memory
1.3.3. Database schema
1.4. Database design architecture
1.4.1. Schema design
1.4.2. Database management system
architecture
1.4.3. Data Warehousing and Big Data
Architecture
[Link]. Multi-user DBMS
architectures
[Link]. Web service and service
oriented Architectures
[Link]. Distributed DBMS
1.4.4. Data Warehousing and Big Data
Architecture
1.5. Database normalisation.
1.5.1. Types of normalisations
1.5.2. Process of normalization
1.6. Entity Relationship diagrams
1.7. Database design report
1.7.1. Key components of database design
report
2. Create 1.1. Database management software ❖ Practical Activities
om
database identification ❖ Project work
.c
et
tv
sy
system ❖ Demonstration
ea
1.1.1. Selecting Appropriate DBMS
1.2. Database development environment ❖ Group Work
configuration. ❖ Observation
1.2.1. Setting Up the Environment ❖ Third Party report
1.2.2. Development Tools ❖ Portfolio of Evidence
1.3. Database objects ❖ Written tests
1.3.1. Tables
1.3.2. Indexes
1.3.3. Tools
1.3.4. Stored procedures and functions
1.4. Data attributes.
1.4.1. Types of attributes
1.5. Data relationships.
1.5.1. Types of relationships
[Link]. One to one
[Link]. One to many
[Link]. Many to many
1.6. Workplace safety and health practices
1.6.1. Importance
1.6.2. Digital safety
1.7. E-waste storage and disposal
1.8. E-waste management
1.8.1. Storage and Disposal
1.8.2. Erasure
3. Manipulate 2.1. Database business rules ❖ Practical Activities
computerized 2.1.1. Unique constraints ❖ Project work
database ❖ Demonstration
2.1.2. Referential integrity
2.2. Inserting data into database ❖ Group Work
2.3. Insert statement in SQL ❖ Third Party report
2.4. Data retrieval from the database ❖ Portfolio of Evidence
om
.c
❖ Written tests
et
2.4.1. Selecting data from database
tv
sy
ea
2.5. Data modification using queries.
2.5.1. Updating data in database
2.5.2. Modifying queries in database
2.6. Data deletion
2.6.1. Deleting data in table
2.6.2. Dropping database
4. Manage 4.1 Database security risks identification ❖ Practical Activities
database 4.1.1Common security risks ❖ Project work
security [Link] Unauthorized Access ❖ Demonstration
[Link] SQL Injection Attacks ❖ Group Work
[Link] Data Leakage ❖ Observation
[Link] Insider Threats ❖ Third Party report
[Link] Weak Authentication and ❖ Portfolio of Evidence
Access Control ❖ Written tests
[Link] Inadequate Patching
[Link] Malware
4.2 Identification of database security
control measures
4.2.1 Control measures
[Link] Access Control and
Authentication
[Link] SQL Injection Prevention
[Link] Encryption
[Link] Regular Security Audits
and Monitoring
[Link] Patching and Updates
[Link] Data Masking and
Anonymization
[Link] Backup and recovery
plans
m
o
[Link] User Activity Logging
.c
et
tv
sy
[Link] Firewalls
ea
4.3 Database security control measures
implementation.
4.3.1 Policy Development
4.3.2 Access Management
4.3.3 Configuration Hardening
4.3.4 Testing
4.4 Carrying out Monitoring and auditing
of database security
4.5 Performing database security
documentation
4.5.1 Database maintenance schedule
preparation
4.6 Training database users
4.6.1 End Users
4.6.2 Application Programmer or
Specialized users or Back-End
Developer
4.6.3 System Analysts
4.6.4 Database Administrator (DBA)
4.6.5 Temporary Users or Casual Users
5. Perform 5.1 Database maintenance schedule ❖ Practical Activities
database preparation ❖ Project work
maintenance 5.1.1 Maintenance plans ❖ Demonstration
5.1.2 Daily tasks ❖ Group Work
5.1.3 Weekly tasks ❖ Observation
5.1.4 Monthly tasks ❖ Third Party report
5.1.5 Quarterly tasks ❖ Portfolio of Evidence
5.1.6 Annual tasks ❖ Written tests
5.1.7 Database maintenance schedule
preparation
[Link] Key elements in preparation of
maintenance schedule
m
o
.c
et
5.2 Database performance monitoring
tv
sy
ea
5.2.1 Resource Utilization
5.2.2 Query Performance
5.2.3 Transaction Log Monitoring
5.2.4 Connection Monitoring
5.2.5 Alerting Systems
5.3 Database performance optimization
5.3.1 Query Optimization
5.3.2 Indexing Strategy
5.3.3 Partitioning
5.3.4 Configuration Tuning
5.3.5 Archiving
5.4 Database maintenance report generation
5.4.1 Report components
5.4.2 Report generation process
Suggested Delivery Methods
1. Instructor led facilitation using active learning strategies
2. Demonstration by trainer
3. Practical work by trainees
4. Viewing of related videos
5. Field Visits
6. Group Work
7. Role plays
8. Group projects
Recommended Resources for 25 Trainees
Recommend
Description/ ed Ratio
S/No. Category/Item Quantity
Specifications (Item:
Trainee)
A Learning Materials
1. 1
om
1
.c
et
tv
1
sy
Internet connection ✔ For each computer 1 1:1
ea
1
1
1
2. Flip charts A1 1 1:25
3. Textbooks For reference 3 3:25
B Learning Facilities & infrastructure
To accommodate
4. Computer Laboratory 1 1:25
25 Learners
furnished with 25
Arm-chairs and a
5. Theory Room 1 1:25
suitable trainer’s
table
C Consumable materials
6. Printing papers A4 2 Reams 1:12
7. Toner / Ink bottles For printers 2 pcs 1:12
8. White board markers Assorted colors 20 4:5
D Tools and Equipment
✔ Genuine
Windows/Linux
9. Computers ✔ Genuine Microsoft 25 1:1
office Software
✔ Google
Workspace
Account
✔ Antivirus
Software
✔ Suitable IDE
10. External storage media HDD / SSD / Flash 1 1:25
11. Printer Working printer 2 1:12
1 Smart-board / Smart TV /
12. Where available 1 1:25
Projector (with screen)
13. Whiteboard/Chalkboard 4 X 8 Feet 1 1:25
om
.c
et
tv
sy
ea