0% found this document useful (0 votes)
21 views8 pages

Cu DatabaseSystems

The document outlines a unit on managing computerized database systems, covering design, creation, manipulation, security management, and maintenance of databases over a duration of 340 hours. It includes detailed learning outcomes, content, and suggested assessment methods for each competency area. Additionally, it specifies recommended resources and delivery methods for effective training.

Uploaded by

petersuns388
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views8 pages

Cu DatabaseSystems

The document outlines a unit on managing computerized database systems, covering design, creation, manipulation, security management, and maintenance of databases over a duration of 340 hours. It includes detailed learning outcomes, content, and suggested assessment methods for each competency area. Additionally, it specifies recommended resources and delivery methods for effective training.

Uploaded by

petersuns388
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

COMPUTERISED DATABASE SYSTEMS MANAGEMENT

ISCED UNIT CODE: 0612 451 09A


TVET CDACC UNIT CODE: ICT/CU/SD/CR/04/5/MA
Relationship to Occupational Standards
This unit addresses the Unit of Competency: Manage Computerised Database System

Duration of Unit: 340 Hours

UNIT DESCRIPTION
This unit covers the competencies required to manage computerized database system. It
involves, designing database system, creating database system, Manipulating Computerized
Database, managing database security and performing database maintenance

Summary of Learning Outcomes


Learning Outcomes Duration (Hours)
m

1. To design database system 60


o
.c
et
tv

2. To create database system 100


sy
ea

3. To manipulate computerized database 90


4. To manage database security 50
5. To perform database maintenance 40
TOTAL 340
Learning Outcomes, Content and Suggested Assessment Methods
Learning Content Suggested
Outcome Assessment Methods
1. Design 1.1. Identification of Database design ❖ Practical Activities
database approaches ❖ Project work
system 1.1.1. Design approaches ❖ Demonstration
[Link]. Top – down design ❖ Group Work
method
❖ Observation
[Link]. Bottom – up design
method ❖ Third Party report
[Link]. Centralized design ❖ Portfolio of
[Link]. Decentralized design Evidence
1.2. Identification of database design tools ❖ Written tests
1.2.1. Types of design tools
1.3. Database structures.
1.3.1. Database structure
m

1.3.2. Database models


o
.c
et
tv
sy

[Link]. Record-based model


ea

● Hierarchical models
● Network Models
● Relational Models
[Link]. Object-based data models
● Entity-Relationship (ER)
● Semantic
● Functional
● Object-oriented
[Link]. Physical data models
● unifying model and
● the frame memory
1.3.3. Database schema
1.4. Database design architecture
1.4.1. Schema design
1.4.2. Database management system
architecture
1.4.3. Data Warehousing and Big Data
Architecture
[Link]. Multi-user DBMS
architectures
[Link]. Web service and service
oriented Architectures
[Link]. Distributed DBMS
1.4.4. Data Warehousing and Big Data
Architecture
1.5. Database normalisation.
1.5.1. Types of normalisations
1.5.2. Process of normalization
1.6. Entity Relationship diagrams
1.7. Database design report
1.7.1. Key components of database design
report
2. Create 1.1. Database management software ❖ Practical Activities
om

database identification ❖ Project work


.c
et
tv
sy

system ❖ Demonstration
ea

1.1.1. Selecting Appropriate DBMS


1.2. Database development environment ❖ Group Work
configuration. ❖ Observation
1.2.1. Setting Up the Environment ❖ Third Party report
1.2.2. Development Tools ❖ Portfolio of Evidence
1.3. Database objects ❖ Written tests
1.3.1. Tables
1.3.2. Indexes
1.3.3. Tools
1.3.4. Stored procedures and functions
1.4. Data attributes.
1.4.1. Types of attributes
1.5. Data relationships.
1.5.1. Types of relationships
[Link]. One to one
[Link]. One to many
[Link]. Many to many
1.6. Workplace safety and health practices
1.6.1. Importance
1.6.2. Digital safety
1.7. E-waste storage and disposal
1.8. E-waste management
1.8.1. Storage and Disposal
1.8.2. Erasure
3. Manipulate 2.1. Database business rules ❖ Practical Activities
computerized 2.1.1. Unique constraints ❖ Project work
database ❖ Demonstration
2.1.2. Referential integrity
2.2. Inserting data into database ❖ Group Work
2.3. Insert statement in SQL ❖ Third Party report

2.4. Data retrieval from the database ❖ Portfolio of Evidence


om
.c

❖ Written tests
et

2.4.1. Selecting data from database


tv
sy
ea

2.5. Data modification using queries.


2.5.1. Updating data in database
2.5.2. Modifying queries in database
2.6. Data deletion
2.6.1. Deleting data in table
2.6.2. Dropping database
4. Manage 4.1 Database security risks identification ❖ Practical Activities
database 4.1.1Common security risks ❖ Project work
security [Link] Unauthorized Access ❖ Demonstration
[Link] SQL Injection Attacks ❖ Group Work
[Link] Data Leakage ❖ Observation
[Link] Insider Threats ❖ Third Party report

[Link] Weak Authentication and ❖ Portfolio of Evidence


Access Control ❖ Written tests
[Link] Inadequate Patching
[Link] Malware
4.2 Identification of database security
control measures
4.2.1 Control measures
[Link] Access Control and
Authentication
[Link] SQL Injection Prevention
[Link] Encryption
[Link] Regular Security Audits
and Monitoring
[Link] Patching and Updates
[Link] Data Masking and
Anonymization
[Link] Backup and recovery
plans
m
o

[Link] User Activity Logging


.c
et
tv
sy

[Link] Firewalls
ea

4.3 Database security control measures


implementation.
4.3.1 Policy Development
4.3.2 Access Management
4.3.3 Configuration Hardening
4.3.4 Testing
4.4 Carrying out Monitoring and auditing
of database security
4.5 Performing database security
documentation
4.5.1 Database maintenance schedule
preparation
4.6 Training database users
4.6.1 End Users
4.6.2 Application Programmer or
Specialized users or Back-End
Developer
4.6.3 System Analysts
4.6.4 Database Administrator (DBA)
4.6.5 Temporary Users or Casual Users
5. Perform 5.1 Database maintenance schedule ❖ Practical Activities
database preparation ❖ Project work
maintenance 5.1.1 Maintenance plans ❖ Demonstration
5.1.2 Daily tasks ❖ Group Work
5.1.3 Weekly tasks ❖ Observation
5.1.4 Monthly tasks ❖ Third Party report
5.1.5 Quarterly tasks ❖ Portfolio of Evidence
5.1.6 Annual tasks ❖ Written tests
5.1.7 Database maintenance schedule
preparation
[Link] Key elements in preparation of
maintenance schedule
m
o
.c
et

5.2 Database performance monitoring


tv
sy
ea

5.2.1 Resource Utilization


5.2.2 Query Performance
5.2.3 Transaction Log Monitoring
5.2.4 Connection Monitoring
5.2.5 Alerting Systems
5.3 Database performance optimization
5.3.1 Query Optimization
5.3.2 Indexing Strategy
5.3.3 Partitioning
5.3.4 Configuration Tuning
5.3.5 Archiving
5.4 Database maintenance report generation
5.4.1 Report components
5.4.2 Report generation process

Suggested Delivery Methods


1. Instructor led facilitation using active learning strategies
2. Demonstration by trainer
3. Practical work by trainees
4. Viewing of related videos
5. Field Visits
6. Group Work
7. Role plays
8. Group projects

Recommended Resources for 25 Trainees

Recommend
Description/ ed Ratio
S/No. Category/Item Quantity
Specifications (Item:
Trainee)
A Learning Materials
1. 1
om

1
.c
et
tv

1
sy

Internet connection ✔ For each computer 1 1:1


ea

1
1
1
2. Flip charts A1 1 1:25
3. Textbooks For reference 3 3:25
B Learning Facilities & infrastructure
To accommodate
4. Computer Laboratory 1 1:25
25 Learners
furnished with 25
Arm-chairs and a
5. Theory Room 1 1:25
suitable trainer’s
table
C Consumable materials
6. Printing papers A4 2 Reams 1:12
7. Toner / Ink bottles For printers 2 pcs 1:12
8. White board markers Assorted colors 20 4:5
D Tools and Equipment
✔ Genuine
Windows/Linux
9. Computers ✔ Genuine Microsoft 25 1:1
office Software
✔ Google
Workspace
Account
✔ Antivirus
Software
✔ Suitable IDE
10. External storage media HDD / SSD / Flash 1 1:25
11. Printer Working printer 2 1:12
1 Smart-board / Smart TV /
12. Where available 1 1:25
Projector (with screen)
13. Whiteboard/Chalkboard 4 X 8 Feet 1 1:25

om
.c
et
tv
sy
ea

You might also like