CramX Logo
Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema - Document preview page 1

Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema - Page 1

Document preview content for Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema

Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema

A study on advanced database design and implementation techniques.

Ethan Wilson
Contributor
4.3
0
12 months ago
Preview (4 of 12 Pages)
100%
Log in to unlock
Page 1 of 4
Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema - Page 1 preview imageComprehensive Database Design and Implementation: EER, Normalization, SQLInjection, Triggers, and Airline Database SchemaPart 1:Question 1:ExplainthemajorchallengesyoumayencounterwhenyouimplementanEERwithasuperclass/subclass relationship.Explain the possible ways to implement it.What factors willyou will consider when implementing a superclass/subclass relationship? (10 points)Answer:The model which is resulted from enlarging the original E-R model with fresh modelingconstructs such as super-types and subtypes is known as Enhanced entity relationship model(EER). Everything in the real world about which information can be stored is known as entity.The variouschallengesandimplementationways are as described below:Entity relationship diagram is a basically a picture or snapshot about the business system thatis the information stored, created represented by this diagram. Any analyst who knows aboutthe ERD can easily determine the needs of the system and can easily read the everyinformation stored in it.The first category is terms. It relates to the conditions which are implemented for undergoingchanges required.The second category is relationship constraint which is based upon the dependency ofvarious teams upon one another.The third category is super-type or subtype relationships.The variety of types of business rules that are usually confine in an EER diagram areconditions, relationship constraints, and super-type or subtype relationships.The points to show theconsideredfactorsare as given below:There can be a comparison made for distinctive features for an EER diagram. It can be keptunder more details.It can be filled with the statement which describes its requirements. It may also addinformation regarding the volunteers associated. It also is associated with the techniciansused.It gives a clear and a sophisticated approach to the work done.There are many variations in the working of the diagram. It can also bring changes ininformation. It also adds variations in the project.Question 2:
Page 2 of 4
Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema - Page 2 preview image
Page 3 of 4
Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema - Page 3 preview imageWhat is the mostimportant factor for performing normalization? In practice, what normal formis the typical to reach a normalized design?Why do we normally not need to reach high levelnormalforms?Doyoustartyourconceptualdatabasedesignfollowingabottom-upnormalization process? (10 points)Answer:Normalizationis a technique in which the analysts come to know about their model. It is used tovalidate their models. In this process a sequence of rules applied to logical data model or filesand it checked that how well these files are formed. It basically helps to cross the logical datamodels and verifies the entities. If it is found that entities are incorrectly represented then theseentities are checked again and makes them correct.1NF: If an entity does not contain any repeating attributes or groups then the model is said to bein the first normal form. In this form entities do not contain any single instance of the repeatingvariable. It means entities do contain only one instance of the attributes.2NF: For the second normal form the first and basic requirement is that the model should be inthe first normal form. The second requirement is that the data model must contain those entitieswhich have the attributes which are dependent relative on the entire identifier. It means all theattributes which are actingas identifiers that mustdetermine the extraattributes for anoccurrence of the entity.3NF: For the third normal form the first and basic requirement is that the model should be in thefirst and second normal form. Its other requirement is that the no attribute depends on the non-identifier attribute. It is termed as transitive dependency. In this you have to generate a newentity which is used to join the old and new entities by adding of the relationship.In practice,up to 3NF is used fornormalized design. Asweuse higher normalization forms up toBCNF or 4NF, then, it becomes very tough to handle the database and maintain the relationshipamong various tables. The database design is a bottom up process. Initially all data is incollective form and for the conceptual design of any database, normalization is performed.Question 3:What isSQLinjection vulnerability? What are root causes for common web applications? Whatactions you need to take to prevent this problem? (5 points)Answer:In SQL Injection, the programmer utilizes SQL inquiries and inventiveness to get to the databaseof delicate corporate information through the web applicationis known as SQL injectionvulnerability. Firewalls and comparable interruption identification systems give practically zerosafeguard against full-scale SQL Injection web assaults.
Page 4 of 4
Comprehensive Database Design and Implementation: EER, Normalization, SQL Injection, Triggers, and Airline Database Schema - Page 4 preview imageThe root causes for common web applications and actions to prevent such problems are as givenbelow:1.Doxing-Publicly discharging an individual's recognizing data including full name, date ofconception, address, and pictures regularly recovered from informal communication siteprofiles.2.Elicitation-The key utilization of discussion to concentrate data from individuals withoutproviding for them the inclination they are constantly questioned. Be mindful of elicitationstrategies and the way social specialists attempt to acquire individual data.3.Pharming-Redirecting clients from honest to goodness sites to deceitful ones with the endgoal of concentrating classified informationQuestion 4:Compare and contrast stored procedures and triggers within a database (5 points).Answer:Triggeris a forename set of SQL declaration that is think about when a data alteration occurs orif definite data description are come upon. If a condition confirmed within a trigger is meetingup, then, a agreed action is taken.Store Procedureis a group of SQL and procedural statement allocate and lay up with a solename with in schema. When it is desirable, call every of the statement in procedure will be carryout. The table shows the trigger is differ from stored procedure in the following ways as givenbelow:TriggerStored procedureA trigger is full of regard for table or viewand considered when data modification isoccurs.Stored procedure is run at any time whenit is called.User can write stored procedure with in atrigger.Usercannot write trigger with in storedprocedure.Triggers are automatically run.Stored procedure is run when user call byits name.
Preview Mode

This document has 12 pages. Sign in to access the full document!