Instructor Notes Module 7: Implementing Data Integrity Introduction In this module, students will learn about different types of data integrity requirements.. Then they will learn how
Trang 1Instructor Notes Module 7:
Implementing Data Integrity
Introduction
In this module, students will learn about different types of data integrity requirements Then they will learn how to find business rules and how they map
to data integrity requirements Finally, you will discuss different ways of implementing data integrity requirements in the physical design
After completing this module, students will be able to:
! Identify business rules that relate to data integrity
! Identify the data integrity requirement type to which a business rule applies
! Evaluate and determine a location for implementing data integrity
! List implementation techniques for a given data integrity requirement
Materials and Preparation
This section provides you with the materials and preparation needed to teach this module
Materials
To teach this module, you will need the following materials:
! Microsoft® PowerPoint® file P07_1609a.ppt
! Module 7, “Implementing Data Integrity”
! Activity 7.1, “Identifying Data Integrity Requirements”
! Activity 7.2, “Determining Data Integrity Implementations”
Preparation
To prepare for this module, you should:
! Read all materials for this module
! Complete the activities
Presentation:
50 Minutes
Activities:
55 Minutes
Trang 22 Instructor Notes Module 7: Implementing Data Integrity
Activities
Activity 7.1: Identifying Data Integrity Requirements
In this activity, students will work in small groups to evaluate a set of data requirements from the Ferguson and Bardell, Inc case study They will determine areas where data integrity issues might arise and will formulate a set
of data integrity rules that must be followed by the development team of the Ferguson and Bardell, Inc solution
After the activity, lead a class discussion so that students can compare results After completing this activity, students will be able to:
! Identify areas where data integrity and validity are required
! Specify data integrity requirements as they relate to data requirements
! To prepare for the activity
1 Prepare extra copies of the data requirements from Activity 3.1 and the existence and relationship requirements from Activity 4.2 for students who
do not have their own copies
2 Complete the activity
Activity 7.2: Determining Data Integrity Implementations
In this exercise, students will work in groups The groups will look at a physical design and determine areas where data integrity should be enforced
After the activity, lead a class discussion so that students can compare results After completing this activity, students will be able to:
! Identify areas where data integrity should be enforced
! Choose a method for implementing business rules and data integrity requirements
! To prepare for the activity
• Complete the activity
Module Strategy
Use the following strategy to present this module:
! Overview of Data Integrity This section introduces data integrity, discusses the three types of data integrity (domain, entity, and referential), and describes the process of data validation Although some of the terminology in this section might be new
to students, the concepts should be familiar to them You should be able to move through this section fairly rapidly
Trang 3Instructor Notes Module 7: Implementing Data Integrity 3
! Implementing Data Integrity Requirements This section discusses the transformation of business rules into logic built into a system or application This concept might be more difficult for some students to grasp Be prepared with supplemental real-life examples, working from the plain-language statement of the business rule to the encapsulation of that rule as data logic
Methods for implementing data integrity are grouped into two locations: in the database and outside the database Implementing in the database is sometimes called “declarative” and implementing outside the database is sometimes called “procedural.” Point out that, outside the database, you could implement data integrity in the client application or on an application server However, do not spend much time on this topic; it is covered more thoroughly in Module 8, “Designing Data Services.”
As you list the methods available for each location, make sure students understand the basics of how they work However, do not go into too much detail because implementation specifics will differ depending on the database used Focus on giving guidelines for when to use one implementation method versus another
Trang 4THIS PAGE INTENTIONALLY LEFT BLANK