1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Instructor Notes Module 7: Implementing Data Integrity ppt

4 341 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Implementing data integrity
Thể loại Ghi chú giảng viên
Định dạng
Số trang 4
Dung lượng 87,24 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Instructor Notes Module 7: Implementing Data Integrity Introduction In this module, students will learn about different types of data integrity requirements.. Then they will learn how

Trang 1

Instructor Notes Module 7:

Implementing Data Integrity

Introduction

In this module, students will learn about different types of data integrity requirements Then they will learn how to find business rules and how they map

to data integrity requirements Finally, you will discuss different ways of implementing data integrity requirements in the physical design

After completing this module, students will be able to:

! Identify business rules that relate to data integrity

! Identify the data integrity requirement type to which a business rule applies

! Evaluate and determine a location for implementing data integrity

! List implementation techniques for a given data integrity requirement

Materials and Preparation

This section provides you with the materials and preparation needed to teach this module

Materials

To teach this module, you will need the following materials:

! Microsoft® PowerPoint® file P07_1609a.ppt

! Module 7, “Implementing Data Integrity”

! Activity 7.1, “Identifying Data Integrity Requirements”

! Activity 7.2, “Determining Data Integrity Implementations”

Preparation

To prepare for this module, you should:

! Read all materials for this module

! Complete the activities

Presentation:

50 Minutes

Activities:

55 Minutes

Trang 2

2 Instructor Notes Module 7: Implementing Data Integrity

Activities

Activity 7.1: Identifying Data Integrity Requirements

In this activity, students will work in small groups to evaluate a set of data requirements from the Ferguson and Bardell, Inc case study They will determine areas where data integrity issues might arise and will formulate a set

of data integrity rules that must be followed by the development team of the Ferguson and Bardell, Inc solution

After the activity, lead a class discussion so that students can compare results After completing this activity, students will be able to:

! Identify areas where data integrity and validity are required

! Specify data integrity requirements as they relate to data requirements

! To prepare for the activity

1 Prepare extra copies of the data requirements from Activity 3.1 and the existence and relationship requirements from Activity 4.2 for students who

do not have their own copies

2 Complete the activity

Activity 7.2: Determining Data Integrity Implementations

In this exercise, students will work in groups The groups will look at a physical design and determine areas where data integrity should be enforced

After the activity, lead a class discussion so that students can compare results After completing this activity, students will be able to:

! Identify areas where data integrity should be enforced

! Choose a method for implementing business rules and data integrity requirements

! To prepare for the activity

• Complete the activity

Module Strategy

Use the following strategy to present this module:

! Overview of Data Integrity This section introduces data integrity, discusses the three types of data integrity (domain, entity, and referential), and describes the process of data validation Although some of the terminology in this section might be new

to students, the concepts should be familiar to them You should be able to move through this section fairly rapidly

Trang 3

Instructor Notes Module 7: Implementing Data Integrity 3

! Implementing Data Integrity Requirements This section discusses the transformation of business rules into logic built into a system or application This concept might be more difficult for some students to grasp Be prepared with supplemental real-life examples, working from the plain-language statement of the business rule to the encapsulation of that rule as data logic

Methods for implementing data integrity are grouped into two locations: in the database and outside the database Implementing in the database is sometimes called “declarative” and implementing outside the database is sometimes called “procedural.” Point out that, outside the database, you could implement data integrity in the client application or on an application server However, do not spend much time on this topic; it is covered more thoroughly in Module 8, “Designing Data Services.”

As you list the methods available for each location, make sure students understand the basics of how they work However, do not go into too much detail because implementation specifics will differ depending on the database used Focus on giving guidelines for when to use one implementation method versus another

Trang 4

THIS PAGE INTENTIONALLY LEFT BLANK

Ngày đăng: 17/01/2014, 09:20

w