Criteria reference
P33.1.1 1 critically compare
different data models and
schemas
To achieve the criteria the evidence must show that
the student is able to:
Task no.
Hierarchical. Network, relational and object oriented
data models
Task 1.1
(a)
Discuss the objectives of the three-level architecture
and critically compare the different types of schemas
Task 1.1 (b)
P33.1.2 critically discuss the
benefits and limitations of
different database
technologies
P33.1.3 analyze different
approaches to database design
Analyze range of DBMS tools available in the market
and select one DBMS to implement the system. Explain
the reasons for your choice.
Task 1.2
analyze different approaches to database design such
as bottom-up approach and Top-down approach
Task 1.3
P33.2.1 design a relational
database system to meet a given
requirement
Draw a context diagram and a high level DFD to depict
the given system
Produce an ERD identifying the main Entities and
Relationships indicating the degree of relationship and
optionality
Task 2.1
(a)
Discuss the purpose of normalization and normalize the
all tables identified
Task 2.1
(c)
Create all the tables (at least 5 tables) identified in the
design phase by using the selected DBMS.
Task 2.2
explain the benefits of using manipulation and query
tools in a relational database system
Task 3.1
Must include the SQL script and the implementation
outputs for each query.
Task 3.2
Critically evaluate how meaningful data has been
extracted through the use of query tools
Task 3.3
Assessor
Comment
P33.2.2 build
a relational
database system based on a
prepared design
P33.3.1 explain the benefits of
using manipulation and query
tools in a relational database
system
P33.3.2 implement a query
language into the relational
database system
P33.3.3 critically evaluate how
meaningful data has been
extracted through the use of
query tools
P33.4.1 critically review and test Provide evidence for tested database with a test case
a relational database system
and critically review the database system
P33.4.2 create documentation to Create a test plan, Suggests methods for improving the
support the implementation
effectiveness of the database solution, and discuss the
and testing of a relational
threats and countermeasures
database system
P33.4.3 create user
documentation for a developed
relational database system
P33.4.4 explain how verification
and validation has been
addressed
P33.4.5 explain how control
mechanisms have been used.
Produce user documentation for the developed relational
database system.
Task 2.1
(b)
Task 4.2
Task 4.1
Task 4.3
Explain how verification and validation (e.g. format
check, check digits numerical data, check data type etc)
has been addressed.
Task 4.4
explain how control mechanisms have been used.
Task 4.5
Page 1 of 2
Evidence /
Page No. (to
be filled by
the student)
Criteria reference
To achieve the criteria the evidence must show
that the student is able to:
M1 Provide appropriate examples
comprehensive explanations
Provide appropriate examples and the explanation
will be comprehensive and use appropriate
terminology in descriptions and explanations.
M2 Learner should produce some
good analytical reports using SQL.
Learner should discuss the access
control mechanisms for the system.
The database system should be fully functional and
provide access control mechanisms for the system.
Provide appropriate examples from the given
system, screenshots and clear explanations.
M3 Be able to test the database
Produce a test plan with examples to test data
validity, verification, data integrity, domain integrity
and performance. The database should have been
fully tested with records of any problems logged.
Produce a self-critical evaluation report to
Justify the solutions and the workings.
D1 Use critical reflection to
evaluate own work and justify
valid conclusions
D2 Be excellent in using queries
and access control mechanisms
D3 The arguments made will be
clear and expressed using fluent
technical language. Fuller and
more extensive explanation
Learner should produce some excellent analytical
reports using SQL and discuss the access control
mechanisms best suited for the system with proper
examples.
Identification of additional requirements of the given
specification and more extensive explanations. The
learner can justify the points they make, providing
reasons for their explanations, demonstrating their
depth of knowledge.
understanding
Page 2 of 2
Task no.
All Tasks
Task 03
Task 04
All Tasks
Task 03
All tasks
Evidence /
Page No.
(to be filled
by the
student)