Out: Nov 1, 2013
Due: Nov 20, 2013

CENG 302 Assignment #4

  1. Review the description of each of the stages of the SDLC in Ch 2 of the text. (10 marks)
  2. Create a Context Diagram of the SDLC, showing the SDLC as a single process, illustrating the stakeholders as Terminators and showing the information that flows between the stakeholders and the SDLC. (3 marks)
  3. Create a Level 0 diagram for the SDLC showing each of the 5 stages as individual processes. Label the processes, entities and datastores and label the flows showing what the input and output of each stage is. (6 marks)
  4. Database Preliminary Design/Data Dictionary (Background pp 390-410; Note in-class demo of Microsoft Access) (6 marks)
    Review the Puppy Palace problem on page 443. The Solution is to create 2 tables – dogs and tricks.
  5. Answer Q1 and Q2 of the problem. (2 marks)
  6. Answer question 3 of the problem using Microsoft Access to create the tables and define the fields in Design Mode using appropropriate data types. Fill in the Description section with a reasonable definition of the meaning of each field.
  7. Use screen shots to print out your table definitions. Write your humber computer userid on the top of the first printout.
  8. Save your database file using your humber userid as the file name, ie: abcd1234.mdb, and post the file in your public_html directory on munro. (4 marks)
  9. Security. (9 marks)
    The Whole Planet Travel agency is a small ten person firm specializing in personal and business travel. It has ten employees including two secretary/receptionists six travel agents, and one of fulltime manager. The senior travel agent also acts as an assistant manager. Each employee has their own computer terminal linked to a central server which serves as their database repository and link to the Internet. During the “high season” they will hire temporary help to deal with the extra load. They collect personal information on their clients including credit card numbers, dietary preferences [ hallal or kosher food, allergies] and details relating to medical insurance for travel. They do between six and 9000 “bookings” per year worth about $16 million and even book business trips for rival companies such as yours software security firm and some of your competitors. About 80% of their business consists of repeat customers.
    Keeping in mind the categories of detection and prevention, minimization and recovery examine different points of vulnerability such as input, access, output and process, come up with a 6 point Security Plan that is cost effective for this company. Next to each point describe the costs and indicate how they are recurring (weekly, monthly or annual) or nonrecurring, tangible/intangible, direct/indirect and which categories each expense falls under of Capital, Supplies, Overhead or Personnel. (1 mark for each security measure described/half a mark each for categorization.)
  10. On Nov 13 (or possibly the 15th) you will divide into groups of 4 and be assigned one of 3 of the database word problems posted on the course web site: Hacker Security, Manhattan Skunk Works, or The Whole Enchilada Inc.
  11. As a group decide on the necessary fields and agree on the definitions to use as a data dictionary. (4 marks)
  12. Put the fields into 1NF/1st Normal Form – decide on which fields are part of the minimal candidate primary key and agree on a justification for each of them. Discuss 3 other fields that you rejected as a primary key and provide the reason for rejecting them. If necessary agree on any adjustments to the data dictionary. (4 marks)
  13. Put the fields into 2NF/2nd Normal Form. Create separate tables and name them so that the non-key fields are “fully functionally dependent” on the primary key in that table and for each non-key field justify the relationship to the whole key. (4 marks)
    Each group should hand in one copy of the above, signed by all members of the group. All members of the group will share equally in the result, however you may also file a dissenting opinion with the rest of you’re the assignment if you feel that your grouphas made a wrong decision.
    Studens who are unable to attend the class should request the assignment of a problem via email that day or evening.