Instructor NotesModule7:
Implementing DataIntegrity
Introduction
In this module, students will learn about different types of dataintegrity
requirements. Then they will learn how to find business rules and how they map
to dataintegrity requirements. Finally, you will discuss different ways of
implementing dataintegrity requirements in the physical design.
After completing this module, students will be able to:
!
Identify business rules that relate to data integrity.
!
Identify the dataintegrity requirement type to which a business rule applies.
!
Evaluate and determine a location for implementingdata integrity.
!
List implementation techniques for a given dataintegrity requirement.
Materials and Preparation
This section provides you with the materials and preparation needed to teach
this module.
Materials
To teach this module, you will need the following materials:
!
Microsoft
®
PowerPoint
®
file P07_1609a.ppt
!
Module 7, “Implementing Data Integrity”
!
Activity 7.1, “Identifying DataIntegrity Requirements”
!
Activity 7.2, “Determining DataIntegrity Implementations”
Preparation
To prepare for this module, you should:
!
Read all materials for this module.
!
Complete the activities.
Presentation:
50 Minutes
Activities:
55 Minutes
2 InstructorNotesModule7:ImplementingDataIntegrity
Activities
Activity 7.1: Identifying DataIntegrity Requirements
In this activity, students will work in small groups to evaluate a set of data
requirements from the Ferguson and Bardell, Inc. case study. They will
determine areas where dataintegrity issues might arise and will formulate a set
of dataintegrity rules that must be followed by the development team of the
Ferguson and Bardell, Inc. solution.
After the activity, lead a class discussion so that students can compare results.
After completing this activity, students will be able to:
!
Identify areas where dataintegrity and validity are required.
!
Specify dataintegrity requirements as they relate to data requirements.
!
To prepare for the activity
1. Prepare extra copies of the data requirements from Activity 3.1 and the
existence and relationship requirements from Activity 4.2 for students who
do not have their own copies.
2. Complete the activity.
Activity 7.2: Determining DataIntegrity Implementations
In this exercise, students will work in groups. The groups will look at a physical
design and determine areas where dataintegrity should be enforced.
After the activity, lead a class discussion so that students can compare results.
After completing this activity, students will be able to:
!
Identify areas where dataintegrity should be enforced.
!
Choose a method for implementing business rules and dataintegrity
requirements.
!
To prepare for the activity
• Complete the activity.
Module Strategy
Use the following strategy to present this module:
!
Overview of DataIntegrity
This section introduces data integrity, discusses the three types of data
integrity (domain, entity, and referential), and describes the process of data
validation. Although some of the terminology in this section might be new
to students, the concepts should be familiar to them. You should be able to
move through this section fairly rapidly.
InstructorNotesModule7:ImplementingDataIntegrity 3
!
Implementing DataIntegrity Requirements
This section discusses the transformation of business rules into logic built
into a system or application. This concept might be more difficult for some
students to grasp. Be prepared with supplemental real-life examples,
working from the plain-language statement of the business rule to the
encapsulation of that rule as data logic.
Methods for implementingdataintegrity are grouped into two locations: in
the database and outside the database. Implementing in the database is
sometimes called “declarative” and implementing outside the database is
sometimes called “procedural.” Point out that, outside the database, you
could implement dataintegrity in the client application or on an application
server. However, do not spend much time on this topic; it is covered more
thoroughly in Module 8, “Designing Data Services.”
As you list the methods available for each location, make sure students
understand the basics of how they work. However, do not go into too much
detail because implementation specifics will differ depending on the
database used. Focus on giving guidelines for when to use one
implementation method versus another.
THIS PAGE INTENTIONALLY LEFT BLANK
.
Instructor Notes Module 7:
Implementing Data Integrity
Introduction
In this module, students will learn about different types of data integrity. through this section fairly rapidly.
Instructor Notes Module 7: Implementing Data Integrity 3
!
Implementing Data Integrity Requirements
This section