Database Design Process (Chapter 3). Peter Rob and Elie Semaan Databases: Design, Development, and Deployment Using Microsoft Access Second Edition. System Development. Any production database system -- a reality, you must follow a carefully defined plan. This plan
Peter Rob and Elie SemaanDatabases: Design, Development,and DeploymentUsing Microsoft Access
Any production database system -- a reality, you
must follow a carefully defined plan. This plan
reflects the notion that a database’s successful
design, its implementation, and its applications
development require the successful completion of
the following steps:
6. Create a basic data dictionary for all the components found in each ERD segment. At the initial design stage, the data dictionary is a document that precisely describes each attribute’s characteristics. Table 3.1 shows a few sample data dictionary entries. Keep in mind that the amount of detail in the data dictionary is important. More detail is always better than less detail. (Note that items of special interest are highlighted.)
12. Perform a final review of the data dictionary contents. Examine all table structures, all attribute characteristics, and the relationships as expressed by FKs.
13. Implement the database based on steps 11 and 12. Make sure that entity integrity and referential integrity are maintained. You will learn how to implement a database in Chapter 4.
14. Create the end-user interface to “connect” the end user to the database. This step requires the creation of the basic end-user components: forms, queries, and reports. You will learn how to accomplish these tasks in Chapters 5, 6, and 7.
15. Create the database system by connecting all the system components. In Chapter 8 you will learn how to use macros, stored in macro groups, to do this job.
16. Verify the implementation and applications development for each module against the business rules and the end-user requirements derived from the description of operations. In Chapter 9 you will see how to approach this task.
17. Create a security system to protect the database from improper and/or unauthorized use. You will learn how to create a full-blown database administrator’s security environment in Chapter 10.
18. Test the system thoroughly. This step requires that you put your own database through its paces. We suggest that you let other testers use your database system for a while to see how well it works. It’s always best to discover and fix problems before you deliver the final product!