List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Start up a database | 1.1 Configure the system for a database start-up 1.2 Monitor the database start-up and operation for irregularities |
2. Manage the database | 2.1 Take action to ensure that a data dictionary has been compiled and that data structures are in place 2.2 Maintain data integrity constraints, according to business requirements 2.3 Create and design indexes, and multiple-field keys, according to business requirements 2.4 Monitor the locking options chosen for the database 2.5 Confirm that recent backups of the database have been stored, and that backups can be retrieved as a full working copy 2.6 Monitor data storage space for ongoing viability, and resize as needed 2.7 Update the data according to organisational guidelines |
3. Manage database access | 3.1 Allocate or remove access privileges according to user status 3.2 Monitor network server log-in log file for illegal log-in attempts, or for security breaches 3.3 Manage system resources in the context of database administration |
4. Document database maintenance tasks | 4.1 Document changes to database start-up procedures 4.2 Itemise database management structures 4.3 File authorisations for access changes 4.4 Detail the procedures for monitoring log files 4.5 Record the procedures to manage systems resources |
Evidence of the ability to:
configure a database start-up
confirm data integrity
monitor data storage requirements for database
update data
update database access.
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
To complete the unit requirements safely and effectively, the individual must:
outline backup and recovery methodologies
explain the architectural design of relational databases
explain the concept of database security
outline the process involved in the selection and use of appropriate database management tools
explain the principles of structured query language (SQL)
outline the tasks involved in database administration
outline the tuning methodologies.
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the database field of work, and include access to:
industry software packages
a live database, preferably on a local area network (LAN) on which there is a server that offers log-in functionality.
Assessors must satisfy NVR/AQTF assessor requirements.