COMPUTER SOFTWARE ENGINEERING - NBTE
COMPUTER SOFTWARE ENGINEERING - NBTE
COMPUTER SOFTWARE ENGINEERING - NBTE
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
fffffff<br />
NID in Software Engineering (Draft)<br />
)<br />
3.2 Describe the data types<br />
that can be used when<br />
specifying column<br />
definition.<br />
3.3 Describe other database<br />
objects and their uses.<br />
Magic Board<br />
• Drop, rename, and truncate<br />
tables.<br />
• Create, maintain, and use<br />
sequences.<br />
• Create and maintain indexes<br />
Week<br />
GENERAL OBJECTIVE 4: UNDERSTAND THE PROCEDURES FOR<br />
WRITING EXECUTABLE STATEMENTS<br />
8 4.1 State the significance of<br />
the executable section.<br />
Week<br />
4.2 State the rules of nested<br />
blocks.<br />
4.3 Describe constraints<br />
Explain the use of<br />
executable section.<br />
Discuss the rules of<br />
nested blocks.<br />
PC loaded with<br />
Oracle Software and<br />
connected to OHP.<br />
Magic Board<br />
GENERAL OBJECTIVE 5: UNDERSTAND PROCEDURES FOR<br />
CONTROLLING USER ACCESS<br />
Discuss the tools for<br />
Controlling User Access.<br />
9 5.1 State the tools required<br />
for Controlling user<br />
access<br />
PC loaded with<br />
Oracle Software and<br />
Connected to OHP.<br />
• Create private and public<br />
Synonyms.<br />
GENERAL OBJECTIVE 4: UNDERSTAND THE PROCEDURES FOR<br />
WRITING EXECUTABLE STATEMENTS AND<br />
INCLUDING CONSTRAINTS..<br />
• Write statements in the Assist students in their Networked PC Lab.<br />
executable section.<br />
practical work<br />
Loaded with Oracle<br />
Software.<br />
• Execute and test a PL/SQL<br />
block.<br />
• Use coding conventions.<br />
• Create and maintain<br />
constrains.<br />
GENERAL OBJECTIVE 5: UNDERSTAND PROCEDURES FOR<br />
CONTROLLING USER ACCESS<br />
• Create users.<br />
Assist students carryout<br />
their practical<br />
• Create roles to ease setup<br />
and maintenance of the<br />
security model.<br />
Networked PC Lab.<br />
Loaded with Oracle<br />
Software.<br />
• Use the GRANT and<br />
REVOKE Statements to<br />
grant and revoke object<br />
privileges.<br />
134