7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 1/27
TH DEVELOPMENT
OF
PRISON MANAGEMENT SYSTEM PRMS)
NADATUL IFFAH BINTI BU HASAN
This report is submitted n partial fulfilment of the requirements for the
Bachelor of Computer Science Database Management)
FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY
UNIVERSITI
TEKNIK L
MALAYSIA
MEL K
2008
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 2/27
BSTR CT
The development of Prison M anagement System (PRM S) is used to manage the
prisoner information including their dependents, cases, cells and also the parole requests.
The purpose of this system is to make a user-friendly system to both users which are
System Adm inistrator (SA) and Database Adm inistrator (DBA). With this system, DBA
will do m ost of their work such s grant or revoke system and object privilege to other
user, make the backup and recovery for the selected data, create a dynamic table and
produce the dynamic report by using the system interfaces in the PRMS. This system is
developed by using Oracle9i as the database management system. Meanwhile, Oracle9i
Application Server is used as application server in the server side and the Oracle9i
Forms Builder is used s the tool to design the system interfaces nd used to code
PRMS. The Iterative waterfall model is the chosen methodology to develop th is system.
The database methodology for the PRMS is Structured System Analysis and Design
Method (SSADM ) and it is implemented along with the system development process to
ensure the objectives of the project can be fulfilled. The features like password security
by using encryption, generating dynamic report and tracing the logon user are included
in this system. The frnal result or the expected output of this project is the development
of system for the use o f prisons staff to manage the prisoner information, which is
PRMS.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 3/27
BSTR K
Sistem Pengumsan Penjara PRMS) adalah sistem yang digunakan untuk
menguruskan maklumat pesalah termasuk maklumat penjaga, kes yang terlibat, tempat
kumngan serta permohonan parol. Tujuan utama sistem ini dibangunkan ialah untuk
menyediakan sistem yang mesra pengguna terutamanya kepada pengguna sistem ini
iaitu Pentadbir Sistem SA) dan Pentadbir Pangkalan Data DBA). Dengan adanya
sistem ini, DBA boleh melakukan kerja-kerja seperti memberi kebenaran atau menarik
kembali keistimewaan akses ke atas sistem dan objek, membuat data sokongan dan
pemulihan data, menghasilkan jadual dinamik dan menghasilkan laporan dinamik
dengan hanya menggunakan antara muka sistem. Sistem ini dibangunkan dengan
menggunakan Oracle9i sebagai sistem pegmsan pangkalan data. Selain itu, Oracle9i
Application Server digunakan sebagai pelayan sistem di dalam komputer pelayan dan
Oracle9i Forms Builder digunakan sebagai perisian atau alat untuk menghasilkan antara
muka dan mengkodkannya. Model Iterative W aterfall digunakan sebagai kaedah untuk
membangunkan sistem ini. Sementara itu, langkah-langkah dalarn Teknik Struktur
Analisis dan Reka Bentuk di gunakan untuk membangunkan pangkalan data untuk
PRMS. Selain daripada itu, ciri-ciri tambahan yang di aplikasikan di dalam sistem ini
ialah seperti perlindungan sekuriti untuk kata lauan pengguna, menghasilkan laporan
dinamik dan meyimpan data pengguna yang m e n d a h masuk ke sistem. Hasil akhir
daripada projek ini adalah PRM S.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 4/27
CHAPTER
I
INTRODUCTION
This chapter contains project background, problem statement, objective, scope,
project significance, expected output of the system and the conclusion of this chapter.
Project background describes briefly about the project that will be developed. The
problem statements will state the problems that encountered in the existing system or
current system. For the objective, it is about the aim for the development of the to-be
system in order to solve of the problem in the existing system while scope covers
the target users, function and the technology of the to-be system. Project significance
will describe the benefit and the important of the to-be system for the user. Meanwhile,
expected output will describe the final output of the to-be system. The conclusion
summarizes this chapter and gives an introduction of the next chapter.
1 1 Project Background
The project that will be ,developed is Prison Management System PRM S) for the
use of Prisons Department Malaysia under the Ministry of Internal Security in
effectively managing the prison data and also more to the database management. The
users for this system are Database Adm inistrator DB A) and System Administrator
SA). DBA can do all the activities like data backup and recovery, creating dynamic
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 5/27
tables grants or revoke a system or object privilege to user stored procedure or
function and generate report by using system interface. This system is also to make sure
that DBA can do all the transaction by using this user-friendly interface not only by
doing all that in the database.
SA will register the new prisoner and all the other detail into the system and
process all the information of the prisoner. After the registration system adm inistrator
will update the data and do all the given m odules in this system.
The existing system is still using both computer and manual file system such as
interview requests by the relatives of the prisoner. T o solve this problem this project
will autom ate business process and plus other mod ules will be added to the system like
adding the specific interface that required all the information about prisoner and their
relatives.
1 2 Problem Statement
Th e following prob lems are identified to develop this system:
1
Limited usage of database trigger
The database triggers are not widely use in the current system. The usage of the
trigger is limited to important data for example trigger will be used to set a time
when D BA w ant to m ake a backup.
2 Lim ited usag e of stored procedure
DB A has to open the database to run the stored procedure or function. It is hard
to d o that because it wastes a lots o f time.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 6/27
3
Not using dynamic table structure
Usually to create table for example user is not required to give their own
parameter likes number o f columns and have to know the syntax.
4
System administrator is not allow to give system and object privilege
Currently system administrator canno t give a system or object privilege to other
user in the system and only DB A will do that.
5
Using wizard for Data Backup and Recovery
DBA usually does the backup and recovery file by using some certain wizard.
DBA has to make sure that the wizard can help to backup all the data in the table
or small amo unt of data in som e table.
6
Produce a static report
In existing system whe n the user wan ts to see the report user choos es the
reports that ar e listed in the interface only. All the param eter is set to gene rate the
summ ary of the report.
1 3 Objective
The aims o f the
PRMS
develop ment are:
1
To ap ply and widely use th e database trigger.
2
To app ly stored procedure or function in the system by using the interface.
3
T o allow user to use dynam ic table structure.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 7/27
4
To allow the system administrator to grant and revoke the system and object
privilege to other user.
5
To provide the data backup and recovery function by using system interfaces.
6
To produce the dynamic report.
1 4 Scope
The scope will explain the boundaries of this project and in order to develop
system for users in Prisons Department Malaysia that enable them to manage the
prisoner registration and reports. Deliverables of the project will be a complete system
for users that will meet the objectives.
1 4 1 Target user
The target users for this Prison Management System PRMS) are System
Administrator SA) and Database Administrator DBA) of Prisons Department
Malaysia.
1 4 2 Function
The modules that the PRMS will provide:
1 Insert/Update/Delete/Search
User will insert a new prisoner, update the data, or delete the data of the prisoner
and search some data that related to the prisoner details.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 8/27
2
Trigger
M ake a trigger to keep track of all the changing of data.
3
Stored Procedure/Function
For this PRMS user can use the given interfaces to query the stored procedure o r
function. For example search for number of prisoner who will release for the
next month.
4 Create dyna mic table structure
User can give their own parameter such as number of column to create a table
and it become easier to DB o crea te table in jus t one interface.
5
Gran t and revoke privilege
Give a grant or revoke to some user. Grant is included system privilege and
object privilege.
6 Data Backup an d Recovery
Users can use this PRMS to make the backup so that it can save much time by
not opening -the new wizard. DB also can make the recovery for the data to
mak e sure that the data are safe.
7
Dynamic Report
User can enter their own parameter to view the report such
s
by choosing the
numb er of prisoner and the age. It will show the result of prisoner in what a ge are
the highest numbers.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 9/27
1 4 3 Technology
List of technology that w ill be used in this system:
1
This project will use Microsoft Windows XP Professional as a platform for the
operating system.
2
This project will use Oracle9i and as a DB MS.
3
This project will use Oracle9i Forms Developer to develop the system interface.
4
This project will use Oracle9i Application Server as the application server for the
system.
1 5 Project Significance
Prison Management System PR M S) is aimed at developing prison
managem ent system that is a -collection of registers and reports for the effective
management of prisons. This system is useful for user to manage and store the data of
the prisoners.
With the implementation of this project, the Prisons Department Malaysia can
change the existing system to this system so that the DBA can do works more easy to
ensure the data are completely secured and have a backup if something bad happen to
the system and database.
This system also to make sure that all the processes in the m odules are doing in
the interfaces expect for the trigger module. The interfaces are link to the Oracle9i
database and the new data that inserted in the interface will be store in database.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 10/27
In addition, the PRMS also creates a safe way in the matter of managing the
prisoner s information. This is due to the need of username and password in order to use
the system. So, the PRMS can be accessed only by authorized users which are the DBAs
and SAs. Here, the system is protected from intrusion of unauthorized users.
1 6
xpected Output
The expected output from this project is Prison Management System (PRMS).
This project is system-based. It will be used by user to manage all the prisoner data and
protect from unauthorized users.
The users of this system are two SA of the Prisons Department Malaysia. SAs
are the only authorized users to add, update and delete the data and to can list back all
the transactions of data and also generate report.
Meanwhile, for data backup, DBA will make a backup to the backup file and will
be store in any location or path in the DBA computer. If the data are lost -or missing in
the database, this text files data can be recovery.
For the trigger, which is not included in any interface, DBA will do in the
database the trigger just to keep track of all the incoming data. DBA will set the time
when the trigger will be doing. Other than that, DBA will generate the several of
dynamic report to view the result of some data likes how many prisoners will be release
next year.
The results of literature review will be one of the expected outputs of this system
because it will help to prove the contents of the PRMS are valid and reasonable. Lastly,
the user manual for the PRMS will be produce in a last phase of the system to make the
user more understand about the PRMS.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 11/27
1 7
Conclusion
After identifying the project background problem statements objective scope
project significance and expected output it reveals that PRMS is adeq uate to solve the
problem faced by DBA of Prisons Department Malaysia such as inefficient of backup
method time consu ming low level of security and secrecy of data and others. Each
aspect gives an overall understanding for user that will be using the
system. This to-be
system will develop system interfaces to make DB A work effortlessly. For examp le d o
the data backup and recovery w ithout using an y wizard.
The identification of this chapter will be used as a guide to develop the next
phases which are Literature Review and Project Methodology. The m ethodology
requirements an d schedule of the system also w ill be highlighted in the next chapter.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 12/27
CHA PTER I
LITERATURE REVIEW AND PROJECT METHODOLOGY
2 1
Introduction
This chapter describes about facts and findings on the Prison Management
System PRM S) gathered from som e sources. Several sources from the internet and
interview m ethod s that relevant to PRM S are studied.
The first part that covers on this chapter is literature review. It gives a summary
and an evaluation of previous research or work on a topic. It is important to discover
how the project is related to the work of others and provide background information
needed to understand the project.
The following part of this chapter focused on the project methodology, project
requirements, and project schedule and milestones. The project requirements include
software, hardware and other requirements. The conclusion will summarize about this
chapter.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 13/27
2 2 acts and inding
The Prison Management System (PRMS) is under the Prisons Department
Malaysia. The development of this PRMS is focused to the managing and reporting data
for prisoner details. D atabase Administrators (DBAs) can d o their job where it leads to
more manageable, systematic and easy way. Things that will be research are like how
the existing systems operate, the existing system, the usage of the admin side to the
system such as stored procedure, trigger, backup and recovery, producing report and
grant or revoke privilege to the user. Facts and finding will be helped in guiding the
development of the PRMS.
2 2 1 Technique
For PRMS, techniques to obtain the facts and finding are by interview the
Officer of Penjara Alor Setar, Kedah and a little research on that organization. The
sample of questions are Do the prison department still using manual file system to the
certain case or fully computerized system , D o the dependent detail is compulsory ,
Parole request case and many more. For the result, not every prison in Malaysia is
using the same prison system. It depends on the type of the prison in every state in
Malaysia. For example, Penjara Alor Setar is only for Banduan T ahanan Reman so their
system is simpler than the other prisons that have the heavy-hitting criminal. The
permission letter for the research in the Penjara Alor Setar is show in Appendix
J.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 14/27
2 2 2
Existing System
Case Study
1:
Prisons Department M alaysia O fficial Online Portal
This case study is based on observation and researching in Prisons Department
Malaysia http://www.prison.aov.m~).This online system is more to front-end user and
the user of this system is anyone who can access the website.
This webpage is only to give information generally about Prisons Department
Malaysia including user can view and order products that have been made by prisoners
from the prisons. The staff administrators manage the data like user comment, order and
delivery for the product and store the registered user s details.
Other than that, all interview requests by the relatives of the prisoners need to be
recorded and tracked. Most of the prisons still using manual method which is wrote in a
guest book. The programming tool that is used in this system is web programming
language like HTML. The colors of the system are white, red and grey.
9 be- Jab-. P.n ma
b4d p
n n ~ U r U . *
L.~-~nal w a g
Vd-I
irdc n
L , . ~ . * , - p . * ~ . n . . n * . b n
J.b.u.P.*
W m a am111 4 n M M
nu-
m.8 4 l u M u d W Y
44 .n
at-
I
o n
.*.L~*YD
lah
4 r u u h P.#anan
4 - 7
1.n g~w-
,,I nan*
OUR
~ . l * a n ~ . h II a r n d
nap
hom.l. l.n
4 d . n bld.n.M.rn.
+)aua
Feh x l
hlar
zwam
Kt ewah 17113
i q Terama l tm l la
T w u
M7IYnO P a h a y
Ten$
Pl~m
-el T
P a a q
Dl Pmwa
Pew
,.
- .
Foto Institmi
Figure
2.1
Home Page of Portal Rasmi Jabatan Penjara Malaysia
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 15/27
Case Study 2: Lockworks LL C (Lock Track Offender Management)
This case study is based on observation and researching in Lock Track
Offender Management
htt~:Nwww.locktrack.com/index.html).
ockworks LLC is
controlling data management for the corrections professional: comprehensive, flexible
solutions for jail and prison management. This system provides two version which are
web-based online ) and system-based desktop).
This web-based system of Lock Track Offender Managem ent is basically
manage and control data that had been loaded with lots of data in their clients system.
For example, this system manages the small cases that were reported to the Sheriff
Department. Most of their clients like Benton County Sheriff, Lincoln County Sheriff
and Philadelphia Prisons are using this system because the data can be managed easily.
This system is only use by the System Administrator only. The programming tool that is
used in this system is also web programming language like HTML. The colors of the
system are white an d brown.
Lockworks LLC
I - l
T d I z O NT RO L N O T
h*
a
Lo&Wo* p o ~ i d e rolutionr that rtartm'th LldivMualbsd
;luWH.hukhl -
jmna3emmtyrtem that
prorider
irnmedlate
to
i n e r m ~ ~ r e c o r n m ? d a Ho n snd wr tom ln r ta b fb n and
jamrate, and drta lied dat about .enderr and :*ah% We M t o m n
km
n d a@$ *f* POR
~ . I U * u r ( r . f - 4 ~ ~ ~
'lnmrter.
LodgTrar). manaqec ynvr data from invertigarmn to
I
24-7 and
; h Y . . l ~ . L m ~
e r r l u ( hRY . . l r *Y " , . I * L r
'bookw& through ren hn a =hi ah on and paro le.
icontact ur now to learn h a w
lU
mrb
an l n b m t l o n i c h j-h--whI-HI)-
: -mad
m m r
for y ur
ail:
j M * r r b & w h r r r r a c - a d
LOC KBTRACIi
Prison hlanagernent spt er n
j
15
wmprehenrire, simple and
alfordabte
roiution*fth the : ,866.664,4,85
j~ , - .~-t .1.~-ac--aw-
apdirV
to streamline
Uw
intake and
x k i n g
p r o c ~ r e r f
;info
modern
conechonr facilities
,Enter r monthk d radng o r
rm
free mffee m q s and
iSearde r Bert Coffee.
W
v c 4
h d r
YJ la w?)xhp b.
Figure 2.2: Hom e Page of Lock Track Online System
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 16/27
2 2 3
Database Function
1
reating Database Trigger
Database triggers will be used in PRMS. It will be used in some situation like
when the user wants to update the parole appointment of the prisoners. The important of
using this database triggers is to track all the updated data and keep it in the log table.
Syntax to create trigger using Oracle 9i that retrieve from the website,
http://www.ss64.com/ora~triaaer c.htm1 and the example of trigger are:
C R EA T E [ O R R E P L A C E ] T R I G G E R <trigger-name>
[ R E F E R E N C I N G [NEW A S
<new ow ame>]
[ O L D A S <old-row-name>]]
[F O R EACH ROW [WHEN
<trigger ondition>)]]
Example;
CREATE OR REPLACE TRIGGER AFTER-UPDATE AROLE
AFTER UPDATE
ON PAROLE
REFERENCING NEW AS NEW OLD AS OLD
FOR EACH ROW
DECLARE
ACT VARCHAR2
;
BEGIN
INSERT INTO UPDATE PAROLE LOG
CURRENT PPOINTMENT AY,CURRENT PPOINTMENT ONTH,CURRENT
PPOINTMENT EAR, ESCRIPTION)
VALUES :NEW.NEXT AY, :NEW.NEXT ONTH, :NEW.NEXT EAR,
:NEW.DESCRIPTION);
END AFTER UPDATE PAROLE;
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 17/27
2 Creating Stored Procedure/function
This system w ill be used stored procedure to the certain eve nt like when the user
wants to login to the PRM S and to clear the form in the system. S yntax to create a
procedure using O racle 9i that retrieve from the website,
(htt~://www.ss64.com/ora/
p c e d u r e c .html) and the example are :
CREATE [ O R R EP L A CE ] PROCEDURE s c h e m a . p r o c e d u r e - n a m e ( o p t o n s )
i n v o k e r i g h t s A S p l s q l u b r o g r a m ody
CREATE [O R R EP L A CE ] PROCEDURE [ s c h e m a . ] p r o c e d u r e a m e ( o p t i o n s )
i n v o k e r i g h t s A S LANGUAGE J AV A NAME ( s t r i n g )
CREATE [ OR R EP L AC E] PROCEDURE [ s c h e m a . ] p r o c e d u r e a m e ( o p t i o n s )
i n v o k e r r i g h t s A S L A NG UA GE C NAME n a m e L I BR A R Y
l i
n a m e
[AG EN T I N ( a r g u m e n t ) [ W IT H C ON TE XT ] [P AR AM ET ER S
( p a r a m e t e r s )
o p t i o n s :
a r g u m e n t I N [N O C O P Y ] d a t a t y p e
a r g u m e n t OUT [N OC OP Y ] d a t a t y p e
a r g u m e n t I N OUT [N O C OP Y ] d a t a t y p e
The p rocedu re can have s ev e ra l
a r g u m e n t s
separa ted wi th commas)
Example;
P r o c e d u r e C h e c k P a c k a g e F a i l u r e I S
B E G I N
I F NOT F o r m S u c c e s s ) THEN
R A I S E F o r m T r i g g e r F a i l u r e ;
END I F ;
END;
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 18/27
3.
Doing Data Backup and Recovery
According to Database Management System User Guide (2002), the following methods
are valid for backing-up an Oracle database:
ExportAmport
- Exports are logical database backups in that they extract
logical definitions and data from the database to a file.
Cold or Off line Backups -
Shut the database down and backup up ALL data,
log, and control files.
Hot or On line Backups
- If the database is available and in ARCHIVELOG
mode, set the tablespaces into backup mode and backup their files. Also
remember to backup the control files and archived redo log files.
RMAN
Backups
While the database is off-line or on-line, use the m a n
utility to backup the database .
Here, the step s to make a data backup manually using Oracle 9i:
There are two types of backups which are logical backups and physical backups.
In Oracle, use export utility to perform logical backups, and import utility to perform
logical recovery. There are four modes for export and import utility which are full,
tablespace, table and user.
To do the IogicaI backup in Oracle9i is by using windows command prompt. The
syntax are:
C:\>set oracle sid <database name>
C:\>exp user/password@database ame file <file ame.dmp> full
y
/tablespace <tablespace ame> /tables < table 1,table
> /owner <user>
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 19/27
Example for full modes backup,
Open w indows comm and prompt and type:
C:\>set oracle sid=company
c:\>exp system/manager@company file
=
backup2.dmp owner
=
system
To do the logical recovery in Oracle9i is by using windows command prompt.
The syntax are:
oracle-sid
=
<database ame>
C:\>imp user/paisword@database ame file
=
<file ame.dmp> full
= y /tablespace
=
<tablespace ame> /fromuser
=
<user sender>
touser
=
<user-receiver> /tables
=
< table 1,table 2,..)>
Exam ple for user modes recovery,
Open windows comm and prompt and type:
C:\>set oracle id=company
C:\>exp system/manager@company file backup2.dmp fromuser
=
system touser
=
bob
4 Gran t Privilege
Oracle Object privileges
Based on the article, Control Access with Oracle Grant Security 2003), Object
privileges assign the right to perform a particular operation on a specific object. Here a re
some examples of object privilege assignment:
grant select, insert on prisoner to staff;
grant all on prisoner to dba;
grant select on prisoner view to staff;
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 20/27
Oracle System privileges
System privileges cover m any areas of access in a broad b rush, with grants such
as select any table. Examples o f system privilege grants include:
g r a n t s e l e c t an y t a b l e t o d ba ;
g r a n t c r e a t e an y t a b l e t o d ba ;
g r a n t c r e a t e t a b l e s p a c e t o db a;
Oracle Role based security
Role security a llows gathering related gran ts into a collection. S ince the role is a
predefined collec tion of privileges that are grouped together, p rivileges are easier to
assign to users, a s in this example:
c r e a t e r o l e s t a f f ;
g r a n t s e l e c t u pd at e on p r i s o n e r t o s t a f f ;
g r a n t s e l e c t on i t e m a b l e t o s t a f f ;
g r a n t s t a f f t o 5100 5101;
5 Revoke Privilege
Revoke Privileges on Tables
Once you have granted privileges, you may need to revoke some or all of these
privileges. To do this, you can execute a revoke command. You can revoke any
combination of select, insert, update, delete, references, alter, and index.
The syntax for revoking privileges on a table is:
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 21/27
revoke privileges on object from user
For exam ple, if you wanted to revoke d elete privileges on a table called suppliers
from a user named an derso n, you would execu te the following statement:
revoke delete on suppliers from anderson
If you wanted to revoke all privileges on a table, you could use the all keyword.
For example:
revoke all on suppliers from anderson
r
If
you had granted privileges to public all users) and you wanted to revoke these
privileges, you could execute the following statem ent:
revoke all on suppliers from public
2 2 4
Summary o Facts and Finding
After studied the relevant existing system, it can conclude that to-be system is
more manageable an d efficient especially for the DBA to manage all the data. Th is to-be
system is more to back-end user so the DBA works will be m uch easier to m anage the
data and ma ke sure the data is secured.
Comparing the both current system, their system are not using the database
function like creating a dyna mic table, backup an d recovery, or even grant or revoke an
system privilege using the system interfaces. A ll the works are not stated in their system
s
only Database Adm inistrator DB A) knows it.
To-be system will develop the database function such as creating a dynamic
table, backup and recovery, or even grant or revoke a system and object privilege using
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 22/27
the system interfaces. It also will designed an in-out register to keep track all prisoners
and others who move in and out for various reasons and include provisions for recording
the prisoners sent to courts for hearing. Table 2.1 show the com parison between PRM S
and the two existing sys tem.
Table 2 1: Comparison between PRMS and existing systems
2 3 Project Methodology
Backup and recovery
on the system
interfaces
Dynamic report
generate on the
system interfaces
Create dynam ic table
on the system
interfaces
Grant and revoke
privilege on the
system interfaces
This section will explain about the methodology used to develop the system.
The Iterative
Waterfal1:Model that shows in Figure
2 2
is the approach that has been
used to implement the Structured System Analysis and Design Method SSADM ). This
model has been choosing because when a stage is not successful, previous stages will
often require revision. The phases involved in the SSA DM are:
PRMS
Yes
Yes
Yes
Yes
Prisons Department
Malaysia Portal
No
No
No
No
Lockworks LLC
No
Yes
No
No
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 23/27
2 3 1 Planning
At this phase, all the requirements are gathered by using interview method and
some. The data requirements document is used to agree requirements with clients. To
make sure that it is easily understood, it should not be overly formal or highly encoded.
Furthermore during this time a consistent Gantt chart was developed for the project
management.
2 3 2 Analysis
Data analysis begins with the statement of data requirements and then produces a
conceptual data model. T he aim of analysis is to obtain a detailed description of the data
that will suit client s requirements s o that both high and low level properties of data and
their use are dealt with. These include properties such as the possible range of values
that can be permitted for attributes. Th e conceptual data model provides a shared, formal
representation of what is being communicated between clients and developers during
database development. The current system is analyzed using the UML Class Diagram.
Meanwhile the to-be database systems are analyzed using Context Diagram and Data
Flow Diagram.
2 3 3 Design
Database design starts with a conceptual data model and produces a specification
of a logical schema. T his will usually determine the specific type of O RA CL E database
system (network, relational, object-oriented) that is required, but not the detailed
implementation of that design. The Data Flow Diagram and Context Diagram from
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 24/27
Analysis phase are now useful to initiate the design phase.
2 3 4 Implementation
Implementation involves the construction of a computer system according to a
given database design document and taking account of the OR CLE environment in
which the system will be operating. Implementation may be staged, usually with an
initial system than can be validated and tested before a final system is released for use.
2 3 5 Testing
Testing compares the implemented system against the Database design
documents and requirements specification and produces an acceptance report or, more
usually, a list of errors and bugs that require a review of the analysis, design and
implemei.ltationprocesses to correct testing is usually the task that leads to the waterfall
model iterating through the life cycle). Testing is usually considered to involve two main
tasks; validation and verification without adequate testing users will have little
confidence in their data processing.
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 25/27
Figure 2 3: Iterative W aterfall Model
2 4 Project Requirem ents
This part describes the software, hardware and other requirements for the
development of Prison Management System PRM S).
2 4 1 Software Requirem ents
The required software for the development of this system is as described in the
Table
2 2
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 26/27
Table 2 2: Software Requirements
Professional 2002 Service Pack 2
2 4 2 Hardware R equirements
This project is stand-alone system or system-based, so only one personal
computer will be used, This computer consists of a mouse, a keyboard, a monitor and
central processing unit CPU).
Table
2 3:
Ha rdwar e Requirements
7/23/2019 The Development of Prison Management System (PRMS) - Nadatul Iffah Bt. Abu Hasan - QA76.9.M3.N32 2008
http://slidepdf.com/reader/full/the-development-of-prison-management-system-prms-nadatul-iffah-bt-abu 27/27
2 4 3 Other Requirements
1 Network Requirements:
The netwo rk w ill b e required to test the comple ted project and the requirement is
Local Area Ne two rk LA N) cable that will be used to conv ert the computers to form
client-server architecture. Th e web browser tha t recomm ended is Moz illa Firefox.
2 5 Project Schedule and Milestones
This section will state the Project Schedule and milestones which will be main
time frame guideline for the project. Schedule date starts from the briefing from the
client and ends by the presentation of initial project. Table 2.4 shows the project
milestone. For the Gantt Char4 refer App endix A.
Table
2 4:
Project Milestones
report of introduction,
I
Introduction,
2
literature review and project
I
Literature Review
I
methodology documentation
I
and Project
I
requirements.
Modify and submit project
proposal.
Complete and submit progress
to clients. 1 1 Methodology 1
4 Prepare for project analysis.
1 16.1.2008
20.1.2008
1
None
2.1.2008
12.1.2008
Com plete project analysis
2 1.1.2008
26.1.2008
1
Report of Project
1 1.1.2008
15.1.2008
Project Proposal
Report of