This website uses cookies to ensure you have the best experience. Learn more

Chapter 3 Essay

2796 words - 12 pages

Review Questions Chapter 1

1.3 Describe the approach taken to the handling of data in the early file-based systems.
In the early file based system their all data was in written form, due to the lake of education, due to the in-familiarity with new techniques, lake of computer knowledge so all the data required would be stored in a file or files owned by the programs.
Discuss the disadvantages of this approach.
Different programs could be written in different languages, and would not be able to access another program's files. This would be true even for those programs written in the same language, because a program needs to know the file structure before it can access it.
...view middle of the document...

This may include instructions on how to log on to the DBMS, make backup copies of the database, and how to handle hardware or software failures.
(5) People: This includes the database designers, database administrators (DBAs), application programmers, and the end-users.

1.6 Discuss the roles of the following personnel in the database environment:
a. data administrator: Data administrators are persons who are responsible for the overall management of data resources in an organization.
b. database administrator: Database administrators are responsible for physical database design and for managing technical issues in the database environment.
c. logical database designer: ensuring, via normalization procedures and the definition of integrity rules, that the stored database will be non-redundant and properly connected
d. physical database designer: specifying how database records are stored, accessed and related to ensure adequate performance.
e. application developer: Persons such as systems analysts and programmers who design new application programs. System developers often use CASE tools for system requirements analysis and program design.
f. end-user: Persons throughout the organization who add, delete, and modify data in the database and who request or receive information from it. All user interactions with the database must be routed through the DBMS.

1.7 Discuss the three generations of DBMSs.
SQL Server: Microsoft SQL Server is an application used to create computer databases for the Microsoft Windows family of server operating systems. Microsoft SQL Server provides an environment used to generate databases that can be accessed from workstations, the Internet, or other media such as a personal digital assistant (PDA).
Oracle: is made up of a set of processes running in your operating system. These processes manage how data is stored and how it is accessed. It is a database system through which we can manipulate the date through different process.

Microsoft-Access: MS Access is a relational database management system (RDBMS). 
RDBMS is a special type of database management system that stores data in form of related tables. It is differ from flat file databases because it uses several tables for a single database.

1.8 Discuss the advantages and disadvantages of DBMSs.
Advantages -
Data independence: Application programs should be as independent as possible from
details of data representation and storage. The DBMS can provide an abstract view of the
data to insulate application code from such details.
Efficient data access: A DBMS utilizes a variety of sophisticated techniques to store and
retrieve data efficiently. This feature is especially important if the data is stored on
external storage devices.
Data integrity and security: If data is always accessed through the DBMS, the DBMS
can enforce integrity constraints on the data. For example, before inserting salary
information for an...

Other Papers Like Chapter 3

Chapter 3 Mini Case Essay

1424 words - 6 pages A 1 2 B C D E F 3 Chapter 3 Mini Case 4 5 The first part of the case , presented in Chapter 2, discussed Computron Industries’ situation after an expansion 6 program. A large loss occurred in 2010, rather than the expected profit. As a result, its managers, directors, and 7 investors are concerned about the firm’s survival . 8 9 Donna Jamison was brought in as an assistant to Fred Campo, Computron 's chairman, who had the task

Ethics Chapter 3 Essay

708 words - 3 pages CHAPTER 3 Emerging Business Ethics Issues Chapter Objectives • To define ethical issues in the context of organizational ethics • To examine ethical issues as they relate to the basic values of honesty, fairness, and integrity • To delineate abusive and intimidating behavior, lying, conflicts of interest, bribery, corporate intelligence, discrimination, sexual harassment, environmental issues, fraud, insider trading, intellectual

Mgmt340 Chapter 3, 4

615 words - 3 pages Chapter 3: Problems 2 & 4 2. What are some sources of risk in a systems analysis and design project, and how does a project manager cope with risk during the stages of project management? 2. Some sources of risk in a systems analysis and design project are resources, current technology, and rules and regulations. Sometimes, resources are not always available whether it be manpower or materials and software. Current technology can

Chapter 1-3

3667 words - 15 pages Prototyping Chapter 1 Usability Testing Final Design Chapter 2 Chapter 3 B. Project Table IV. Project Resource A. People People typically have an abstract idea of what they want as an end result, but do not know what software should do. Skilled and experienced software engineers recognize incomplete, ambiguous, or even contradictory requirements at this point. B. Hardware and Software The system that user want to do is simply

Chapter 3 Questions

913 words - 4 pages 1. Which of the following is true about 1 bit? c. Represents one binary digit 2. Which of the following terms means approximately 106 bytes? b. Megabyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term

Chapter 3 Questions

888 words - 4 pages Building TCP/IP Networks Kerry Pullum Introduction to Networking (NT1210) Adrian Driver October 6, 2014 Building TCP/IP Networks 1. Which of the following is true about a TCP/IP network? b. The network uses standards defined in TCP/IP RFCs, plus other standards 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) c. Ethernet d. TCP/IP mapping 3. Think generically about the idea of a networking

Chapter 3 Solutions Manual

1756 words - 8 pages CHAPTER 3 SYSTEMS DEVELOPMENT AND DOCUMENTATION TECHNIQUES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 3.1 Data Flows: merchandise, payment, cash and register tape Date Source: customer Processes: capture sales and payment, give cash and register tape to manager Storage: sales file (register tape), cash register 3.2 It is usually not sufficient to use just one documentation tool. Every tool documents a

Chern's Case Chapter 3

534 words - 3 pages Chern Case – Chapter 3 The “Canadian” Legal Context Possible inequities: | Cause? | Solution? | Table A-2There seems to be preference in the selection of Asians, males and Hispanic persons | When analyzing Table A-2, which compares the percentage of males, females, Whites, Blacks, Asians, and Hispanics employed in a job category with their availability in the relevant population of qualified people interested in the position, we’ve come

Chapter 3 Assignment 1

1318 words - 6 pages Annette Durie NT1210 Unit 3 Assignment 1 Key Terms: TCP/IP Network – A computer network that uses the standards defined and referenced by the TCP/IP model. Networking Standard – A document that details information aabout some technology or protocol related to networking, and that document has been passed through a review and approval process that certifies the document as a standard. TCP/IP model – An open collection of standards related

Pm Chapter 3 Anwers

831 words - 4 pages CHAPTER 3 – Organization: Structure and Culture Review Questions : 1. What are the relative advantages and disadvantages of the functional, matrix, and dedicated team approaches to managing projects? A ) The functional approach : Advantages: • There is no radical alteration in basic structures of the parent organization. • Maximum flexibility in use of staff within functional units. • In-depth expertise can be brought to

Chapter 3 Procrastination

689 words - 3 pages CHAPTER 3 Methodology The descriptive method of research was used in this study. Descriptive method is a fact-finding study with adequate and accurate interpretation of the results. It describe with emphasis on what actually exist, or any practices that is involved on our study

Related Essays

Chapter 3 Essay

1371 words - 6 pages Chapter Review Activities Use the features in this section to study and review the topics in this chapter. answer These Questions 1. Which of the following is true about a TCP/IP network? a. The network uses only standards defined in TCP/IP RFCs. b. The network uses standards defined in TCP/IP RFCs, plus other standards. c. The IT personnel must choose to use TCP or IP. d. The network must use only LANs, but no WANs. 2. Which of the

Chapter 3 Essay

3370 words - 14 pages Chapter 3 Methodology This third chapter discussed the methods that the researcher has used in order to collate and evaluate the data in accordance to the goal of the study. Methodology is like a strategy or plan for achieving some goal; methods are the tactics that can be used to service the goals of the methodology. In essence, methodologies provide the blueprints that prescribe how the tools should be used. Considerably, the researcher

Chapter 3 Essay

3343 words - 14 pages CHAPTER STUDY OBJECTIVES 1. Analyze the effect of business transactions on the basic accounting equation. Each business transaction must have a dual effect on the accounting equation. For example, if an individual asset is increased, there must be a corresponding (a) decrease in another asset, or (b) increase in a specific liability, or (c) increase in stockholders’ equity. 2. Explain what an account is and how it helps in the recording

Week 3 Chapter 5 Essay

399 words - 2 pages Chapter: Chapter 5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way