Get premium membership and access questions with answers, video lessons as well as revision papers.
Weaknesses of a conventional file approach:
1. Data redundancy and confusion
Data redundancy is the presence of duplicate data in multiple data files. Data redundancy
occurs when different divisions, functional areas and groups in an organization
independently collect the same piece of information. Data redundancy results in high data
storage costs.
2. Program-data dependence
This refers to the tight relationship between data stored in files and the specific programs
required to update and maintain those files. Every computer program has to describe the
location and nature of data with which it works. In a conventional file environment, any
change in data requires a change in all programs that access the data.
3. Lack of flexibility
A conventional file system can deliver routine scheduled reports after extensive
programming efforts, but it cannot deliver adhoc reports or respond to unanticipated
information requirements in a timely fashion. The information required by adhoc
requests is somewhere in the system but too expensive to retrieve.
4. Poor security
Because there is little control or management of data, access to and dissemination of
information may be out of control. Management may have no way of knowing who is
accessing or even making changes to the organization‘s data.
5. Lack of data sharing and availability
The lack of control over access to data in the conventional file environment does not
make it easy for people to obtain information. Because pieces of information in different
files and different parts of the organization cannot be related to one another, it‘s virtually
impossible for information to be shared or accessed in a timely manner
gregorymasila answered the question on November 17, 2017 at 18:36
- Highlight the activities performed during systems delivery(Solved)
Highlight the activities performed during systems delivery
Date posted: November 17, 2017. Answers (1)
- Explain the steps that may be taken by the systems administrator to ensure security of password based access control mechanism.(Solved)
Explain the steps that may be taken by the systems administrator to ensure security of password based access control mechanism.
Date posted: November 17, 2017. Answers (1)
- Briefly describe the key features of a product, event or transaction that make it suitable for bar coding(Solved)
Briefly describe the key features of a product, event or transaction that make it suitable for bar coding.
Date posted: November 17, 2017. Answers (1)
- Name six areas covered under post-audit activity.(Solved)
Name six areas covered under post-audit activity.
Date posted: November 17, 2017. Answers (1)
- A software engineer requires a range of software utilities. Explain the usefulness of any three such utilities.(Solved)
A software engineer requires a range of software utilities. Explain the usefulness of any three such utilities.
Date posted: November 17, 2017. Answers (1)
- Outline any anomalies that are associated with redundant data.(Solved)
Outline any anomalies that are associated with redundant data.
Date posted: November 17, 2017. Answers (1)
- Explain the type of information that should be maintained for the post-implementation review of a system.(Solved)
Explain the type of information that should be maintained for the post-implementation review of a system.
Date posted: November 17, 2017. Answers (1)
- Explain three ways in which modern information communication technology (ICT) has affected the portability of information.(Solved)
Explain three ways in which modern information communication technology (ICT) has affected the portability of information.
Date posted: November 17, 2017. Answers (1)
- Define GUI and state its advantages.(Solved)
Define GUI and state its advantages.
Date posted: November 17, 2017. Answers (1)
- Differentiate between open and closed systems.(Solved)
Differentiate between open and closed systems.
Date posted: November 17, 2017. Answers (1)
- Outline the importance of systems study.(Solved)
Outline the importance of systems study.
Date posted: November 17, 2017. Answers (1)
- Select two facilities usually found in fourth generation languages (4GLs) and explain their application in developing a prototype.(Solved)
Select two facilities usually found in fourth generation languages (4GLs) and explain their application in developing a prototype.
Date posted: November 17, 2017. Answers (1)
- Giving reasons, identify four situations where communication over wireless medium for instance radio and mobile phones may be preferable to guided communication over cable (Solved)
Giving reasons, identify four situations where communication over wireless medium for instance radio and mobile phones may be preferable to guided communication over cable
Date posted: November 17, 2017. Answers (1)
- Using a nested loop write a C program which should print the following result(Solved)
Using a nested loop write a C program which should print the following result
*
**
***
****
*****
******
*******
********
*********
**********
**********
*********
********
*******
******
*****
****
***
**
*
Date posted: November 17, 2017. Answers (1)
- With a simple analogy, explain the process of data transmission from one end of the world to the other through the internet(Solved)
With a simple analogy, explain the process of data transmission from one end of the world to the other through the internet.
Date posted: November 15, 2017. Answers (1)
- List and explain the advantages of using the intranet in the work place(Solved)
List and explain the advantages of using the intranet in the work place.
Date posted: November 15, 2017. Answers (1)
- Discuss the various search techniques used on the internet/intranet.(Solved)
Discuss the various search techniques used on the internet/intranet.
Date posted: November 15, 2017. Answers (1)
- Explain the four stages of intranet maturity (Solved)
Explain the four stages of intranet maturity
Date posted: November 15, 2017. Answers (1)
- Explain Protocol giving two (2) examples in Web design and Hosting(Solved)
Explain Protocol giving two (2) examples in Web design and Hosting.
Date posted: November 15, 2017. Answers (1)
- Write Short notes on the world wide web (WWW)(Solved)
Write Short notes on the world wide web (WWW)
Date posted: November 15, 2017. Answers (1)