Database system
This refers to a system composed of a group of related files.
File
This is a group of records of the same type.
Record
This refers to a group of related fields e.g. a student record may be composed of fields such as
student name, student number, course, date of birth, etc
Database management system
This refers to a complex software system that constructs, expands and maintains the database.
It also provides the controlled interface between the user and data in the database.
(i) Features of a DBMS that provide data security and integrity:
1.Usernames and passwords- used to prevent unauthorized
2.Transaction locks i.e. write locks and read locks. Write locks prevent other
processes(programs) from updating data currently being updated by a process. Read locks
prevent any other processes from updating data that is currently being read by a process.
3.Checkpoints and journals. A checkpoint is a ?snapshot? of the database
before it wasupdated by processes/programs and the journal holds details of updates
subsequently made. In the event of failure, the recovery process can rebuild the database
from checkpoints and journals.
4.User rights and privileges- access to files or fields of records could be
granteddepending on the user privileges.
5.Encryption- coding of data by special algorithm that renders them unreadable
withoutdecryption.
Integrity checks e.g. checks on relationships amongst tables to ensure that they are
validand data validations
(ii) Data redundancy
This refers to the presence of duplicate data in multiple data files. Data redundancy occurs
when different divisions, functional areas, and groups in an organization independently
collect the same piece of information. For instance, within the commercial loans division of a
bank, the marketing and credit information functions might collect the same customer
information contained in separate files.
Problems caused by data redundancies:
1.Large storage space requirements
Since each functional area of an organization maintains the same piece of information,
the resource requirements (hard disk, optical disk, magnetic tape) may be very large.
2.Problem of securing all the redundant data
Though the data in such a database is redundant, it must still be secured from
unauthorized access. This task is very difficult to implement because each functional area
of an organization holds the data.
3.Confusion
Since data is collected and maintained in so many different places, the same data may
have different meanings in different parts of an organization. Simple data items such as
the fiscal year, employee identification, and product code can take on different meanings
as programmers and analysts work in isolation on different applications.
4.Difficulty in performing updates
To update a redundant data item, one must update all instances of the redundant item in
all the department files of an organization. This is clearly hectic!
5.Compromised system integrity
In cases where only one instance of a redundant data item is updated, the system integrity
is compromised since the other instances of the redundant data item in the rest of the
organization‘s departments will differ from the updated instance of the redundant data
item.
(iii) Precautions that should be taken into account in establishing a centralized data control
system to avoid redundancy:
1. One should ensure that adequate security mechanisms are in place to ensure that users are
granted access to only what they are supposed to access.
2.One should ensure that the system is fault tolerant i.e. it should be not too centralized as to
be vulnerable to failure.
gregorymasila answered the question on November 21, 2017 at 20:19
- Using your own experience, explain why more and more software is being purchased for windows environment as opposed to character based environment(Solved)
Using your own experience, explain why more and more software is being purchased for windows environment as opposed to character based environment.
Date posted: November 21, 2017. Answers (1)
- Explain Ways in which a GUI makes a system user friendly(Solved)
Explain Ways in which a GUI makes a system user friendly.
Date posted: November 21, 2017. Answers (1)
- Graphical user interface (GUI) ,have proved to be more user friendly than current character based systems.Other than the graphical user interface, give a summary of...(Solved)
(i) Graphical user interface (GUI) ,have proved to be more user friendly than current character based systems.
Other than the graphical user interface, give a summary of at least three interfaces you would use in "the design of systems.
(ii) Briefly explain three ways in which GUI makes a system user friendly.
Date posted: November 21, 2017. Answers (1)
- During systems development life cycle (SDLC): the systems analyst uses some tools to model the users requirements in such a way that he is able...(Solved)
During systems development life cycle (SDLC): the systems analyst uses some tools to model the users requirements in such a way that he is able to communicate his understanding of the users needs.
Required:
Identify and describe three tools the systems analyst may use. to model the systems
requirements.
Date posted: November 21, 2017. Answers (1)
- One important aspect of information-systems management is the physical and managerial location or siting of the information system within an organisation.Explain two information systems location...(Solved)
One important aspect of information-systems management is the physical and managerial location or sitting of the information system within an organisation.
Explain two information systems location options indicating circumstances under which each siting allocation is appropriate.
Date posted: November 21, 2017. Answers (1)
- A company needs information on whicb to base decisions concerning the current operations and future plans. Explain areas of management control where computers are used or...(Solved)
A company needs information on which to base decisions concerning the current operations and future plans. Explain areas of management control where computers are used or can be used.
Date posted: November 21, 2017. Answers (1)
- Four companies A., B, C and D, which have similar activities but are not part of a group,have the following computer configurations,Company A: Three stand-alone...(Solved)
Four companies A, B, C and D, which have similar activities but are not part of a group,
have the following computer configurations,
Company A: Three stand-alone micro-computers (CPU, VDU, Keyboard, hard disk and
mouse) each having its own printer.
Company B Small office with 11 micro-computers linked in a Local Area Network (LAN).
Each micro-computer has its own processing ability, but is linked via the
LAN to central printers, disk storage, file server and tape streamer devices.
The LAN is completely self-contained", This means that there are no modems or other similar external devices attached to it.
Company C Four processing locations connected by a Wide Area Network (WAN). Each
location has a LAN in the same configuration as company B, although there is also a
dedicated landline to two of the three. offices (offices are connected in a ring to two of
the other offices). Each server is updated with. data from the other three locations at 15
minutes interval.
Company D Twenty processing locations, each with its own LAN in the same configuration
as company B. All locations are connected in a star configuration to head
office. File servers at each location are updated from head office after every
five minutes, Each location has a reserved external., telephone line for
selected customers to use. Orders by customers are
transmitted direct on to the company D‘s Computer system
Required:
(a) State, with reasons, for each company, what security procedures should be applied to
ensure there is no unauthorized access to its computer system.
(b) Company B is planning to establish additional branches and wants to upgrade its
systems to duplicate those of company D.
State and explain the data communication systems you would recommend
Date posted: November 21, 2017. Answers (1)
- Why are expert information systems not popular in business systems?
(Solved)
Why are expert information systems not popular in business systems?
Date posted: November 21, 2017. Answers (1)
- User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages. Required:Name and describe three features of a...(Solved)
User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages.
Required:
Name and describe three features of a user friendly software.
Date posted: November 21, 2017. Answers (1)
- The accounting department of a medium sized business organisation for which you work wishes to purchase microcomputers to support its functions. You have been asked to...(Solved)
The accounting department of a medium sized business organisation for which you work wishes to purchase microcomputers to support its functions. You have been asked to draft a document that outlines the hardware and software specifications for the proposed project.
What would your draft contain?
Date posted: November 21, 2017. Answers (1)
- Which recursive sorting technique always makes recursive calls to sort
subarrays that are about half size of the original array?(Solved)
Which recursive sorting technique always makes recursive calls to sort
subarrays that are about half size of the original array?
Date posted: November 21, 2017. Answers (1)
- What is friend function?(Solved)
What is friend function?
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of bureaux as a method of possessing a computer.(Solved)
Outline the disadvantages of bureaux as a method of possessing a computer.
Date posted: November 21, 2017. Answers (1)
- The organisation you work for has hired a software engineer to develop a suite of software to manage your payroll application system. As the financial...(Solved)
The organisation you work for has hired a software engineer to develop a suite of
software to manage your payroll application system. As the financial manager, you
are working closely with the software engineer to ensure that the software quality
assurance standards are attained.
Required:
(i) List any four data validation checks that the software engineer should incorporate into
the program.
(ii) Why is it important to test the software before implementing it?
(iii) Suggest two measures that the software engineer must take in order to simplify user
training and support that is fundamental to the success of the information systems
project.
Date posted: November 21, 2017. Answers (1)
- Outline the service factors to consider before procuring a computer.(Solved)
Outline the service factors to consider before procuring a computer.
Date posted: November 21, 2017. Answers (1)
- It is claimed that data required to support strategic planning differs from data required to support operational decisions in terms of the time period referred to...(Solved)
It is claimed that data required to support strategic planning differs from data required to
support operational decisions in terms of the time period referred to and the source or origin of the data.
Required:
Briefly describe how data required to support strategic planning differs from that required to
support operational
decisions in terms of:
(i) Time period referred to.
(ii) The source or origin of the data.
Date posted: November 21, 2017. Answers (1)
- Outline advantages of using bureaux as a way of acquiring a computer.(Solved)
Outline advantages of using bureaux as a way of acquiring a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of leasing a computer.(Solved)
Outline the disadvantages of leasing a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the advantages of leasing a computer.(Solved)
Outline the advantages of leasing a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of renting a computer.(Solved)
Outline the disadvantages of renting a computer.
Date posted: November 21, 2017. Answers (1)