...Chapter 7 Managing Data Resources True-False Questions | |The benefits of a DBMS are immediately tangible. | | | | | |Answer: False Difficulty: Easy Reference: p. 234 | | |Excellent hardware and software will result in inefficient information systems if file management is poor. | | | | | |Answer: True Difficulty: Easy Reference: p. 234 | | |A record describes an entity. | | | | | |Answer: True Difficulty: Easy Reference: p. 235 | | |In traditional file processing, each functional area, by developing its own specialized applications, contributes to data ...
Words: 4937 - Pages: 20
...Strategic Information - information to expand business and explore new opportunities Example information needed by a shopkeeper: Whether to stock different varieties of items Whether to diversify Whether to start a new branch in a different locality Whether to start an e-shop Statutory Information - used to provide information to the government Example information needed by a shopkeeper: Income tax account Sales tax account MANAGEMENT HIERARCHY AND INFORMATION NEEDS QUALITIES OF INFORMATION Accurate Complete Timely Trustworthy Relevant Brief Up-to-date SignificanceEnsure correct input and processing rules Include all data Give at the right time Do not hide unpleasant information Understand user needs Summarize relevant information Include all data up to present time Use attractive formats and graphical charts Information System - consists of all the components that work together to process data and produce information all contributing to the organization’s main goal. COMPONENTS OF AN INFORMATION SYSTEM Data Input that the system takes to produce information Hardware A...
Words: 2370 - Pages: 10
...University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System Inventory Option 1: Virtual Organization System Inventory Select one of the following Virtual Organizations: • Smith Systems Consulting • Huffman Trucking • Kudler Fine Foods Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary. |System Name |Brief Description |Department to Use |Purpose of the System |Connects With |Development Details | | | |the System | | | | |Fleet Truck Maintenance |Relational database and |Fleet Maintenance |The DBMS will house |Drivers, Fleet |Ease of use – This DBMS has a | |Database Management |an information | |all the maintenance |Maintenance, and the|familiar Windows ‘look and | |System |management tool that | |data tables for |entire organization.|feel.’ | | |helps you store | |Huffman’s trucks and | | | |Microsoft |information for | |trailers...
Words: 650 - Pages: 3
...Hughey, Elmehdi Ibnamar DBM/502 Database Management June 25th, 2012 Liz Musil In the late 1960s and early 1970s, there were two mainstream approaches to constructing database Management System’s (DBMS’s). The first approach was based on the hierarchical data model typified by IMS (information Management System). The second approach was based on the network data model, which its main aim of creation was to create a standard database that would unify number of functionalities such as programming languages (queries) for data retrieval, and the inability of the existing database to represent complex relationships database management systems (DBMS). However, these two models had some fundamental disadvantages: • Complex programs had to be written to answer even simple queries • There was minimal data independence • There was no widely accepted theoretical foundation. In reference to DBMS and the ability of building complex relational system, many Relational database management system RDBMS has been developed (also referred as a second generation of DBMSs). RDBMS was used extensively in the 80’s and 90’s, however due to its limitation to respond the more complex entity and, needs of companies and the increasing complexity of database applications. Two “new” data models have emerged; the Object-Relational Database Management Systems (ORDBMS) and Object-Oriented Database Management Systems (OODBMS), which subscribes...
Words: 1233 - Pages: 5
...DATABASE SYSTEMS To understand what drives database design, you must understand the difference between data and information. Data are raw numbers or other findings which, by themselves, are of limited value to decision makers. Information, on the other hand, is the result of organizing, processing, and interpreting data, thus transforming the findings into facts that are useful to decision makers. For example, the number of new users your clinic serves in a month means little until you compare it with the number of new users from previous months and years to see whether there has been an increase or decrease in the trend over time. Data are transformed into information by: Selection: Choosing the data that are useful and adequate for answering the questions that have been posed, and ignoring the data that are useless or inadequate for that purpose. Interpretation: Analyzing the data to put them into context, uncover patterns or problem areas, and reflect on the meaning of these patterns in relation to the questions being asked. The overall objective of converting data to information is to describe, explain, predict, and/or evaluate a program and its results. In this “information age” production of accurate, relevant and timely information is the key to good decision making. In turn, good decision making is the key to business survival in a global market. We are now said to be entering to “knowledge age”. Data are the foundation of information which is bedrock of knowledge...
Words: 4278 - Pages: 18
...FILE ORGANIZATION TERMS AND CONCEPTS THE DATA HIERARCHY A computer system organizes data in a hierarchy that starts with bits and bytes and progresses to fields, records, files, and databases * A bit represents the smallest unit of data a computer can handle * A group of bits, called a byte, represents a single character, which can be a letter, a number, or another symbol (A,2?,S) * A grouping of characters into a word, a group of words, or a complete number (such as a person’s name or age) is called a field Ex: employee Last name, Customer Account number * A group of related fields, such as the student’s name, the course taken, the date, and the grade, comprises a record; Ex: There will be one record for every one * A group of records of the same type is called a file. Ex: Employee Benefits file, Employee payroll file * Database: A group of related files about a specific entity Ex: HR database PROBLEMS WITH THE TRADITIONAL FILE ENVIRONMENT In most organizations, systems tended to grow independently without a company-wide plan. Accounting, finance, manufacturing, human resources, and sales and marketing all developed their own systems and data files. Figure 6-2 illustrates the traditional approach to information processing * In the company as a whole, this process led to multiple master files created, maintained, and operated by separate divisions or departments. As this process goes on for 5 or 10 years, the organization is saddled...
Words: 3898 - Pages: 16
...Discoverer Plus Database The Air Force is changing in unique way to make the critical mission more obtainable to logistics technicians. The Air Force has evolved into using more web based systems to process transaction, track assets, and obtain pertinent information. Users have become accustomed to working with different types of bases to get the job done. The one database used more by logistics personnel is the Oracle Discoverer Plus database. In this paper will discuss what is Discoverer Plus, we will breakdown some of its function areas like End User layer (EUL), Business Area, and Folders. We will discuss some feature of Discoverer Plus database, and last, we will provide the dated problems of Discoverer’s Plus database. Discoverer Plus is one of five parts of the Air Force Supply Central Database (AFSCD). According to AFM 23-110 “Discoverer Plus is an oracle database that provides supply technician and analyst with a user friendly ad hoc data retrieval tool. It gives the user capability of retrieving, organizing, and displaying data when they want it, in the way they want it” (USAF 2009). Discoverer Plus also gives user the choice of creating their own queries from scratch with the help of a friendly wizard. In addition a number of standard ad hoc queries are provided to each user under their user-ids. Although standard ad hoc queries contain a predefined set of data, they also have flexibility of applying conditions, change sort order, and modifying the display. Discoverer...
Words: 624 - Pages: 3
...organization/department………………...…………………………….2 The Existing System (Critical analysis and evaluation)…………………..………………2 Part A: Systems Analysis………………………………………………………………….4 1. Problem description……………………………………………………………….4 2. Feasibility Study………………………………………………………………….5 3. Cost Benefit Analysis……………………………………………………………..6 4. Information Requirements………………………………………………………...7 Part B: Systems Design and Development………………………………………………..8 2.1 Proposed IT Infrastructural Design (Hardware and Software)……………………8 2.2 Networking and Telecommunication options…………………………………….9 2.3 Storage…………………………………………………...………………………11 2.4 Back up……………………………………………………………………..……11 2.5 Security…………………………………………………………………………..12 2.6 Systems functionality…………………………………………………………….13 Part C: System Implementation………………………………………………………….14 3.1 Systems Testing………………………………………………………………….14 3.2 Implementation strategy………………………………………………………….15 3.3 Resolution of problems………………………………………………………..…16 Part D: Systems Maintenance……………………………………………………………16 4.1 Maintenance Procedures…………………………………………………………16 4.2 Updating and Upgrading…………………………………………………………18 Conclusions and Recommendations …………………………………………………….18 Bibliography ………………………………………………………...………………….19 Appendix A …..…………………………………………………………………………20 Question 1 Using the structured systems analysis and design approach, prepare a proposal for an information system (IS) at Cool-care manufacturers in Botswana. The document...
Words: 5480 - Pages: 22
...aspects. The discussion here is about the data warehouse design and usage in the case of the University of Nairobi Environment. Data warehouse can be built using a top-down approach, bottom – down approach or a combination of both. In this research paper we are discussing about the data warehouse design process. Data Warehouse (DWH) systems are used by decision makers for performance measurement and decision support. Currently the main focus of the DWH research field is not as much on the interaction of the DWH with the organization, its context and the way it supports the organization’s strategic goals, as on database issues. The aim of the study is to emphasize and describe the relationship between the DWH and the organization with conceptual models, and to use this knowledge to support data interpretation with business metadata. KEYWORDS Data Warehouse (DWH) Data Mart Extraction, Transformation and Loading (ETL); Software that is used to extract data from a data source like a operational system or data warehouse, modify the data and then load it into a data mart, data warehouse or multi-dimensional data cube. Legacy System: Older systems developed on platforms that tend to be one or more generations behind the current state-of-the-art applications. Meta Data: Information in a...
Words: 2816 - Pages: 12
...on File based system/ Data base system Solution: File-Based Systems: Conventionally, Before the database Systems evolved , data in the software’s Systems was stored in and represented using flats files. Drawbacks of File-Based Systems: File - Based Systems [pic] As shown in the figure, in a file-based system, different programs in the same application may be interacting with different private data files. There is no system enforcing any standardized control on the organization and structure of these data files. • Data Redundancy and Inconsistency Since data resides in different private data files, there are chances of redundancy and resulting inconsistency. For example, in the above example shown, the same customer can have a savings account as well as a mortgage loan. Here the customer details may be duplicated since the programs for the two functions store their corresponding data in two different data files. This gives rr.>e to redundancy in the customer's data. Since the same data is stored in two files, inconsistency arises if a change made in the data in one file is not reflected in the other. • Unanticipated Queries In a file-based system, handling sudden/ad-hoc queries can be difficult, since it requires changes in the existing programs. • Data Isolation Though data used by different programs in the application may be related, they reside in isolated data files. • Concurrent Access Anomalies In large multi-user systems the same file...
Words: 4599 - Pages: 19
...Course Registration System Vision Version 1.0 Revision History |Table |Version |Description |Author | |1/Dec/98 |Draft |Initial Draft |Sue Gamble | |13/Dec/98 |1.0 |Minor revisions following Peer Review. |Sue Gamble | | | |Added performance requirements. | | | | | | | | | | | | Vision 1 Introduction 1.1 Purpose The purpose of this document is to define the high-level requirements of the Wylie course registration (C-Registration) system in terms of the needs of the end users. 1.2 Scope This Vision Document applies to the Wylie course registration system, which will be developed by the Wylie College Information Systems (IT) department. The IT department will develop this client-server system to interface with the existing course catalog database. The C-Registration System will enable students to register...
Words: 4109 - Pages: 17
...Week 1: Information Systems in the Digital Firm - Lecture | | | Information Systems in the Digital Firm Evolution | Current State | Trends | Tutorial The Evolution, Current State, and Trends of Information Systems In addition to the material currently described, an introduction to cloud computing and user involvement in IT projects also will be included in this lecture. This is required as foundational knowledge for the chapters to come. We will explore it at a business level and a minimal technical level. | | Evolution | | The business landscape has changed over the past seventy years in every significant way. Without information systems, these changes would not have occurred. To gain a perspective on the evolution of information systems, we can review the significant computer inventions from the first computer through to cloud computing. As computer technology progressed, new skills had to be learned, and new methods of management evolved to replace old hierarchical styles with new team based methods. Increased productivity resulting in new information technology caused the downsizing of employees that began in the late 1980s and has continued. Information systems consultants identified productivity gains, so large that they cut the numbers in half and still weren't believed. Many of the products and services we use every day had not been invented just five or ten years ago. The ability to communicate electronically with anyone anywhere in the world...
Words: 5656 - Pages: 23
...Chapter 1—The Information System: An Accountant’s Perspective TRUE/FALSE 1. Information is a business resource. ANS: T 2. An information system is an example of a natural system. ANS: F 3. Transaction processing systems convert non-financial transactions into financial transactions. ANS: F 4. Information lacking reliability may still have value. ANS: F 5. A balance sheet prepared in conformity with GAAP is an example of discretionary reporting. ANS: F 6. The Management Reporting System provides the internal financial information needed to manage a business. ANS: T 7. Most of the inputs to the General Ledger System come from the Financial Reporting System. ANS: F 8. When preparing discretionary reports, organizations can choose what information to report and how to present it. ANS: T 9. Retrieval is the task of permanently removing obsolete or redundant records from the database. ANS: F 10. Systems development represents 80 to 90 percent of the total cost of a computer system. ANS: F 11. The database administrator is responsible for the security and integrity of the database. ANS: T 12. A backbone system is completely finished, tested, and ready for implementation. ANS: F 13. The internal auditor represents the interests of third-party outsiders. ANS: F 14. Information Technology (IT) audits can be performed by both internal and external auditors. ANS: T 15. The single largest...
Words: 3541 - Pages: 15
...STRATEGY PLAN FOR DATABASE SYSTEMS DATABASE ADMINISTRATOR FOR DEPARTMENT STORE (TECHICAL PAPER) ANDREW L. PASSIE STUDENT Dr. HOSSEIN BESHARATIAN PROFESSOR CIS 515 STRAYER UNIVERSITY September 6, 2013 SUMMER Page 1 STRATEGY PLAN FOR DATABASE SYSTEMS ABSTRACT We are also going to discuss a Technical paper on Database Administrator for Department Store. We should know that a Database Administrator is the person who is responsible for planning, organizing, controlling, and monitoring the centralized and shared corporate database. The DBA is the general manager of the database administration department. We are also going to discuss the potential sales of the department store transaction within a database, evaluation of all relationships of the database solution using the Crow Foot notation, justifying that Big Data tools could be used for forecasting sales and inventory of the department store, the SQL functions to help sales predictions, implementing cloud-hosted solution for a database in the cost involved and pricing structure required, ranking...
Words: 4277 - Pages: 18
...criminals The majority of crimes is committed by company insiders Typically covered up or not reported to authorities to avoid embarrassment According to a 2001 survey of over 500 companies and government agencies: 85% detected computer security breaches in the preceding 12 months Financial losses due to security breaches topped $377 million 70% reported that Internet connections were frequent points of attack Only 31% said that internal systems were frequent points of attack. Theft by computer Theft is the most common form of computer crime. Computers are used to steal Money Goods Information Computer resources One common type of computer theft today is the actual theft of computers, such as notebook and PDAs Notebook and PDAs are expensive Data stored on a computer can be more valuable Denial o f Service ( DOS) Attacks bombard servers and Web sites with so much bogus traffic that they are effectively shut down networks, denying service to legitimate customers and clients. Computer security Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction Two inherent characteristics A computer does exactly what it is programmed to do, including reveal sensitive information Can be reprogrammed Any computer can do only with it is programmed to do Cannot protect itself from malfunctions or deliberate attacks Physical access restrictions...
Words: 7438 - Pages: 30