Module 3
Module 3
Given the 2 diagrams as shown below, the flat file problems were addressed by
pooling data into a common database that is shared by the users. How pooling of
data or sharing of data resolves the problems identified in diagram no. 1? (4
points)
By minimizing data redundancy, establishing a single update method, utilizing current
values or information, and separating task data, the Database Approach solves the
problem. There is no data redundancy since each data element is only stored once,
resulting in lower storage costs and no data redundancy. Because each data piece is
only stored in one place, just one update (single update) action is needed. This saves
time and money by reducing the amount of time and money it takes to maintain the
database up to date. Any alteration to the database by one user impacts the current
data values of all other users. Users get access to the whole data domain of the firm
due to task-data independence. If users' information demands spread outside their
immediate sphere, additional needs can be fulfilled more easily than with the flat-file
approach. Users are only limited by the limitations of the firm's data (the entire
database) and the authenticity of their request for access.
b. Given the No. 2 diagram, the database approach where all the firm's
information was pooled in a common database or one basket, what control
definitely can be violated. Why? (4 points).
It may infringe on Access Control. Access control refers to the restriction of access.
Thanks to the construction of a common database or one basket, data that should only
be accessed or allowed by a single user are now accessible by other users, even if they
are not permitted on the supplied data. As a result, it would be against the Access
Control for that user and database.
c. List the four elements of the database environment as per diagram no. 3. and
explain in two to three sentences (4 points)
d. Database Management System Operation (8 points)
d.1 User program sends a request (call) for data to the DBMS. The call is written in a
special data manipulation language that is embedded in the user program. (1 pt.)
d.2. The DBMS analyzes the request by matching the called data elements against
the User view and the Conceptual view. If the data request matches, it is authorized
and processing proceeds to Step 3. If it does not match the views, access is
denied. (2 pts.)
d.3. The DBMS determines the data structure parameters from the Internal view and
passes them to the operating system, which performs the actual data retrieval. Data
structure parameters describe the organization and access method (an operating
system utility program) for retrieving the requested data. (1 pt.)
d.4. Using the appropriate access method, the operating system interacts with the
disk storage device to retrieve the data from the Physical database. (1 pt.)
d.5. The Operating System then stores the data in a main memory buffer area
managed by the DBMS. (1 pt.)
d.6. The Database management system transfers the data to the user’s work
location in main memory. At this point, the user’s program is free to access and
manipulate the data. (1 pt.)
d.7. When processing is complete, Steps 4, 5, and 6 are reversed to restore the
processed data to the Database.(1 pt)
e. Give at least 8 examples of commonly used Data Management Systems? (8
points)
Oracle Database
Maria DB
PostgreSQL
IBM DB
Microsoft: Access
MySQL
Mongo DB
Microsoft: SQL Server
f. What My SQL can do in a Database Management System? (5 points)
MySQL creates data storage, data retrieval, administration, reporting, queries, and data
security as a database management system. The MYSQL database is the most
extensively used database management system due to its stability, performance, and
ease of use. The program is compatible with over 20 different computer platforms,
making it suitable for a wide range of operating systems. Through the program, users
may access a large library of tools, training, and support, and consultancy services.
g. Are accountants responsible for normalizing an organization’s databases,
Why? (5 pts.)
No, database normalization is a technical issue that is normally handled by systems
administrators. IT workers are largely responsible for the normalization of an
organization's database. Accountants, on the other hand, should be included in the
procedure for auditing purposes. A normalized organization eliminates data redundancy
while also providing an audit trail for all collected information. As a result, accountants
are involved in the normalization of an organization's database.
Honor Pledge:
"I affirm that I have not given or received any unauthorized help on this assignment, that
this work is my own"