At what point do you outgrow access

Assignment Help Basic Computer Science
Reference no: EM131091809

For your current assumptions about the users, the functions that they want to accomplish, etc., what do you see as the most critical performance requirements you have to meet? Can you express that in either volumes of data, or numbers of users, for example? Or in terms of transactions (create/update/delete operations on data) per day, hour, minute, or second? Do transactions have to be processed in a specific maximum amount of time?

How do you see those user-level performance requirements translating into physical database design implementations? Does this drive you to consider simpler ways of structuring or representing the data or how you use the various kinds of keys? What about indexing?

Suppose your database project is a roaring success, and you scale it up big-time! (Example: you have been building a Bed & Breakfast reservations and management system, and now dozens of B&B operators all over your resort destination area want to cooperatively use it to manage bookings, referrals, billing, etc.) What "multipliers" would it take to stretch your system to the breaking point - much larger files, many more users, more transactions per unit time? How might you cope with those? At what point do you "outgrow Access?"

Consider the restrictions that a typical database project might need to impose, either on the way users use the system, the kinds of data they put into the system, or the constraints the system is expected to enforce "naturally" (as if it read their minds during the design phase). What are these? How do you allocate which restrictions to which part of the finished system (people, business process using the database, tables and relationships, other DBMS features, or?).

How might "massive multipliers" on demand for your system, such as in (3), affect your thoughts about which parts of the physical design to enforce the constraints you identify in (4)?

Reference no: EM131091809

Questions Cloud

Finding common denominator : What career uses finding common denominator and provide a real life example . Show work
Based on the number of units he sells : Adrian receives an hourly wage of $12 per hour plus commission. His commission is based on the number of units he sells. He works a normal 40-hour week, gets paid bi-weekly, and has a commission rate of 20%.
Find the maximum compression : Find the Maximum compression
Computing the canadian dollars : A car is priced at 37,000 Canadian dollars (CAN) and the same car in Switzerland is priced at 38,500 Swiss Francs (CHF). In Canadian dollars, which would be the better deal if 1 CAN = 1.08 CHF? By how much?
At what point do you outgrow access : How might "massive multipliers" on demand for your system, such as in (3), affect your thoughts about which parts of the physical design to enforce the constraints you identify in (4)?
Demonstrates the appropriate time : Provide at least one (1) example of a scenario that demonstrates the appropriate time / situation to use a recovery option to return a Windows 8 system to a functional state. Identify the recovery option you would use for your provided example, an..
Controversy in the nursing profession for essay : Choose a controversy in the nursing profession for Essay - Identify your topic and your position on it. Identify two sources that you plan to use to support your argument.
Describe any potential legal or ethical considerations : Calculate the financial information (including forecasting demand, break-even analysis, sales, promotional budget, and marketing expenses for three years by quarter).
Proprietary nature of the apple platform : What are the benefits of apps? The disadvantages? Are there any benefits/disadvantages to the proprietary nature of theApple platform?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Introduction to information security

While most organisations tend to focus on protecting their organisations from external cyber attacks, "...an insider attack has the potential to cause significant, even catastrophic damage to the targeted IT-infrastructure" (Dimitrakos, Martinelly..

  How much does this tell the attacker about the key k1

Being able to recover the key given a plaintext and ciphertext would be bad enough for any encryption mechanism; explain why it would be particularly fatal for public key cryptosystems.

  Describe how they solve the problem

Describe how they solve the problem.

  Add all of the numbers except for the sentinel.

The following loop is supposed to read some numbers until it reaches a sentinel (in this case -1). It is supposed to add all of the numbers except for the sentinel.

  How long does it take before the time out value

How long does it take before the Time Out value, as calculated by the Jacobson/Karels algorithm, falls below 300? Assume initial Deviation value of 25; use δ = 1/8.

  C# in a windows forms application

C# in a Windows Forms Application. Design a program that asks the user to enter the amount that he or she has budgeted for a month. Use labels to list expediencies and text boxes to hold the expense (such as housing, entertainment, fuel, power, mi..

  How to solve performance problem of computer

Your friend recommends upgrading RAM to 256 MB to correct performance problems. Is there any other way to solve performance problem? Justify your answer.

  Determine independent variable and dependent variable

The length of the string is shortened by 5cm and the time is measured. Determine the independent variable? Determine the dependent variable? What must the controlled variables be?

  Creating procedure to allow receiving clerk to add movies

Create a procedure which will allow the receiving clerk to add the new movies received to the mm_movie table.

  What normalization is used for and why

What normalization is used for and why

  Design a decision support system

The owner of a hardware store wants to design a decision support system to predict how many and which type of nails she should sell and what information she needs to do so. The scenario is described below:

  Arp and dns both depend on caches

What undesirable consequences might there be in having too long a DNS cache entry lifetime?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd