Develop an application with the chosen dbms

Assignment Help Computer Engineering
Reference no: EM1326865

A school intends to procure an integrated student management application holding all details of registered students including personal information, courses taken, and examination grades. The alternative approaches are:

1. Buy a database management system and use in-house staff to develop an application with the chosen DBMS
2. Buy a system created for another school and modify it to fit this school's specific requirements
3. Join a group of other schools, establish common requirements, and contract a software house to develop a single system for all of the schools

Identify two risks in each of these strategies and suggest techniques for risk resolution or reduction which would help in deciding which approach to adopt.

Reference no: EM1326865

Questions Cloud

Explaining the law of hire-purchase : An antique collector, entered a contract for purchase of an antique watch, which was described in good faith, by Farid, the seller, as more than 100 years of age.
Discuss the effectiveness of these security features : Secure Web sites often include 'enhanced security questions' or 'security images' in an attempt to assure that only authorized users could access the sites. Research and discuss effectiveness of these security features.
Counter-argument to training leaders : A third possibility is that, even if certain theories could actually guide individuals in leadership situations and even if individuals could alter their style. What is your reaction to these arguments?
Students explore the reasons behind regulating banks : In the particular assignment due this week, students explore the reasons behind regulating banks also how that regulation relates.
Develop an application with the chosen dbms : A school intends to procure the integrated student management application holding all details of registered students including personal information, courses taken, and examination grades.
Discussing law of hire-purchase : Karim bought a second hand Toyota Hilux from Jamin Baik Sdn Bhd. On 15 January 2012, he signed a hire-purchase agreement for the car with OUR Bank.
Program that stores and converts a number : Write down a program that stores and converts a number entered in Roman numerals to an integer value. Your program should consist of a class named Roman.
Supply assistance to nation experiencing economic : The International Monetary Fund IMF supply assistance to nation experiencing economic woes.
Debate the moral responsibility of one agent : Debate the moral responsibility of one agent (Computer Programmer) associated with the two Therac-25 overdoses which occurred in Tyler, Texas.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is proficient by page buffering

What is proficient by page buffering

  What is the throughput

Measurements of the slotted ALOHA channel with an infinite number of users show that 10 percent of the slots are idle.

  Implementing the stack using dynamically allocated array

Write down the C++ class which implements the stack utilizing the dynamically allocated array. The initial size of the particular stack must be evaluated when it is generated.

  What benefits the network provide

Explain what kind of network you are on at work or at home. If you do not have access to a network, ask a friend or family member to explain the type of network they have access to.

  What is total capacity of a track

What is total capacity of a track

  Generate a work breakdown structure code

Generate a Work Breakdown Structure Code

  What types on a lan and the type of software licensing

Discuss role of each of the following server types on a LAN and the type of software licensing with which the software should be purchased.

  What mean to take a systems view of a project

What does it mean to take a systems view of a project? How does taking the systems view of a project apply to project management.

  Estimating the performance of processor

Without any hardware support, context switch time is not zero. This states that the actual performance will not be as good as the ideal above.

  Researching intrusion detection systems

Utilize the Internet in order to research the intrusion detection systems. Explain the network which could benefit from your solution.

  Program showing duplicate values in an array

Write down a program in C in order to show the duplicate values in an array, Documentation and Naming Style Sheet should include: Description of what program does, Summary of the problem's specifications and assumptions.

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd