Focus on migration issues

Assignment Help Basic Computer Science
Reference no: EM131518392

Chris is the owner of an online retail start-up business. His company creates and sells specialized t-shirts, water bottles, and bumper stickers. He started his business out of his garage, and one year later he employs more than 200 people. They fill hundreds of online orders each day that are delivered to thousands of people across the country. Initially, Chris's business used Microsoft Excel to take and track orders. Chris is very reluctant to change systems, but as hie business grows, he needs a more powerful database tool. Chris wants your help to determine if his business should stay with Excel or switch to Access.

In your discussion post, address the following:

What is your recommendation to Chris?

How can the business's needs be addressed by the system you recommend? (Focus on migration issues, remote user accounts, installation and maintenance costs, updates, and employee training.)

What are the security issues that will need to be addressed, and how would you address them? (Focus on user access levels, physical access to the server infrastructure, and network limitations based on port and network.)

Reference no: EM131518392

Questions Cloud

Describe the current rate of obesity in the united states : Describe the current rate of obesity in the United States and how it is expected to change in the next 10 to 20 years
Which of the concepts does it exemplify : Why is it compelling? Which of the concepts does it exemplify? How have these concepts been challenged by the advent of immediacy in news release?
Create a user-friendly application : You have been asked by your manager to create a user-friendly application that will present a survey to your customers.
The extent of researcher interference : How should a researcher proceed, given this scenario? How might the results be different with different approaches?
Focus on migration issues : How can the business's needs be addressed by the system you recommend?
What would be your recommendation for attempting to correct : What would be your recommendation for attempting to correct (over a period of time) the damage done in the business office
What opposing viewpoint or viewpoints does writer include : What opposing viewpoint or viewpoints does the writer include? Evaluate the effectiveness of the writer's reasons in support of his or her assertions.
What is the average check per meal period : Tariq has invested $180,000 in a new Moroccan and Mediterranean family-style restaurant, of which $160,000 was immediately used to purchase equipment.
The objectives of creating information security policies : Describe the overall objectives of creating information security policy for this institution.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What kinds of errors are reported by a compiler

What does a compiler do? What kinds of errors are reported by a compiler?

  Hexadecimal wep passwords

Why is it better to choose hexadecimal WEP passwords rather than ASCII WEP passwords?

  Client server protocol implementation project

The main goal of this Client Server Protocol Project is to implement the Client Server Protocol Implementation. The dream global communication is solved in a great deal by the introduction of Internet. This made the necessity of networking in comm..

  What can you do to overcome these challenges

In your opinion, what are the three biggest challenges in planning and designing a solution for a programming problem? What can you do to overcome these challenges? How would you apply these techniques to the programs in this class?

  Determine the flow work of the helium in the supply

Now the valve is opened, and helium is allowed to flow into the tank until the pressure reaches 200 kPa, at which point the valve is closed. Determine the flow work of the helium in the supply line and the final temperature of the helium in the ta..

  Scenario summary

Scenario Summary

  What is a security policy

1) What is a security policy? what are the typical elements of a policy? 2) what are security controls and how do they relate to security architecture. Give a specific example.

  Purpose of constructing a brand bull eye

What is the purpose of constructing a brand bull's eye?

  Find out what other features dns mx records provide

MX records are provided to support email; would an analogous WEB record be of use in supporting HTTP?

  Research details of ad of current web site or magazine

Pick a current web site or magazine ad for a complete, working computer system, including computer, monitor, keyboard, and software, together with extra devices such as a mouse or printer

  Summarize the responses to the questions

Write a 350- to 700-word memo, individually, based on your Week Five Learning Team Collaborative discussion, with your recommendations to the IT Steering Committee. Include the following content in your paper:

  Print the area to three decimal places

application that reads the lengths of the sides of a triangle

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd