Database systems have many opposite efforts, Database Management System

Assignment Help:

Database systems have many opposite efforts?


Related Discussions:- Database systems have many opposite efforts

Explain the attribute inheritance, Explain the Attribute inheritance An...

Explain the Attribute inheritance Ans: Throughout the rendering of the objects in a view, attribute sets of objects higher in the view hierarchy are inherited via objects below

Consistency, what do you mean by consistency in rdbms?

what do you mean by consistency in rdbms?

MANAGEMWNT OF PRINCILES AND TECHNIQUES., HOW TO SOLVE THE LP Problems by si...

HOW TO SOLVE THE LP Problems by simplex method?z=x1+-3x2+2x3

Although how will the system recover, Although how will the system recover ...

Although how will the system recover The selection of REDO or UNDO for a transaction for the recovery is completed on the basis of the state of the transactions. This state is

Deletion operation - update operations, By using the delete operation some ...

By using the delete operation some consisting records can be deleted from a relation. To delete some definite records from the database a condition is also specified based on which

Describe the advantage of state chart diagram, Describe the advantage of St...

Describe the advantage of State chart Diagram A state chart represents a state machine, emphasizing flow of control from one state to other. A state machine is a behaviour whi

What is data integrity, What is data integrity? Ans: It is the data con...

What is data integrity? Ans: It is the data consisted of in database that is accurate and consistent.  (Data integrity means that the data should be valid as per to the give

Give an expression within sql for queries, Consider the following relations...

Consider the following relations:  S (S#, SNAME, STATUS, CITY)  SP (S#, P#, QTY)  P (P#, PNAME, COLOR, WEIGHT, CITY) Give an expression within SQL for each of queries b

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

12/5/2013 4:48:55 AM

The following are the risk & expenditure of database-


(i) Organizational Conflicts- Pooling data in a very common database could not be politically feasible in some organizations. Certain user groups may possibly not be willing to relinquish control over their data to the extent needed to integrate data. Moreover, risk involved in data sharing, as in that one group may damage another group''s data and potential system problems that might limit a group''s access to its own data could be viewed as more troublesome than beneficial. Such people problems may perhaps prevent a effectual implementation of a database system.


(ii) Development Project Failure- For a range of reasons, project to develop a database system could fail. Sometimes management was not fully convinced of value of database system in first place. A database project to seem to be taking too long may be terminated.


A project large in scope may be approximately impossible to complete in a reasonable time. Again, management and users become dissatisfied and project fails. Throughout course of a project, key personnel might unexpectedly leave a company. If replacement personnel cannot be found, then project might not be successfully completed.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd