What are the different kinds of database end users, Database Management System

Assignment Help:

What are the different kinds of database end users? Discuss the major activities of each?

End-Users - End-users are the people whose jobs need access to the database for querying, updating, and generating reports; the database first and foremost exists for their use. The different types of end-users are:

Casual end-users - occasionally access the database, required different information each time

Naive or Parametric end-users - includes tellers, clerks, etc., make up a sizable portion of database end-users, major job function revolves around constantly querying and updating the database

Sophisticated end-users - involves engineers, scientists, business analyst, etc., use for their complex requirements

Stand-alone users - manage personal databases by using ready-made program packages, gives easy-to-use menu-based or graphics-based interfaces


Related Discussions:- What are the different kinds of database end users

For known, What are the function of DBA?

What are the function of DBA?

What are called jukebox systems, What are called jukebox systems? Jukeb...

What are called jukebox systems? Jukebox systems have a few drives and numerous disks that can be loaded into single of the drives automatically.

Deadlock and its prevention, Deadlock And Its Prevention: As seen earlier,...

Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th

Write query to select student from math department, Consider the table stud...

Consider the table student and list names of students in the departments other than maths and computer. SELECT std_name FRM student WHERE dept_name NOT IN (‘Maths','Computer);

What is a built-in, What is a Built-in A notation of identity is built-...

What is a Built-in A notation of identity is built-into the data model or programming language and no user-supplied identifier is needed. This form of identity is used in objec

Primary interface between a visual basic application, Question (a) Visu...

Question (a) Visual Basic is governed by an event processor. Explain the meaning of this phrase. (b) Differentiate between an general procedure and event procedure. (c)

Define the two phase locking protocol, Define the Two Phase Locking Protoco...

Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u

Purchase orber , Run the following queries. For each query show 1) What yo...

Run the following queries. For each query show 1) What you expect the output to be based upon the data 2) the SQL code and 3) the output running the query in Oracle. 1. Show all c

Give an example of multiple inheritance, Give an example of multiple inheri...

Give an example of multiple inheritance.  One example of multiple inheritance is a committee for students affair which include faculty and administrative staff member.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd