Saturday, January 25, 2020

Database Management System In An Organization

Database Management System In An Organization A DBMS Database Management System is a commercial software program used to control, manipulate and maintain the Database by enabling users to access, store, organize, modify, retrieve, secure and provide integrity of data in a database. A DBMS accepts request from users or applications and instructs the operating system to transfer the appropriate data as shown in the diagram below. Figure 1: database management (Source: http://broncu.blogspot.com/2010/04/dbms-mysql.html) Wikipedia (2011) defines Database Management System as a set of computer programs that controls the creation, maintenance, and the use of a database. It allows organizations to place control of database development in the hands of database administrators (DBAs) and other specialists. A DBMS is a system software package that helps the use of integrated collection of data records and files known as databases. It allows different user application programs to easily access the same database. DBMSs may use any of a variety of database models, such as the network model or relational model. In large systems, a DBMS allows users and other software to store and retrieve data in a structured way. Instead of having to write computer programs to extract information, user can ask simple questions in a query language. Thus, many DBMS packages provide Fourth-generation programming language (4GLs) and other application development features. It helps to specify the logical organization for a database and access and use the information within a database. It provides facilities for controlling data access, enforcing data integrity, managing concurrency, and restoring the database from backups. A DBMS also provides the ability to logically present database information to users. Examples: Microsoft Access, My SQL, Microsoft SQL Server, Oracle and FileMaker Pro are all examples of database management systems. (Wikipedia, 2011). Microsoft Access: Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft jet database Engine with a graphical user interface and software-development tools. It is a member of the Microsoft Office suite of applications, included in the Professional and higher editions or sold separately. In mid-May 2010, the current version Microsoft Access 2010 was released by Microsoft in Office 2010; Microsoft Office Access 2007 was the prior version. My SQL: MySQL is a relational database management system that runs as a server providing multi-user access to a number of databases. It is named after developer Michael Widenius daughter, my. The SQL phrase stands for Structured Query Language. Microsoft SQL Server: Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary query languages are T-SQL and ANSI S SQL. Oracle: The Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is an object-relational database management system (ORDBMS), produced and marketed by Oracle Corporation. FileMaker Pro: FileMaker Pro is a cross-platform relational database application from FileMaker Inc., formerly Claris, a subsidiary of Apple Inc. It integrates a database engine with a GUI-based interface, allowing users to modify the database by dragging new elements into layouts, screens, or forms. Advantages Singh (2009) illustrates advantages and disadvantages of DBMS. A true DBMS offers several advantages over file processing. The principal advantages of a DBMS are the followings: à ¢Ã¢â€š ¬Ã‚ ¢ Flexibility: Because programs and data are independent, programs do not have to be modified when types of unrelated data are added to or deleted from the database, or when physical storage changes. à ¢Ã¢â€š ¬Ã‚ ¢ Fast response to information requests: Because data are integrated into a single database, complex requests can be handled much more rapidly then if the data were located in separate, non-integrated files. In many businesses, faster response means better customer service. à ¢Ã¢â€š ¬Ã‚ ¢ Multiple access: Database software allows data to be accessed in a variety of ways (such as through various key fields) and often, by using several programming languages (both 3GL and nonprocedural 4GL programs). à ¢Ã¢â€š ¬Ã‚ ¢ Lower user training costs: Users often find it easier to learn such systems and training costs may be reduced. Also, the total time taken to process requests may be shorter, which would increase user productivity. à ¢Ã¢â€š ¬Ã‚ ¢ Less storage: Theoretically, all occurrences of data items need be stored only once, thereby eliminating the storage of redundant data. System developers and database designers often use data normalization to minimize data redundancy. Warehouse of information, where large data can be stored. Systematic storage meaning data can be stored in the form of tables. Change of schema meaning it is not platform dependent tables can be edited to add new ones without hampering the applications. No language dependence meaning use of various languages on various platforms. Table joins meaning data can be in two or more tables and can be put into one table this enables easy retrieval of data. Data security meaning DBMS secures all your data. The data independence and efficient access of data Easy in data administration or data management. Provides concurrent access, recovers the data from the crashes. Disadvantages A database system generally provides on-line access to the database for many users. In contrast, a conventional system is often designed to meet a specific need and therefore generally provides access to only a small number of users. Because of the larger number of users accessing the data when a database is used, the enterprise may involve additional risks as compared to a conventional data processing system in the following areas. Confidentiality, privacy and security. Data quality. Data integrity. Enterprise vulnerability may be higher. The cost of using DBMS. Confidentiality, Privacy and Security When information is centralised and is made available to users from remote locations, the possibilities of abuse are often more than in a conventional data processing system. To reduce the chances of unauthorised users accessing sensitive information, it is necessary to take technical, administrative and, possibly, legal measures. Most databases store valuable information that must be protected against deliberate trespass and destruction. Data Quality Since the database is accessible to users remotely, adequate controls are needed to control users updating data and to control data quality. With increased number of users accessing data directly, there are enormous opportunities for users to damage the data. Unless there are suitable controls, the data quality may be compromised. Data Integrity Since a large number of users could be using a database concurrently, technical safeguards are necessary to ensure that the data remain correct during operation. The main threat to data integrity comes from several different users attempting to update the same data at the same time. The database therefore needs to be protected against inadvertent changes by the users. Enterprise Vulnerability Centralising all data of an enterprise in one database may mean that the database becomes an indispensible resource. The survival of the enterprise may depend on reliable information being available from its database. The enterprise therefore becomes vulnerable to the destruction of the database or to unauthorised modification of the database. The Cost of using a DBMS Conventional data processing systems are typically designed to run a number of well-defined, pre-planned processes. Such systems are often tuned to run efficiently for the processes that they were designed for. Although the conventional systems are usually fairly inflexible in that new applications may be difficult to implement and/or expensive to run, they are usually very efficient for the applications they are designed for. The database approach on the other hand provides a flexible alternative where new applications can be developed relatively inexpensively. The flexible approach is not without its costs and one of these costs is the additional cost of running applications that the conventional system was designed for. Using standardised software is almost always less machine efficient than specialised software. Cost of hardware and software meaning having to upgrade the hardware used for file based system it is very costly. Cost of data conversion meaning its costly to convert data of data files into database and have to hire database and system designers. Cost of staff training meaning organization has to be aid a lot of amount for the training of staff to run dms. Database damage meaning all data stored into a single file if database is damaged due to electric failure or database is corrupted on a storage media meaning all valuable data may be lost forever. It also takes a lot of time and effort to get DBMS started. Benefits of a Database Management System in an organization As discuss by the Ezinearticles (2011), organizations often times find themselves in a dilemma on how they can effectively serve the needs of their members. At the same time, they also enter a situation wherein there is difficulty in handling data, given the sheer volume of information. More often than not, the results of these instances are not anything but desirable; confusion, chaos, mismanagement, lost confidence by members, etc. To solve these problems, organizations turn to information technology (IT) experts for answers. With many years of experience in coming up with solutions for businesses and other entities, IT professionals have what it takes to come up with an effective data management and accreditation system that will be used by organizations. There must also be enhanced accessibility to the said system, which means that members from other locations can still gain entry into the system, regardless of elements such as time and geography. Investing on the services of IT consultants is, however, not like buying something from a store. It entails huge sums of money to come up with a good data management and accreditation system for an organization, aside from engaging the professional services of IT experts. Fortunately, IT experts can help minimize the cost through the creation of a database system based on existing resources being held by the organization. Investing on the services of IT experts and having a good data and accreditation management system may seem to be too costly, but the long-term benefits are worthy to be seen. By having a good database system, it will be much easier for organizations to deal with their members because of enhanced access to information. The placement of additional pieces of information can be done better if there is a good data management system. Having a good data and accreditation management system empowers members of an organization. This is possible because they have the ability to gain the necessary information about things that matter to them as members. They conduction of business with the organizations intervention is made faster and more efficient if a good data management system is in place. There is no reason for organizations to hesitate when it comes to investing on a good data and accreditation management system. The long-term benefits of having one are far greater than the costs, and will be very helpful to the organization and their members in the long run. Improved strategic use of corporate data. Reduced complexity of the organizations information systems environment. Reduced data redundancy and inconsistency. Enhanced data integrity. Application-data independence. Improved security. Reduced application development and maintenance costs. Improved flexibility of information systems. Increased access and availability of data and information. (Blurtit, 2011). Prospects in DBMS and Career Opportunities The work of a database administrator (DBA) varies according to the nature of the employing organisation and the level of responsibility associated with the post. The work may be pure maintenance or it may also involve specialising in database development. Prospects, the UKs official career website (2011) states that jobs available in this field are: Senior Database Architect Database Architect design and builds database structure and objects that best support operational and analytics application. Tests and debug physical database objects for performance and troubleshooting. * Design and implement optimal star and snowflake schema in the database * Communicate and collaborate with team members and management on the designed database structures and schemas * Write and present eloquently with the appropriate audience perspective in mind * Support troubleshooting of production issues of existing application as warranted * Participate in collaborative discussions with team members to monitor progress against enhancement queue and bug resolution. * Stay proactive in identifying potential risks/issues due to the overall application design and make recommendations. Database Administrator This position requires a Top Secret Security Clearance. This position will support a US Air Force Contract. The successful candidate will be responsible for planning, coordinating and administering computerized databases, including base definition, structure, documentation, long and short range requirements, operational guidelines, protection and logical-physical database design. Formulates and monitors policies, procedures and standards relating to database management. Identifies, evaluates and recommends relevant COTS software tools. Collaborate with software engineers, security administration, computer operations, network management and system administration to ensure quality and integrity of databases, application software and data. Responsible for performance monitoring, database. Database Architect Specialist Database Architect design and builds database structure and objects that best support operational and analytics application. Tests and debug physical database objects for performance and troubleshooting. * Design and implement optimal star and snowflake schema in the database * Communicate and collaborate with team members and management on the designed database structures and schemas * Write and present eloquently with the appropriate audience perspective in mind * Support troubleshooting of production issues of existing application as warranted * Participate in collaborative discussions with team members to monitor progress against enhancement queue and bug resolution. * Stay proactive in identifying potential risks/issues due to the overall application design and make recommendations. Database Administration Consultant Evaluates new database technologies and tools, sets database system and programming standards, applies database technology to business problems and manages the development and production database environments with emphasis on security, availability and performance. Provides database services in compliance with all audit and regulatory requirements. The ideal candidate must be experienced in the management of Oracle E-Business 11.5.10.2 including installation, upgrade, patching, cloning, backup and recovery, monitoring, tuning, security, and definition of procedures for custom development. The ideal candidate must be experienced in the implementation and management of Oracle E-Business 11.5.10.2 as configured for the Oracle Massive Availability Architecture. Senior Database Engineer Responsible for requirements analysis, software development and installation, integration, evaluation, enhancement, maintenance, testing, and problem diagnosis and resolution. Qualifications: Bachelors degree with ten (10) years experience as a Database Engineer in developing relational database software and experience with one or more relational database products. Preferred Additional Skills: Possess organizational and management skills, along with the ability to respond to crises objectively. Understanding of the current database management system releases. Conclusion The document that we have put together is a group assignment that was done by four individuals. Some of the problems that we faced as a group are that, we couldnt meet due to our clashing schedules; others are busy with other obligations. We would like to say that we tried to produce the best group work that we could, hopefully learnt from this experience to better ourselves for our future endeavors.

Friday, January 17, 2020

Software Development Life Cycle

SOFTWARE DEVELOPMENT LIFE CYCLE SUMMARY SOFTWARE DEVELOPMENT LIFE CYCLE is basically a framework which describes the activities performed at each stage of a software development Project. These activities involve stages like the requirements, design, implementation, testing, installation and maintenance. In the information technology industry, SDLC plays a big role. No software development process will ever be completed efficiently and also meeting the budget client requirements without SDLC. This is because SDLC involves a structural framework which describes the phases involved in information system development. SDLC in management is an important factor which needs to be taken into consideration if you want a software development project to be resounding success. The phases of SDLC can vary somewhat but generally include the following: Conceptualization Requirements and cost/benefits analysis Detailed specification of the software requirements Software design Programming Testing User and technical training; and Maintenance The following are some basic popular models that are adopted by many software development firms System Development Life Cycle (SDLC) Model Prototyping Model Rapid Application Development Model Component Assembly Model As part of my research project I would be studying the core principles of SDLC. I would also perform research on available SDLC models in the information technology industry. System Development Life Cycle (SDLC) Model This is also known as Classic Life Cycle Model (or) Linear Sequential Model (or) Waterfall Method. This model has the following. Most software teams still use a waterfall process for development projects. Taking an extreme waterfall approach means that you complete a number of phases in a strictly ordered sequence: requirements analysis, design, implementation/integration, and then testingg activities. 1. System/Information Engineering and Modeling As software is always of a large system (or business), work begins by establishing the requirements for all system elements and then allocating some subset of these requirements to software. This system view is essential when the software must interface with other elements such as hardware, people and other resources. System is the basic and very critical requirement for the existence of software in any entity. So if the system is not in place, the system should be engineered and put in place. In some cases, to extract the maximum output, the system should be re-engineered and spruced up. Once the ideal system is engineered or tuned, the development team studies the software requirement for the system. 2. Software Requirement Analysis This process is also known as feasibility study. In this phase, the development team visits the customer and studies their system. They investigate the need for possible software automation in the given system. By the end of the feasibility study, the team furnishes a document that holds the different specific recommendations for the candidate system. It also includes the personnel assignments, costs, project schedule, target dates etc†¦. The requirement gathering process is intensified and focussed specially on software. To understand the nature of the program(s) to be built, the system engineer or â€Å"Analyst† must understand the information domain for the software, as well as required function, behavior, performance and interfacing. The essential purpose of this phase is to find the need and to define the problem that needs to be solved . 3. System Analysis and Design In this phase, the software development process, the software's overall structure and its nuances are defined. In terms of the client/server technology, the number of tiers needed for the package architecture, the database design, the data structure design etc†¦ are all defined in this phase. A software development model is thus created. Analysis and Design are very crucial in the whole development cycle. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. Much care is taken during this phase. The logical system of the product is developed in this phase. 4. Code Generation The design must be translated into a machine-readable form. The code generation step performs this task. If the design is performed in a detailed manner, code generation can be accomplished without much complication. Programming tools like compilers, interpreters, debuggers etc†¦ are used to generate the code. Different high level programming languages like C, C++, Pascal, Java are used for coding. With respect to the type of application, the right programming language is chosen. 5. Testing Agile software development refers to a group of software development methodologies based on iterative development, where requirements and solutions evolve through collaboration between self-organizing cross-functional teams. Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices intended to allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. Agile methods have much in common with the â€Å"Rapid Application Development† techniqu

Thursday, January 9, 2020

The American Civil War The Battle of Gettysburg - 985 Words

Gettysburg was fought during the Civil War between the Union Army of the Potomac led by General Meade, and the Confederate Army commanded by General R.E. Lee. The battle only was waged over the course of three days, but it would prove to be the most costly of the entire Civil War. In this paper, we will show how the Confederacy failed to identify certain principles of war, which lead them to incorrectly conduct a center of gravity and critical vulnerability analysis on the Union. Because of this failure, the Confederacy opened the door for the Union to score a decisive victory. Examining the battle form a Principles of War standpoint, we can examine how a few principles became decisive factors in the battle, or how their lack of use prevented success in some cases. An important principle was Mass, in so far as the Confederacy was better able to employ this principle than the Army of the Potomac. On the first day of fighting, the confederacy was successfully able to employ their units against Union defenses, forcing the Union forces to retreat (Vossler 53). An interesting turn of events would soon favor the Federal Army as General J.E.B. Stuart and his cavalry were north and east of Gettysburg causing a lot of fear in the North but consequently were not performing adequate reconnaissance, the result was that General Lee did not know where General Meade and the Army of the Potomac were or what their strength was (Freeman, 147). When Confederate General Henry Heth moved intoShow MoreRelatedBattle Of Gettysburg : Gettysburg Of The American Civil War1465 Words   |  6 PagesShaJuan Ervin Dr.Seamen MIS 303-01 2/24/16 Battle of Gettysburg Day 3 The Battle of Gettysburg is widely known as the largest battle of the American Civil War. This crucial battle occurred over three days, July 1st to July 3, 1863 surrounding the town of Gettysburg. In this battle, General Robert E. Lee tactfully awaited the forces of General Meade’s Union. On July 1st the Confederates were exploited by the Union resulting in a loss. The following day, the Confederates gained ground by conductingRead MoreThe Battle Of Gettysburg And American Civil War924 Words   |  4 PagesThe Battle of Gettysburg was fought over the first three days in July 1863, in and around the town of Gettysburg, Pennsylvania, by Union and Confederate forces during the American Civil War. Confederate General Robert E. Lee led the Army of Northern Virginia, while Union Major General George Gordon Meade commanded the Army of the Potomac. The Battle of Gettysburg involved the largest number of casualties of the entire war and is often described as the war s turning point. With his army in highRead MoreThe Battle Of Gettysburg And The American Civil War1993 Words   |  8 Pagesthe Battle of Gettysburg was the turning point in the American Civil War. Some even go as far to as to call it the â€Å"high water mark† of the Confederate States. What is known is that it represented the last time a coherent Confederate Army threatened northern soil. In fact, from Gettysburg forward, the Confederation of Southern States would be fighting a defensive/fighting retreat. Gettysburg was one of the bloodiest battles of the war, but there were many bloody battles during the American CivilRead MoreThe Battle Of Gettysburg Was The Turning Point Of The American Civil War837 Words   |  4 PagesThe Battle of Gettysburg was the turning point of the American Civil war. General Robert E. Lee was the commanding officer of the Confederate army. During the battle of Gettysburg Lee’s military strategy was to fight offensive. Lee’s goal during the ba ttle was to seize the high ground and out last the union army. The Union army had outnumbered the Confederate soldiers. General Lee’s first hand man was General James Longstreet. Longstreet believes the new technology in warfare would make attackingRead MoreEssay about The American Civil War: America’s Bloodiest War716 Words   |  3 PagesThe American Civil War, known as the War Between the States’ by some, was America’s bloodiest war. The Civil War consisted of over 10,000 battles between The Union Army of the North and the South’s Confederate Army, which lasted almost 4 years. The War was fought in 23 states and of the more than 10,000 battles only about 50 were major battles. (Weider, The Civil War, 1) In this paper the reader will learn about important dates of the war also about 4 of the bloodiest battles in the war; the BattleRead MoreThe Battle Of Gettysburg And A Website Article From The New World Encyclopedia1320 Words   |  6 PagesTh e battle of Gettysburg is seen today as the turning point of the war, and after the analysis of these historical documents its clear why the bloodshed at Gettysburg was as significant as it was being able to turn the tides of the war. Two sources that are going to be used in this are a website article from History.com: â€Å"Battle of Gettysburg† and a website article from the NeW World Encyclopedia: â€Å"Battle of gettysburg†. These sources will be analyzed by their origin, purpose, content, value andRead MoreThe Battle Of Gettysburg And Civil War1375 Words   |  6 PagesThe Battle of Gettysburg occurred July 1-3, 1863 in and around Gettysburg, Pennsylvania and was one of the most significant battles of the American Civil War. Union forces of the North, commanded by Major General George G. Meade met and fought the Confederate forces of the South, commanded by General Robert E. Lee. Many historians believe the battle was a large turning point in the Civil War in f avor of the Union (Woodworth, 2008). However, this is disputable. The battle was also significantRead MoreThe Battle Of Gettysburg : Why Was It A Turning Point?1361 Words   |  6 PagesThe Battle of Gettysburg: Why Was It a Turning Point? â€Å"Death created the modern American union, not just by ensuring national survival, but by shaping enduring national structures and commitments. The work of death was Civil War America s most fundamental and most demanding undertaking†Ã¢â‚¬â€ Drew Gilpin Faust. Death in the Civil War was indeed a principle in creating the America we know and love today. This was the bloodiest war in United States military history. Within the war was the Battle of GettysburgRead MoreSlavery And The Civil War1706 Words   |  7 PagesAbraham Lincoln once said, â€Å"A house divided against itself cannot stand.† In the 1800s, the American nation was slowly becoming a house divided against itself. The United States were no longer united, mainly over the issue of slavery. In fact, many historians believe that, â€Å"From the nation’s founding, the issue of slavery threatened to tear the United States apart.† (â€Å"The Civil War† 1). The issue of slavery was always kept at bay through the utilization of various compromises; however a permanentRead MoreThe Battle Of Gettysburg And The Civil War Essay1448 Words   |  6 PagesOn July 1, 1863, the bloodiest, most gruesome war in American History began. The Battle of Gettysburg was fought in the small town of Gettysburg, Pennsylvania. The Union Army under the command of General George G. Meade faced the Confederate Army led by General Robert E. Lee. They clashed for a long, tragic, three days, but at a costly expense of human life. The American Civil War was one of the most significant battles that the United States has ever been engaged in. On the lines, there were brothers

Wednesday, January 1, 2020

Personal Statement On Emotional Intelligence - 1100 Words

1.0 Introduction Australian Business Leaders have identified skills that are most important in a business landscape; these include Continuous Professional Development and Communication Skills. In this portfolio I will reflect upon my skill development and learning’s in BSB124 – Working In Business. Through this reflection I will discuss my skills built through the learning of Emotional Intelligence throughout the unit. I will be discussing Goleman’s Emotional Intelligence theory that we have learnt as well as other practical ways of testing Emotional Intelligence. I will also discuss an area of possible improvement of my Emotional Intelligence linking to my future career prospects through my own personal results in the Schuttes Emotional†¦show more content†¦2.1 Emotional Intelligence: Schuttes Test Peter Salovey and John D. Mayerin invented the concept of Emotional Intelligence in 1990 and they defined it as form of social intelligence that involves the ability to monitor one’s own and others’ feelings and emotions, to discriminate among them, and to use this information to guide one’s thinking and action. (Golis, 2010) A high Emotional Intelligence, as stated by Jesse Jones, contributes to effective leadership by focusing on five essential elements of leader effectiveness: development of collective goals and objectives; instilling in others an appreciation of the importance of work activities; generating and maintaining enthusiasm, confidence, and optimism (Jones, 1998). A common Emotional Intelligence Test is the Schuttes Emotional Intelligence Scale (SEIS)which was created and developed by a Teacher at the University of New England, Nicola Schutte. The SEIS consists of 33 items responded to on a 5-point scale. The main fault of the test is that it fails to address all areas of Emotional Intelligence. Even though this fault it is still a highly used method of determining a persons Emotional Intelligence. As suggested in Salovey and Mayer’s theory of emotional intelligence (1990), the instrument has three categories: the appraisal and expression of emotion assessed by 13 items; the regulation of emotion assessed by 10 items; and the utilisation of emotion assessed by 10 items.