First steps in developing any kind of software

Assignment Help Basic Computer Science
Reference no: EM13934964

One of the first steps in developing any kind of software is identifying who your users are. This then allows you to incorporate elements that are important to them, and grants you insights into how your target audience would use, or attempt to use, your program. In the case of database systems, however, the gamete of users varies dramatically.

Some of the users of a database system could be any of the following: An enduser, a programmer of application software, a database administrator or a designer of database management system. Clearly, each of these users have very different concerns when they access a database, and one of the key skills necessary to both understanding and designing databases is to understand these roles. In this Assignment,

you will identify what types of users are concerned with specific scenarios noted in the Assignment instructions.
To prepare for this Assignment: Review your Weekly Learning Resources with a focus on database characteristics and access
conditions.

Analyse the concerns of the following database system users: enduser, programmer of application software, database administrator, and designer of database management system software. Analyse the characteristics of a database and infer how each user type would utilise them. Reflect on the following questions, and which user would be most concerned with each:

  • How should data be stored on a disk to maximise efficiency?
  • Is there a vacancy on flight 243?
  • Could a relation be stored as a sequential file?
  • How many times should a user be allowed to mistype a password before the conversation is terminated?
  • How can the PROJECT operation (of the relational model) be implemented?

To complete this Assignment:
Submit a 23
paragraph paper in which you address the following:

  • Identify the user (enduser, programmer of application software, database administrator, and designer of
  • database management system software) who would be most concerned with the following scenarios:
  • How data could be most efficiently stored on a disk.
  • If there is a vacancy on Flight 243.
  • How a relation could be stored as a sequential file.
  • How many times a user should be allowed to mistype a password before a conversation is terminated.

Reference no: EM13934964

Questions Cloud

Remove multiple textboxes not just one textbox or maskedtex : The code should also be able to remove multiple textboxes not just one textbox or maskedtextbox.If someone has code that can do this please forward it to me, thanks. The code should also be able to remove multiple textboxes not just one textbox or ma..
Taxicorp is entirely financed with equity : TaxiCorp is entirely financed with equity. Its risk premium is 14%. TaxiCorp calculates that a new project has a return of 16.5%. What other information is necessary to determine whether TaxiCorp should take the project? When should TaxiCorp accept t..
What level of EBIT will EPS be identical for Plans : Destin Corp. is comparing two different capital structures. Plan I would result in 11,000 shares of stock and $80,000 in debt. Plan II would result in 8,375 shares of stock and $150,000 in debt. The interest rate on the debt is 6 percent. Ignoring ta..
Do not allow the user to resize the form. : Remove minimize, maximize, and close buttons from the title bar
First steps in developing any kind of software : One of the first steps in developing any kind of software is identifying who your users are. This then allows you to incorporate elements that are important to them, and grants you insights into how your target audience would use, or attempt to us..
What is the genotype of the mutant : A mutant of E.coli has constitutive expression of beta-galactosidase. A partial diploid formed with this mutant and F' I^+ O^+ Z^+ has normal, inducible synthesis of beta-galactosidase. What is the genotype of the mutant?
Proposal for health information systems driving by ehealth : Proposal for health information systems driving by ehealth
Fundamental quality management tools and techniques : The assessment is designed for students to apply fundamental quality management tools and techniques. The assessment Hi-Sport Manufacturing Co. case and tasks are described in the course textbook on page 352 to 355.
Expected return and risk premium : Irone Industries has a beta of 0.8. If the return on the market is 16% and the return on treasury bills is 5%, what is Irone Industries’ expected return and risk premium?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Information security problem or issue in organisation

Illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation.

  Write a program to produce a double table

Using the ROL instruction to perform multiplication, write a program to produce a double table. This table should be built from a single int32 value provided by the user and print 3 rows beginning with the starting value. Within that row, the pattern..

  Jurisdictions pose in the fight against cybercrime

CIS 330 Explain, in detail, what you believe to be the greatest challenge facing law enforcement agencies investigating exploitation, cyber stalking, and obscenity. Provide a rationale for your response. Identify the specific challenges that overlapp..

  Write a presentation on health information technology

The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST..

  What are the shortcomings and limitations

Assume you have decided to implement DFS so remote sites can access files and folders. What are the requirements for DFS? What are benefits of using DFS? What are the shortcomings and limitations?

  Did have any difficulties in following this coding process

Did you have any difficulties in following this coding process?

  Write a method that accepts a reference to a string object

Write a method that accepts a reference to a String object as an argument and returns true if the argument ends with the substring ".com". Otherwise, the method should return false.

  Operation of the chosen embedded control system

Choose an industrial embedded control system and write a report of a minimum of 3000 words covering the following aspects: Describe the basic elements and operation of the chosen embedded control system.

  Find commercial web site show bleeding edge technology error

Visit the Internet and discover commercial Web sites which show each of the common errors listed below. Give links to those Websites in Microsoft Word document.

  The firstround of the des decryption

Compute the bits number 1, 16, 33, and 48 at the output of the firstround of the DES decryption, assuming that the ciphertext block iscomposed of all ones and the external key is composed of all ones

  Prepare a powerpoint presentation explaining

Prepare a PowerPoint presentation explaining the results and recommendations of your assessment to senior management of the organization.

  What is the rationale for prohibiting nested subprograms

What is the rationale for prohibiting nested subprograms? Is it a good language design decision? What languages allow them?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd