Identify a database table in a specific business system

Assignment Help Management Information Sys
Reference no: EM131863226

Part 1:

Please respond to the following in not more than 250 words:

Identify a database table in a specific business system, and one user (not administrator) role that might need access to that table. Do not repeat an example from the textbook or one that has been posted by another student.

Which of the create, read, update, and delete (CRUD) rights would you grant to that role, and which would you withhold? Why?

Part 2:

In a separate post, follow up on one of your fellow students in substantive posts of up to 200 words that further the discussion. For example, you may support or politely challenge a post with your own insights or experience, make a suggestion, or ask probing follow-up questions.

Support your positions with explanations and/or sources, as appropriate, but do not quote. (choose one)

a. A simple database program has tables that are separate entries you can make to the program. Databases have become very useful way to have computer-based systems to take over from paper-based system. The ability to assign privileges to individual tables allows you to setup security to the systems information.

The searchability of this information has transformed the way we store and recall information. We use a web-based customer database at work to assign ticket numbers, serial numbers of equipment and problem descriptions. All notes about repairs are added along with parts and labor. All workers have create, read, update privileges, only managers can delete charges or modify prices.

They have set this up that way to keep techs from modifying prices and making unauthorized changes to work orders. Say a worker's friend comes in for service and they want to give their friend a break by cutting prices and pocketing the cash. Other examples would be just keeping us out of trouble I like not having these privileges that way I am not responsible for these situations.

b. The database table from a specific business system would be from a used car department in a dealership. The table would contain information on cars that where traded in and the money recieved from that traded in car. Also the table would contain numbers on market value of the car and wholesale value from the car.

The user that would need access to that table would be the used car manager. He is the one that needs the create, read and update rights. The only right he should not have is the delete rights, that should be higher in the food chain.

c. A clothing store would need a database that records inventory, sales, and returns. The store managers would need access to the database to view sales and make adjustments as needed. I would grant the store manager the read and update roles, and I would grant other store personnel read permissions.

Reference no: EM131863226

Questions Cloud

Calculate the yield using geometric average : Using the expectations theory, what is the yield on a 1-year bond 1 year from now? Calculate the yield using a geometric average.
Illustrate the indifference curve associated with a utility : a) Illustrate the indifference curve associated with a utility of 400 and the indifference curve associated with a utility of 1000.
What is the yield today for two-year treasury securities : what is the yield today for 2-year Treasury securities? Calculate the yield using a geometric average
Determine what quantity of labor to demand : Explain how your chosen organization determines what quantity of labor to demand and what events could shift the demand and supply of that labor.
Identify a database table in a specific business system : Identify a database table in a specific business system, and one user (not administrator) role that might need access to that table.
Kind of documentation desired by the customer : The vendor is asking questions about this deliverable and wants to know the kind of documentation desired by the customer.
How can business intelligence systems be used with aviation : How can business intelligence and database management systems be used with aviation security?
What is value of your retirement plan : Assume that you contribute $390 per month to a retirement plan for 15 years. what is the value of your retirement plan after the 40 years?
List here the possible solutions to the major problem : List here the possible solutions to the major problem. Let your imagination come up with alternative ways to solve the problem.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the steps to locate and correct the error

You just received the EOB for Violet Sims, a patient in your medical office. What information should be checked before posting payment and why? If an error has been identified on Violet's EOB, what are the steps to locate and correct the error

  Discuss the effective application of standard human

discuss the effective application of standard human resource practices in small to mid-sized manufacturing enterprises

  Evaluate the level of impact of it on information management

Evaluate the level of impact of IT / enterprise architecture on information management (e.g., the flow of information throughout the company / organization, etc.) within a company or industry of your choice.

  Discuss the role of consistency in key-value modeling

Database normalization is a very important process in designing and organizing tables (relations) and their columns in a relational database.

  Explain the importance of information systems management

Define the components (departments) of an IS functional area. Conduct brief research on the departments within an IS functional area. Explain the importance of information systems management

  Read the article and share your views

Share your thoughts on what you know now that you did not know prior to reading the article.Also, do some search on your own and post link to 2 Data Scientist job advertisements - before you make a posting, make sure to read others postings. Also,..

  Explain how health care organizations use secondary data

Write a paper comparing and contrasting the collection of secondary data and their uses versus the analysis of current health care records and internal data such as incident reports and patient surveys.

  What is meant by the internal processes of a team

Have you experienced social loafing or free riding in a team setting? What could have been done or can be done to avoid these effects?

  Sdlc approach versus prototypingbriefly describe the steps

sdlc approach versus prototypingbriefly describe the steps of a pure prototyping methodology as an alternative to an

  Show how inheritance relation will be reflected in java code

One of the topics covered this week is "Inheritance". The chapter shows the Person/Employee example, what are some other examples that could use Inheritance? Read section 12.3-12.4 and come up with your own example of inheritance. Do not copy the ..

  Develop goals for the information technology strategic plan

Develop at least five major goals for the information technology strategic plan. Speculate on three positive organizational impacts of implementing the strategic plan.

  Describe ways that fox lake can make it easy

Describe ways that Fox Lake can make it easy for wedding parties to contribute their social capital to Fox Lake via Facebook and via Twitter.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd