Which of three application transactions must be made atomic

Assignment Help Management Information Sys
Reference no: EM131172463

Suppose you are given the James River Jewelry database design as follows:

CUSTOMER ( CustomerID, LastName, FirstName, Phone, Email)
PURCHASE ( InvoiceNumber, Date, PreTaxAmount, CustomerID)
PURCHASE_ITEM ( InvoiceNumber , ItemNumber, RetailPrice)
ITEM ( ItemNumber, Description, Cost, ArtistName)
OWNER ( OwnerID, Name, Phone, Email, AmountOwed)
JEWELRY_ITEM ( ItemNumber, DateReceived, DateSold, NegotiatedSalesPrice, ActualSalesPrice, CommissionPercentage, OwnerID)
where

CustomerID in PURCHASE must exist in CustomerID in CUSTOMER
InvoiceNumber in PURCHASE_ITEM must exist in InvoiceNumber in PURCHASE
ItemNumber in PURCHASE_ITEM must exist in ItemNumber in ITEM
OwnerID in JEWELRY_ITEM must exist in OwnerID in OWNER
ItemNumber in JEWELRY_ITEM must exist in ItemNumber in ITEM

The OWNER and JEWELRY_ITEM tables are used to record data and maintain owner data about jewelry accepted on consignment. JEWELRY_ITEM (which is a subtype of ITEM-n ote the referential integrity constraint) is used to record the negotiated sales price, the commission percentage, and the actual sales price for each item of consigned jewelry.

Assume that office personnel at James River Jewelry use a database application to record consignment data.

• When an item is received on consignment, owner data are stored in OWNER if the owner is new; otherwise existing owner data are used. New ITEM and JEWELRY_ITEM rows are created. In ITEM, ItemNumber and Description are recorded, Cost is set to $0.00, and if there is an artist associated with the piece, ArtistName is entered. For JEWELRY_ITEM, data are stored for all columns except DateSold and ActualSalesPrice. James River Jewelry personnel refer to these actions as an Acceptance Transaction.

• Later, if the jewelry item does not sell, the NegotiatedSalesPrice and CommissionPercentage values may be reduced. This is called a Price Adjustment Transaction.

• Finally, when an item sells, the DateSold and ActualSalesPrice fields for the item are given values, and the AmountOwed value in OWNER is updated by increasing AmountOwed by the owner's percentage of the ActualSalesPrice value. This third transaction is called a Sales

Transaction

Suppose James River Jewelry identifies three groups of users: managers, administrative personnel, and system administrators. Suppose further that managers and administrative personnel can perform Acceptance Transactions and Sales Transactions, but only managers can perform Price Adjustment Transactions.

James River Jewelry has developed the following procedure for backup and recovery. The company backs up the database from the server to a second computer on its network each night. Once a month, it copies the database to a CD and stores it at a manager's house. It keeps paper records of all services provided for an entire year. If it ever loses its database, it plans to restore it from a backup and reprocess all service requests.

1 Which of the three application transactions must be made atomic (e.g., specify transaction boundaries) to prevent possible lost update? Why and why not?

2 Describe processing rights that you think would be appropriate for the identified three groups of company users.

Comment on the company's strategy on DB backup and recovery. Describe any changes you think the company should make to its current backup and recovery scheme.

Reference no: EM131172463

Questions Cloud

Decline of organized labor political clout over recent : Commentators often remark on the relative decline of organized labor's political clout over recent decades. Yet from recent big city mayor's races such as those in Boston and New York to national campaigns to raise the minimum wage, labor unions c..
Give opinion on whether or not you believe killing of laden : Give your opinion on whether or not you believe the killing of Osama Bin Laden has negatively affected Al Qaeda and the Global War on Terrorism (GWOT). Use examples of such effects to support your position.
Strategic decision-making process : Go through the media piece Bird Flu Case Study: Strategic Decision-Making Process and track your choices and the outcomes. Post a summary of your experiences in the case study that addresses the following:
Locate a case where acid rain has adversely affected a lake : Sulfur dioxide and nitrogen dioxide form an acidic compound in the atmosphere.-  Locate a case where acid rain has adversely affected a lake in either Vermont or New Hampshire.
Which of three application transactions must be made atomic : Which of the three application transactions must be made atomic (e.g., specify transaction boundaries) to prevent possible lost update? Why and why not? Describe processing rights that you think would be appropriate for the identified three groups ..
Analyze government role in the protection of the environment : Analyze the government's role in the protection of the environment. Be sure that your analysis includes a look at one of the following: conservation, environmentalism, protection, global warming, and energy concerns.
Discuss financial statement by using triple bottom line : In this assignment need to take one company like apple company we can take example of iphone 6 or 6 plus, market size of that product, revenue of that product, how many people liked that product and use this product and their competitor in the mar..
Research for the environmental problems : Do you feel that lobbyists and special interest groups exert too great of an influence and act as an impediment to finding solutions to, and providing the funding for, research for the environmental problems we face?
Discuss the ways employers lose nlrb elections : Discuss the ways employers lose NLRB elections. Describe how the acronym T.I.P.S. can assist supervisors in remembering what not to do during campaigns.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Advantages of automating the businessa small bank is

advantages of automating the business.a small bank is seeking your expertise to help automate its operations. the bank

  Implications of security breach

Important because of implications of security breach, laws governing protection of certain types of data, Web Based systems security and Internal security.

  This posting addresses computer-aided data analysis

this posting addresses computer-aided data analysis tools.today many data analysis tools are available to provide

  How a standard such as the ois model assists networks

The developers of the OSI model envisioned a detailed specification of interfaces. Instead, it has become a common reference model that is used by developers to standardize interfaces. Give your opinion on what you believe would happen to networks..

  Determine how supply chain management affects the process

Supply Chain Fundamentals - Determine how supply chain management affects the process of the project management.

  How does social media represent a threat to companies

How does social media represent a threat to companies who limit their customer support services to traditional channels - what are the various ways they can use social media to tell others about their experience?

  The trends of customer relationship management

What are the trends of customer relationship management? List the fundamental processes of e-Commerce  Differentiate between B2C and B2B e-Commerce systems in detail. How Web is used in both types of e-Commerce?

  Describe the major functions of the is department

Describe the major functions of the IS department. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced..

  What are the qualities of an enterprise cloud

The paper must be written in APA format and include at least one direct quote with proper citation and reference. What are the qualities of an enterprise cloud

  What is the role of it in maintaining corporate compliance

What is the intent of regulatory compliance, and what is the role of IT in maintaining corporate compliance

  Security and privacy in technology in health care industry

Security and privacy in technology in health care industry - What would you want your health care provider to do in order to secure the privacy of your medical records?

  System and network monitoring solutions

IT Market - I need to know the markets status, the growing in next 5 years. I'm performing a research for the product HealthMonitor that contain all these features.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd