Database systems have many opposite efforts, Database Management System

Assignment Help:

Database systems have many opposite efforts?


Related Discussions:- Database systems have many opposite efforts

Explain the data access protocol, (a) Explain the three types of potentia...

(a) Explain the three types of potential mistake which could occur if concurrency control is not properly enforced in the database system. Support your answer with appropriate ex

What is the meaning of data independence, What is the meaning of Data indep...

What is the meaning of Data independence? Data independence means a programs that are not dependent on the physical attributes of data and a programs that are not dependent on

Describe about use case and external case in dfd, Describe about Use Case a...

Describe about Use Case and external case in DFD The processes are transformed those into the Use Case and external case in DFD has same characteristics which of an actor in O

How to insert data in your table from another table, How to Insert data in ...

How to Insert data in your table from another table? insert into e.g, To insert tuples from employee into N_emp created above, use following statement Insert into N_emp

Assignment, am looking for assignment helper for dbms

am looking for assignment helper for dbms

Develop a fragment of a hypothetical system, The objectives of this assignm...

The objectives of this assignment are:  - to develop skills in the design of database driven applications  - to develop skills in applying SQL to implement the relational and

File organisation in dbms, File Organisation In Dbms Introduction ...

File Organisation In Dbms Introduction Databases are used to store information. Usually, the principal operations we have to perform on database are those relating to:

Define lock, Define lock? Lock is the most common used to execute the r...

Define lock? Lock is the most common used to execute the requirement is to permit a transaction to access a data item only if it is currently holding a lock on that item.

What is a shadow copy scheme, What is a shadow copy scheme? It is simpl...

What is a shadow copy scheme? It is simple, but efficient, scheme known as the shadow copy schemes. It is based on making copies of the database called shadow copies that singl

12/5/2013 4:48:55 AM

The following are the risk & expenditure of database-


(i) Organizational Conflicts- Pooling data in a very common database could not be politically feasible in some organizations. Certain user groups may possibly not be willing to relinquish control over their data to the extent needed to integrate data. Moreover, risk involved in data sharing, as in that one group may damage another group''s data and potential system problems that might limit a group''s access to its own data could be viewed as more troublesome than beneficial. Such people problems may perhaps prevent a effectual implementation of a database system.


(ii) Development Project Failure- For a range of reasons, project to develop a database system could fail. Sometimes management was not fully convinced of value of database system in first place. A database project to seem to be taking too long may be terminated.


A project large in scope may be approximately impossible to complete in a reasonable time. Again, management and users become dissatisfied and project fails. Throughout course of a project, key personnel might unexpectedly leave a company. If replacement personnel cannot be found, then project might not be successfully completed.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd