Purchasing a database program, Basic Computer Science

Assignment Help:

When purchasing a database program, you must have a clear idea of what you need it for. Ask yourself the following questions.

(1) Will it perform all (he operations necessary for my system?

Many programs will manage 90% of what you want, but only a few will manage 100%. Your computer system will be a waste of time and money if it is a 'ninety percent', because you will have to operate a paper system in parallel. For example, can the program:

Carry out batch processing, e.g. updating an entire file?

Manipulate alpha, numeric and data information?

Select records on matching or mismatching the contents of more than one field?

(d) Sort the data file into ascending or descending order on the contents of one or more fields?

(e) Produce useful reports to both a visual display unit and a printer?

(f) Link to another program, e.g. store a file of address data which can be used with a word-processing program for a mail merger?

(2) Is it large enough?

In this context beware of a common mistake, i.e. do not buy an educational program and expect it to carry out a business function. Check the possible:

(a) Number of files

(b) Number of records per file

(c) Number of fields per record

(d) Number of characters per field.

These features are interdependent to a certain extent but it is important to ascertain upper limits.

(3) 1s its cost justified?

'You do not get what you do not pay for' in the computing world.

However, it always pays to shop around. Some suppliers will adhere to a heavily marked-up tariff while others will offer massive discounts, particularly in the education sector. Make sure that if yeti accepts a large discount, you do not lose out on training.


Related Discussions:- Purchasing a database program

Properties of Dictionary Keys, Dictionary values encompass no limitations. ...

Dictionary values encompass no limitations. They can be any random Python object, moreover standard objects or user-defined objects. Though, same is not true for the keys. There ar

Introduction to FCB , There are two kinds of FCB, the normal, whose length...

There are two kinds of FCB, the normal, whose length is 37 bytes and the expanded one of 44 bytes. The FCB is created of data given by the programmer and by data which it takes dir

Basic of simulation, Task 1 Study various types of systems and simulate a s...

Task 1 Study various types of systems and simulate a system of your own. Task 2 Study various models and enumerate the various steps for designing a corporate model

Potential risks to information systems, Question 1 Write about Pot...

Question 1 Write about Potential Risks to Information Systems Factors to be addressed for making information systems more secure Question 2 Write about the foll

We will compare the performance of a vector processor, In this problem we w...

In this problem we will compare the performance of a vector processor with a system that contains a scalar processor and a GPU-based coprocessor. In the hybrid system, the host pr

Telecommunication protocols, TELECOMMUNICATION PROTOCOLS: The two majo...

TELECOMMUNICATION PROTOCOLS: The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The ne

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd