DBMS Research and Recommendation

User Generated

ebxynqpbaprcg

Computer Science

Description

Research the various database management system (DBMS) products available for your scenario and compare the top contenders to highlight similarities and differences. Analyze these database products for their appropriate uses, strengths, and weaknesses in comparison with the needs of your organization. Recommend and defend the best DBMS product(s) for fully addressing the broad, high-level technological and operational needs of the organization. Recommend and justify needed software and hardware to fully meet operational applications in various departments. These will supplement the DBMS product you recommend to fully meet specific needs or requirements left open by the DBMS product.

selected scenario: wild wood apartments.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

This is the final report. Please let me if there is an error.

Database
Database or electronic database is called as a collection of data. Basically, data is organized
into tables. In tables there are rows and columns. For the convenience, database uses separate
tables for every data type. In this scenario, let us assume that there is data for apartments, units,
leases, payments, repairs, employers and expenses. For each of these data type, database uses
separate tables. Then DBMS will manage these entire set of tables.
DBMS
A Database Management System (DBMS) is a system software for creating and managing
databases and it is well-structured to allow users to do following tasks. (Rouse, 2015)

1. Data Definition
This is the process of creating, modifying and removing of definitions that define the
organization of the data.
2. Update
This function can be used to insert, modify and delete the actual data.
3. Retrieval
This provides information in a form directly usable or for further processing by other
applications.
4. Administration
This function is responsible for registering and monitoring users, imposing data security,
preserving the integrity of data and dealing with concurrency control. Information that has been
corrupted by some events (unexpected system failures) can be recovered using this.

Using a file system, it is difficult to access the exact data location. The reason behind this
could be the occurrence of same data in many places. If a data is needed to be updated, every place
has to be updated due to this.
Not only the manager or...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags