Discussions Questions

Feb 3rd, 2012
Studypool Tutor
Academy of Computer Education
Price: $10 USD

Tutor description

8.1 "Centralized versus Decentralized Database Management Systems" Please respond to the following: Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used. Analyze at least two considerations that would be required to ensure effective transaction transparency of centralized database management systems and distributed database management systems. Justify your response. 8.2 "Business Intelligence Tools" Please respond to the following: Business intelligence tools are considered the key drivers for many organizations. Identify and evaluate at least two business intelligence tools that could be effectively used to report business performance. Justify your response. Estimate the costs and describe the values of the two business intelligence tools you have identified from Part 1 of this discussion based on their functiona

Word Count: 664
Showing Page: 1/6
Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used.Answer:Benefits:Centralized database management systemsDistributed database management systemsAccess the share memoryDatabase can be access across multiple physical locations.Everything will be store on central server. There is no need to share data.Provide data sharing feature so anyone can share data from different locations.Everyone has same controlling over database.Provide distributed control so If a number of different sites are connected to each other, then a user at one site may be able to access data that is available at another siteIt reduce the time to access data from databaseIt take more time than centralized database because In a distributed database system, the database is stored on several computersChallenges:Principle challenge in conveyed database framework to build the security over unapproved access. The motivation behind appropriated database security is to manage shielding information from individuals or, programming having malignant intension. Dispersed framework has four primary security parts, security confirmation, approval, Encryption, and multi-level access control while in incorporated database framework we can give more security however to both security is the fundamental test. Both database framework can be

Review from student

Studypool Student
" Top quality work from this guy! I'll be back! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1820 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors