What are the problems in Mario’s system and why same problems did not occur in Danica’s system?
Explanation of Solution
Given Information: There are two Auto shops similar to each other but with different information systems. Mario’s Auto shop used two file-oriented system and Danica’s Auto shop used
Explanation:
Mario’s system is divided into two file processing systems in order to manage the business. These two systems required two different files for data storage without having any link to each other. These two separate storages make that data inconsistent. That was the problem with Mario’s system. For example, there are three data items associated with Mario’s system named as
The same problem did not occur in Danica’s system because it used a database management system with two tables linked to each other. So, it would not cause any duplicity of data items and hence would not impact the quality of the data.
Want to see more full solutions like this?
Chapter 9 Solutions
Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)
- Carlo and Reyna are couples. Out of suspicion that Carlo is flirting with another girl, Reyna asked for the Facebook username and password of Carlo so that she can ascertain that Carlo has no other woman. Carlo refused to give his username and password to Reyna. Other than Carlo, Carlo’s sister also knows his brother’s Facebook username and password. Carlo’s sister is Reyna’ best friend. Reyna imposed that if Carlo still refuses to give her his Facebook credential, she would break up with him. Lawfully speaking, can Reyna imposed that Carlo give her his Facebook username and password? a. Yes, because it is the right of Reyna to ascertain that Carlo doesn’t have any other woman. b. Yes, because by going into a relationship with Reyna, Carlo waives his right to privacy over his Facebook account. c. No, because they are not married yet so they are still entitled to privacy over their social media accounts. d. No, because Carlo still enjoys a right to privacy over his…arrow_forwardCarlo and Reyna are couples. Out of suspicion that Carlo is flirting with another girl, Reyna asked for the Facebook username and password of Carlo so that she can ascertain that Carlo has no other woman. Carlo refused to give his username and password to Reyna. Other than Carlo, Carlo’s sister also knows his brother’s Facebook username and password. Carlo’s sister is Reyna’ best friend. Reyna imposed that if Carlo still refuses to give her his Facebook credential, she would break up with him. What if Carlo’s sister gave Reyna Carlo’s Facebook username and password without his consent? Can Carlo sue her sister for breach of privacy? a. Yes. Since Carlo did not give his consent to her sister to give to other people his facebook username and password, he still enjoys privacy over his account. b. None of the above. c. No, because Carlo’s sister doesn’t know it’s a crime to give to other people his brother’s Facebook username and password. d. No, because as a rule…arrow_forwardOne of the critical phases of the OCTAVE approach is to identify and mitigate risks.As a consultant, it is suggested that you avoid presenting a list of problems butwork with the client to develop a mitigation strategy. Illustrate, using a simplediagram, several activities that might be involved in the critical phase.arrow_forward
- Consider an online holiday booking system. The users can register to book a holiday package, including a family package. Which of the following special terms describes how closely the attributes of the Package and Family_Ppackage class are related to one another? Select one: O a. Coupling O b. Cohesion Oc. Interaction. O d. Correlationarrow_forwardCome up with a set of user stories for the MVP for a game of blackjack for a virtual casino. For this game, there will be a single-player, the dealer, and also have the ability to place bets. As part of your user stories, include the associated acceptance tests. For each story created, the expected level of detail is: Acceptance Criteria Listed. Once you have the initial user stories defined, refine them into what would be able to be completed in a two-week sprint. Through your refinement, identify any epics that may exist.arrow_forwardCreate IP simulations with one of the two standard approaches listed below. How effective are different strategies for fixing a ton of lIP problems quickly?arrow_forward
- Can I have help with this question, which options are correct: Your company is developing a ticketing website, which allows users to book tickets for ballet shows in London. Your task is to develop a set of test cases for the main booking function. This takes a date, time, and a list of seat numbers, and returns a confirmation code if the booking was successful or an error code if not. Below are some suggestions your colleagues have offered for how you could go about selecting good test cases. Tick all that you agree with. Select one or more: a. All your tests should use the same sequence of seat numbers. This way, it’s much easier to read any error outputs. b. You do not need to test situations where the list of seat numbers is empty. c. You need to have at least one test case for each month in the year. This is called partition testing, and the different months are equality classes for your test. d. You should have tests that try to book the same seats on the same…arrow_forwardCould you provide solution for implementation with regards to the following items below under the topic Blockchain powered global food supply chain whereas the farmer can register items, producer can produces and register items, distributor can delivers items, grocer can sell items, and consumers can back trace items? Detailed description of the implementation processCode snippets (if applicable)Challenges faced during implementation and their solutionsarrow_forwardBecause proof-of-work incurs a lot of expenses on electricity, network, and cooling, etc. which do not seem to produce any benefit other than the maintaining the operation of the blockchain, Ethereum has proposed an alternative "mining" implementation known as "proof-of-stake" to replace its current POW design, where the amount of "ethers" held is used as "stake". Based on your understanding of POW, which of the following does NOT seem to be a necessary feature in a POS implementation? The next block producer will be randomly selected from candidates The more ethers a candidate stakes, the higher chance it will be selected as the next block producer A candidate block producer cannot use its staked ethers for some time (or forever) At any time, the candidate block producer with the most staked ether always gets selected as the next block producerarrow_forward
- You have to create a system for library management javs using oop concepts. You can have different types of users of this system, including staff, student and visitor. Each user will have an account affiliated with them. The library system will have Books in it as well, which can be added, removed or lent based on the request from the user. The issuing authority can only be Librarian (separate class). Books can have further various categories, like Computer Books, History Books, Basic Science Books and more. All users when issuing the books, must pay a specific amount of fare per book. Students are given 20% discount on each book while each staff member is given 50% discount. Visitors are to pay complete fare 1. You are required to code this scenario in Java and using Aggregation, Inheritance, Polymorphism, Overriding and Overloading where applicable (carefully) 2. You are required to make a class diagram of the given scenario, with proper data members and methods, using…arrow_forwardSuppose you have this problem scenario: Ali was asked to develop an e- learning website. The website will be used by unlimited number of users and should be ready in 6 months. The requirements of the system are not well understood to Ali and his team. Therefore, they need to gather more information about the system. Answer the following questions with True OR False In order to schedule the project, Ali should use Class Diagram TRUE 9:29 ص FALSE 9:29 صarrow_forwardIn this scenario, imagine you are a graphic design company. Please create a price calculator page using HTML and javascript. The calculator should be simple and able to estimate the cost of a particular project. The cost is computed like this: For each project a base of $30,000 is always included Each graphic design project and logo project costs $15,000/month, whereas a consultation project costs $20,000/month. Projects can have durations of 1-12 months. The technical training (onboarding) and technical support could be booked for each development project. Each of them costs $50,000/project.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education