Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)
Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)
11th Edition
ISBN: 9781305494602
Author: Scott Tilley, Harry J. Rosenblatt
Publisher: Cengage Learning
Question
Book Icon
Chapter 9, Problem 1Q
Program Plan Intro

What are the problems in Mario’s system and why same problems did not occur in Danica’s system?

Expert Solution & Answer
Check Mark

Explanation of Solution

Given Information: There are two Auto shops similar to each other but with different information systems. Mario’s Auto shop used two file-oriented system and Danica’s Auto shop used database management system.

Explanation:

Mario’s system is divided into two file processing systems in order to manage the business. These two systems required two different files for data storage without having any link to each other. These two separate storages make that data inconsistent. That was the problem with Mario’s system. For example, there are three data items associated with Mario’s system named as Mechanic id, Name and Pay rate. These three items are stored in both the files of system which will cause redundancy of data and hence will impact the quality of data and integrity.

The same problem did not occur in Danica’s system because it used a database management system with two tables linked to each other. So, it would not cause any duplicity of data items and hence would not impact the quality of the data.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
fast pls solve thisquestion in 6 minutes i will give you like for sure   Draw UMLs for all classes, state all methods and attributes and functions for each class for this app( Emotion-Sensitive Music Generator and Mood Controller ). Also create CMM(Capability Maturity Model) description & CMM level of your start-up(1,2,3) for the app. Thank you
Develop an attack tree (Section 1.5.2) for obtaining a meal in the Student Center food court without your account being charged. Remember that an attack tree is more useful the more paths it shows to get to the goal; yours should have at least three branches (i.e., high-level approaches) under the root. Given below is Section 1.5.2.   1.5.2 Attack trees for threat modeling Attack trees are another useful threat modeling tool, especially to identify attack vectors. A tree starts with a root node at the top, labeled with an overall attack goal (e.g., enter a house). Lower nodes break out alternative ways to reach their parent’s goal (e.g., enter through a window, through a door, tunnel into the basement). Each may similarly be broken down further (e.g., open an unlocked window, break a locked window). Each internal node is the root of a subtree whose children specify ways of reaching it. Subtrees end in leaf nodes. A path connecting a leaf node to the root lists the steps (attack vector)…
Carlo and Reyna are couples. Out of suspicion that Carlo is flirting with another girl, Reyna asked for the Facebook username and password of Carlo so that she can ascertain that Carlo has no other woman. Carlo refused to give his username and password to Reyna. Other than Carlo, Carlo’s sister also knows his brother’s Facebook username and password. Carlo’s sister is Reyna’ best friend. Reyna imposed that if Carlo still refuses to give her his Facebook credential, she would break up with him. It is the right to suspend, withdraw, or order the blocking, removal, or destruction of his or her personal information from the personal information controller’s filing system. a. Right to Erasure or Blockings b. Right to Access c. Right to Damages d. Right to Portability
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education