Discuss at least four strengths of the database approach.
What will be an ideal response?
Student responses will vary, but should be drawn from the following information from the text.?• Reduced data redundancy: Most data items are stored in only one file, which greatly reduces duplicate data. For example, a school's database would record a student's name and address only once. When student data is entered or changed, one employee makes the change once.?• Improved data integrity: When users modify data in the database, they make changes to one file instead of multiple files. Thus, the database approach increases the data's integrity by reducing the possibility of introducing inconsistencies.?• Shared data: The data in a database environment belongs to and is shared, usually over a network, by the entire organization. This data is independent of, or separate from, the programs that access the data. Organizations that use databases typically have security settings to define who can access, add, modify, and delete the data in a database.?• Easier access: The database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges. Many computer users also can develop smaller databases themselves, without professional assistance.?• Reduced development time: It often is easier and faster to develop programs that use the database approach. Many DBMSs include several tools to assist in developing programs, which further reduces the development time.
You might also like to view...
Case-Based Critical Thinking QuestionsCase 5-2Boater's Week is an online magazine. They like to host boat shows around town during the year to promote their magazine. Trevor is tasked with creating a table to list their boat show information which includes place, date & time, and a brief description of the event's activities. Trevor is using a Web site that is several years old that uses a table as a layout. Trevor wants to create a table layout that is more modern. He wants to enter the data for each boat show within one cell, therefore requiring a cell to occupy more than one column or row. Trevor decides that the data needs to occupy more than one row or column. To this he must create a(n) ____ cell.
A. spanning B. expanded C. wider D. taller
When the borders of the cells of a table are set to 0, the borders exist but are invisible.
Answer the following statement true (T) or false (F)
After a virus is on your system, it can do anything a legitimate program can do
Indicate whether the statement is true or false.
The federal agency responsible for police radio communications is the
a. FBI. b. CIA. c. FCC. d. DOD.