can someone rephrase this for me? re write all that in your own words. Increased
ID: 390968 • Letter: C
Question
can someone rephrase this for me? re write all that in your own words.
Increased Scalability and Performance
In its first year of operation, the official website of the American Family Immigration
History Center, www.ellisisland.org , generated more than 2.5 billion hits. The site offers
immigration information about people who entered America through the Port of New
York and Ellis Island between 1892 and 1924. The database contains more than 25 million
passenger names that are correlated to 3.5 million images of ships’ manifests. 5
The database had to be scalable to handle the massive volumes of information and
the large numbers of users expected for the launch of the website. In addition, the database
needed to perform quickly under heavy use. Some organizations must be able to
support hundreds or thousands of users including employees, partners, customers, and
suppliers, who all want to access and share the same information. Databases today scale
to exceptional levels, allowing all types of users and programs to perform informationprocessing
and information-searching tasks.
Reduced Information Redundancy
Information redundancy is the duplication of data, or the storage of the same data
in multiple places. Redundant data can cause storage issues along with data integrity
issues, making it difficult to determine which values are the most current or most accurate.
Employees become confused and frustrated when faced with incorrect information
causing disruptions to business processes and procedures. One primary goal of a
database is to eliminate information redundancy by recording each piece of information
in only one place in the database. This saves disk space, makes performing information
updates easier, and improves information quality.
Increased Information Integrity (Quality)
Information integrity is a measure of the quality of information. Integrity constraints
are rules that help ensure the quality of information. The database design needs to consider
integrity constraints. The database and the DBMS ensures that users can never violate
these constraints. There are two types of integrity constraints: (1) relational and (2)
business critical.
Relational integrity constraints are rules that enforce basic and fundamental information-based
constraints. For example, a relational integrity constraint would not allow
someone to create an order for a nonexistent customer, provide a markup percentage
that was negative, or order zero pounds of raw materials from a supplier. A business rule
defines how a company performs certain aspects of its business and typically results
in either a yes/no or true/false answer. Stating that merchandise returns are allowed
within 10 days of purchase is an example of a business rule. Business-critical integrity
constraints enforce business rules vital to an organization’s success and often require
more insight and knowledge than relational integrity constraints. Consider a supplier
of fresh produce to large grocery chains such as Kroger. The supplier might implement
a business-critical integrity constraint stating that no product returns are accepted after
15 days past delivery. That would make sense because of the chance of spoilage of the
produce. Business-critical integrity constraints tend to mirror the very rules by which an
organization achieves success.
The specification and enforcement of integrity constraints produce higher-quality information
that will provide better support for business decisions. Organizations that establish
specific procedures for developing integrity constraints typically see an increase in accuracy
that then increases the use of organizational information by business professionals.
Increased Information Security
Managers must protect information, like any asset, from unauthorized users or misuse.
As systems become increasingly complex and highly available over the Internet on many
different devices, security becomes an even bigger issue. Databases offer many security
features including passwords to provide authentication, access levels to determine who
can access the data, and access controls to determine what type of access they have to
the information.
For example, customer service representatives might need read-only access to customer
order information so they can answer customer order inquiries; they might not
have or need the authority to change or delete order information. Managers might
require access to employee files, but they should have access only to their own employees’
files, not the employee files for the entire company. Various security features of
databases can ensure that individuals have only certain types of access to certain types
of information.
Security risks are increasing as more and more databases and DBMS systems are
moving to data centers run in the cloud. The biggest risks when using cloud computing
are ensuring the security and privacy of the information in the database. Implementing
data governance policies and procedures that outline the data management requirements
can ensure safe and secure cloud computing.
Explanation / Answer
Increase Scalability and Performance:
In the first year of operation the official website of Americal Family immigration History Center, www.ellisisland.org , generated more than 2.5 billion hits.The site offers
immigration information about people who entered America through the Port of New
York and Ellis Island between 1892 and 1924. The database contains more than 25 million
passenger names that are correlated to 3.5 million images of ships’ manifests. Considering the success in the very first year of operation and the critical huge database that it has it should be scalable to handle massive volume and large userbase.The database should perform quickly under heavy usage as well as it should enable users to perform information search.Some organisations must be able to support hundreds and thousands of users including all stakeholders to share information.
Reduced Information Redundancy - All dupicate data to be removd from the database.Duplicate data creatres storage issues as well as data integrity issues.It become difficult to identify which is an older version which builds frustation in users.The primary goal of a database is to eliminate information redundancy by recording each piece of information in only one place in the database. This saves disk space, makes performing informationupdates easier, and improves information quality.
Increased Information Integrity- Information integrity is a measure of the quality of information. Integrity constraints are rules that help ensure the quality of information. The database design needs to consider integrity constraints. The database ensures that users can never violate
these constraints. There are two types of integrity constraints: (1) relational and (2)
business critical.
Relational Constraints ensures basic and fundamental information based constraints.i.e system will not allow to create order for non existent customer, a nagative mark up percentage,or an order of zero pounds from a supplier.
Business rules define how a company performs certain aspects of its business and typically results in yes/no or true/false. ex- Stating that merchandise returns are allowed within 10 days of purchase is an example of a business rule.Business critical integrity tend to replicate rule that achieves orgaisational suceess.
Increased information Security- Information is an asset for organisation which should be protected from unauthorised access or misuse.As systems become easily available on so many devices so information is more prone to risk. DAtabases offers many secutiry features like password protection to determine who can access the data.For eg- a customer service representaive can have read only access to get information like what customer wants so that he cannot chnage the data.
Now we are in a scenario where databases are moving to cloud.The biggest risks when using cloud computing are ensuring the security and privacy of the information in the database. Implementing
data governance policies and procedures that outline the data management requirements
can ensure safe and secure cloud computing.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.