Database Systems: Design, Implementation, & Management
12th Edition
ISBN: 9781305627482
Author: Carlos Coronel, Steven Morris
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 16, Problem 9RQ
Explanation of Solution
Difference between the strategic, tactical, and operational levels in an organization:
Strategic levels | Tactical levels | Operational levels |
Top level management makes strategic decisions. | Middle level management makes tactical decisions. | Operational management makes daily working decisions. |
Strategic decisions involves with decisions for the well being of the company of even for survival. | Tactical levels involve long term decisions and affect large number of peoples and many departments in the organization. | Operational level involves short term decisions. |
At the strategic level, |
Provide data for relating decisions and planning... |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain roles, responsibilities, and required characteristics or skills of all roles in the scrum process.
Explain the procedures involved in acquiring credentials and
training, being sure to include particular examples from your own
experiences at each stage.
Security breaches in information systems are very commonplace these days even though some organizations have what they believe is good security controls. Because of their vulnerability to threats from hackers, internal personnel, and poor management of Hardware and software devices, security controls always need revisiting.From my perspective as manager of the Accounts and Finance department, every security breach affects this department even if it is just down time to be at meetings, to discuss strategies and costs to repair damages. When the breaches occur, unauthorized access is gained to either, do something malicious to the organization's resources to steal or sabotage data for financial gain.This usually results in the company's reputation/integrity being damaged, Loss of revenue during downtime, high costs to repair and restructure. legal ramifications are expected as well if guilty persons are found or if customers decide to sew for breach of contract and losses.Two Reasons…
Chapter 16 Solutions
Database Systems: Design, Implementation, & Management
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Suppose that you are a DBA. What data dimensions...Ch. 16 - How and why did database management systems become...Ch. 16 - Using a single sentence, explain the role of...Ch. 16 - Prob. 8RQCh. 16 - Prob. 9RQCh. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - Prob. 12RQCh. 16 - Prob. 13RQCh. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - What DBA activities support end users?Ch. 16 - Prob. 20RQCh. 16 - Prob. 21RQCh. 16 - Prob. 22RQCh. 16 - Prob. 23RQCh. 16 - Prob. 24RQCh. 16 - Prob. 25RQCh. 16 - Prob. 26RQCh. 16 - Prob. 27RQCh. 16 - Prob. 28RQCh. 16 - Prob. 29RQCh. 16 - Prob. 30RQCh. 16 - Define the concept of a data dictionary, and...Ch. 16 - Using SQL statements, give some examples of how...Ch. 16 - Prob. 33RQCh. 16 - Prob. 34RQCh. 16 - Prob. 35RQCh. 16 - How have cloud-based data services affected the...Ch. 16 - What tool is used in Oracle to create users?Ch. 16 - In Oracle, what is a tablespace?Ch. 16 - Prob. 39RQCh. 16 - In Oracle, what is a datafile? How does it differ...Ch. 16 - Prob. 41RQ
Knowledge Booster
Similar questions
- Procedures and guidelines are within the jurisdiction of operations, while policies and standards are regarded as instruments of governance and management, respectively. Provide an explanation of IT standards, procedures, and recommendations to a student who isn't familiar with the subject matter.arrow_forwardExplain your certification procedures using personal examples.arrow_forwardExplain the benefits of implementing a Human Resource Information System (HRIS) in managing personnel within a large organization.arrow_forward
- Describe the certification and training process and provide particular examples from your experience.arrow_forwardPlease elaborate on the benefits of having adaptable procedures in places of business.arrow_forwardDescribe what key duties you would include in an information security program for a smaller organization with three full-time employees and two or three part-time employees from other departments. Add Information Security and other pertinent departments. List each department's tasks and which may be outsourced. Justify function allocation.arrow_forward
- Create a list of the factors that are most important to your satisfaction at work, and explain why they are so important.arrow_forwardList and explain the factors that are the most important for your job satisfaction.arrow_forwardCASE:Change Management for ERP System ProjectYou are a member of the human resources organization of a mid-sized manufacturing company that is implementing a new enterprise resource planning system that will have a major impact on the way some 50 members of the company perform their jobs. In addition, many other employees will need to be retrained on how to obtain the management reports and perform the data analysis they need for decision making. Questions: 1. How could Lewin’s force field analysis be applied to this project? 2. How might the diffusion of innovation theory be applied to this project?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning