
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 5, Problem 5.21MML
Explanation of Solution
Purpose of the
- The main purpose of the database is keeping track of the things.
- It is tool that is used to organize large amount of data.
- It is used in storing and transforming the data into information that can be used in supporting decision making.
Choice of database when preferred with spreadsheets:
- Generally spreadsheets are also used to track things, the circumstance where a database is preferred with spreadsheets are when more information needs to processed to obtain a certain decision.
- Spreadsheets are limited when more details regarding the data collected needs to be added.
- In that case, database are preferred when more data needs to be added to calculate.
Determining database as a better choice:
Managing hundreds of spreadsheet with huge amount of data is really a tedious process for the manager.
- The data that are present in the spreadsheet can be used in an effective way with the help of queries.
- The data contents that are present in the database are processed based on the query, can be protected from the malicious user and data gets stored permanently into the database and the chance of data being lost gets reduced.
Therefore, the choice of using database is recommended in the solving the problems stated.
Developing the database as a centralized database:
Centralized database is a database that stores the data which can be maintained at a single location. Thus, when creating a database as a centralized database it provides the following advantages that are listed below:
- It helps the data that are stored being maintained in consistent way thus ensuring the reliability of the data.
- It provides security to the data that are stored...
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
Capsim Team PowerPoint Presentations - Slide Title: Key LearningsWhat were the key learnings that you discovered as a team through your Capsim simulation?
Write the SQL code that permits to implement the tables: Student and Transcript. NB: Add the constraints on the attributes – keys and other.
Draw an ERD that will involve the entity types: Professor, Student, Department and Course. Be sure to add relationship types, key attributes, attributes and multiplicity on the ERD.
Chapter 5 Solutions
Using MIS (10th Edition)
Ch. 5.2 - Prob. 1EGDQCh. 5.2 - Prob. 2EGDQCh. 5.2 - Prob. 3EGDQCh. 5.2 - Prob. 4EGDQCh. 5.2 - Prob. 5EGDQCh. 5.2 - Prob. 6EGDQCh. 5.2 - Prob. 7EGDQCh. 5.2 - Consider the adage Never ask a question for which...Ch. 5.3 - Prob. 1SAQCh. 5.3 - Prob. 2SAQ
Ch. 5.3 - Prob. 3SAQCh. 5.3 - Prob. 4SAQCh. 5.8 - Prob. 1SGDQCh. 5.8 - Prob. 3SGDQCh. 5.8 - Prob. 4SGDQCh. 5.8 - Prob. 5.1ARQCh. 5.8 - Prob. 5.2ARQCh. 5.8 - Prob. 5.3ARQCh. 5.8 - Prob. 5.4ARQCh. 5.8 - How are data models used for database development?...Ch. 5.8 - Prob. 5.6ARQCh. 5.8 - Prob. 5.7ARQCh. 5.8 - Prob. 5.8ARQCh. 5 - Draw an entity-relationship diagram that shows the...Ch. 5 - Consider the relationship between Adviser and...Ch. 5 - Prob. 5.3UYKCh. 5 - Prob. 5.4UYKCh. 5 - Study Figure 5-28 to understand the entities and...Ch. 5 - Working with your team, develop a list of seven...Ch. 5 - Modify the E-R model in Figure 5-28 to include a...Ch. 5 - Discuss the advantages and disadvantages of the...Ch. 5 - Transform the data model in Figure 5-28 into a...Ch. 5 - Prob. 5.1CE5Ch. 5 - Fill your database with sample data. Because you...Ch. 5 - Prob. 5.12CE5Ch. 5 - Explain why a one-table database could be stored...Ch. 5 - Prob. 5.14CS5Ch. 5 - Examine the columns in Figure 5-33. Name three...Ch. 5 - Prob. 5.16CS5Ch. 5 - Prob. 5.17CS5Ch. 5 - Explain the statement A database is an abstraction...Ch. 5 - Prob. 5.19CS5Ch. 5 - Prob. 5.2MMLCh. 5 - Prob. 5.21MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Draw an ERD that represents a book in a library system. Be sure to add relationship types, key attributes, attributes and multiplicity on the ERD.arrow_forward2:21 m Ο 21% AlmaNet WE ARE HIRING Experienced Freshers Salesforce Platform Developer APPLY NOW SEND YOUR CV: Email: hr.almanet@gmail.com Contact: +91 6264643660 Visit: www.almanet.in Locations: India, USA, UK, Vietnam (Remote & Hybrid Options Available)arrow_forwardProvide a detailed explanation of the architecture on the diagramarrow_forward
- hello please explain the architecture in the diagram below. thanks youarrow_forwardComplete the JavaScript function addPixels () to calculate the sum of pixelAmount and the given element's cssProperty value, and return the new "px" value. Ex: If helloElem's width is 150px, then calling addPixels (hello Elem, "width", 50) should return 150px + 50px = "200px". SHOW EXPECTED HTML JavaScript 1 function addPixels (element, cssProperty, pixelAmount) { 2 3 /* Your solution goes here *1 4 } 5 6 const helloElem = document.querySelector("# helloMessage"); 7 const newVal = addPixels (helloElem, "width", 50); 8 helloElem.style.setProperty("width", newVal); [arrow_forwardSolve in MATLABarrow_forward
- Hello please look at the attached picture. I need an detailed explanation of the architecturearrow_forwardInformation Security Risk and Vulnerability Assessment 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset? Please do not use AI and add refrencearrow_forwardFind the voltage V0 across the 4K resistor using the mesh method or nodal analysis. Note: I have already simulated it and the value it should give is -1.714Varrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning