Assignment 3 Database

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Auditing in CIS Environment

Assignment 3: Database

Questions:

1. What is a legacy system?


2. What is the flat-file model?
3. What are the four primary elements of the database approach?
4. What types of problems doe’s data redundancy cause?
5. What flat-file data management problems are solved as a result of using the
database concept?
6. What are four ways in which database management systems provide a controlled
environment to manage user access and the data resources?

Answers:

1. A legacy system is a computer-based program that is outdated in terms of


programming language, platforms, techniques, terminology and/or processes.
Most often, when talking about legacy systems, we're referring to outdated
database applications. A legacy system is outdated computing software and/or
hardware that is still in use. The system still meets the needs it was originally
designed for, but doesn’t allow for growth. What a legacy system does now for
the company is all it will ever do. A legacy system’s older technology won’t allow
it to interact with newer systems.

2. Flat files are data files that contain records with no structured relationships to
other files. The flat-file approach is most often associated with so-called legacy
systems. These are often large mainframe systems that were implemented in the
1970s through the 1980s. Some organizations today still make extensive use of
such systems. Eventually, they will be replaced by modern database
management systems, but in the meantime, auditors must continue to deal with
legacy-system technologies.

3. The users, the database management system, the database administrator, and
the physical database structures.

4. Data redundancy occurs when the same piece of data exists in multiple places,
whereas data inconsistency is when the same data exists in different formats in
multiple tables. Unfortunately, data redundancy can cause data inconsistency,
which can provide a company with unreliable and/or meaningless information.

5. Data independence is the type of data transparency that matters for a centralized
DBMS. It refers to the immunity of user applications to changes made in the
definition and organization of data. Application programs should not, ideally, be
exposed to details of data representation and storage. The DBMS provides an
abstract view of the data that hides such details.

6. 1. Program development. The DBMS contains application development software.


Both programmers and end users may employ this feature to create applications
to access the database.
2. Backup and recovery. During processing, the DBMS periodically makes
backup copies of the physical database. In the event of a disaster (disk failure,
program error, or malicious act) that renders the database unusable, the DBMS
can recover to an earlier version that is known to be correct. Although some data
loss may occur, without the backup and recovery feature the database would be
vulnerable to total destruction.
3. Database usage reporting. This feature captures statistics on what data are
being used, when they are used, and who uses them. This information is used by
the database administrator (DBA) to help assign user authorization and maintain
the database. We discuss the role of the DBA later in this section.
4. Database access. The most important feature of a DBMS is to permit
authorized user access, both formal and informal, to the database.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy