ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

The Bead Bar

Essay by   •  April 2, 2011  •  Essay  •  312 Words (2 Pages)  •  1,170 Views

Essay Preview: The Bead Bar

Report this essay
Page 1 of 2

The Bead Bar has made a request to replace their current paper management system to a computer management system. The purpose of The Bead Bar implementing a systems development plan is to globalize their products. The Bead Bar is wishing to attract customers from all over the world. By using a systems development plan, The Bead Bar will be able to reach more customers. The Bead Bar should use an Enterprise DBMS to The Bead Bar.

The enterprise DBMS will allow The Bead Bar is a large enough company that an enterprise DBMS will be what they need. Enterprise DBMSпÑ--Ð...s are perfect for organizations, and companies that have multiple locations. The enterprise DBMS can give prices, changes, and inventory information to the different locations. Enterprise DBMS runs from one central location, then branches out to the other locations. They can connect directly to the companyпÑ--Ð...s websites to give the information needed to run the business such as item prices and inventory levels.

The Network Model or the Codasyl is the best model for The Bead Bar. The Network Model allows data entered to be linked to each other. There are no restrictions in how the data is connected to each other as in the Hierarchical Model. This model is very complicated, but is very flexible. The Bead Bar needs flexibility in their data entries.

There are many benefits of using a DBMS. One benefit of using a DBMS is that the DBMS transforms the data in a way that takes up less space. The user would enter the information and the DBMS would automatically change the information to another format so there is less space taken up. This gives the business more available space for more needed information. Another benefit of using a DBMS is the security that it provides the business. The DBMS settings can be set to control what user accesses what information.

...

...

Download as:   txt (1.8 Kb)   pdf (45.5 Kb)   docx (9.1 Kb)  
Continue for 1 more page »
Only available on ReviewEssays.com