Database Implementation And Database Management Systems Post Replies Assignment (Please do in 2 days) From Chapter 8, page 359, Real World Exercise 8.2 (Im

Database Implementation And Database Management Systems Post Replies Assignment (Please do in 2 days)
From Chapter 8, page 359, Real World Exercise 8.2 (Image attached – one question only about 500 to 700 words)
Link to Textbook:

Different Subject – (same as Research paper) (can take up to 3 days to complete)
Discussion – about 350-450 words
Topic: We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.

Don't use plagiarized sources. Get Your Custom Essay on
Database Implementation And Database Management Systems Post Replies Assignment (Please do in 2 days) From Chapter 8, page 359, Real World Exercise 8.2 (Im
Just from $13/Page
Order Essay

Reply Post 1 – 250 words or more

Designing and managing a database takes more than genuinely putting in it — there are many shifting parts and pieces, and if these aren’t managed properly, you ought to cease up with a system that’s a long way less nice than it was supposed to be. Here are a few common mistakes and recommendations on how to avoid them.

Lack of Naming Standards. A naming preferred is a way of naming files (including these each furnished to and generated through the database) in such a way as to avoid duplicates and be effortlessly understood by using everybody searching at them. Alas, many agencies enable databases to create gibberish — or worse, consequences with identical names and one-of-a-kind content.

Exactly what form your naming standards should take relies upon on the nature of the database and what you sketch to do with it, but common things to include in names are the type of content the file contains, the date and time it used to be created, and a counter that notes how many files of that kind have been made. Companies with a high number of files may additionally do first-rate if the counter is for a set length of time, such as a given day.

Poor Storage of Reference Data. Reference data should in no way be stored in more than one location or the code of an application — both of these are incredibly inefficient. Instead, the statistics all be contained in a single centralized area that can be effortlessly defined and accessed by way of software program that needs to use it.

Lack of Documentation. Every database ought to have clear documentation of all its more than a few components, consisting of changes that are made at a later date. Unfortunately, many databases are constructed beside this, so there’s no easy way to determine out the influence of adjustments or make sure a proposed change will characteristic except breaking the relaxation of the system.

On the vivid side, this is convenient trouble to fix — all you want to do is make sure the database is fully documented for the duration of and after its creation. When human beings want to do something with it, they can pull out the documentation and get right to work, regularly saving time and cash in the process.


Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management. Cengage Learning.

Harrington, J. L. (2016). Relational database design and implementation. Morgan Kaufmann.

Elmasri, R., & Navathe, S. (2010). Fundamentals of database systems. Addison-Wesley Publishing Company – Yan Zhang

Reply Post 2 – 250 words or more

The database is considered as the organized collection of the underlying data that is generally stored as well as accessed by some electronically innovative technology from the given computer system. The more complex database can be developed by using the formal modeling and design of the underlying techniques. In this respect, the database management system is regarded to be significant software that aims at interacting with all the end users along with the applications and this helps in capturing and analyzing all the relevant data. Sum total of the database can also be referred to the particular database system in which application is associated with the database itself. Thus, in general, it allows data to access easily along with its proper operation and manipulation. According to Harrington, (2016), the database can be used by the organizations as the method related to retrieving, managing and storing the given information. The modern databases can be managed by using the underlying database management system in this regards.

Poorly Implemented Database

Sometimes the developers make mistakes in case of implementing the database. They do not get the idea of using a primary key that is regarded to be one of the most important aspects of database management. In this respect, the primary key value must have the data some rows and for the developers, it not good to use the application data with respect to primary keys. The developers used such values of primary keys that had been sequentially generated by the database upon the row insertion (Coronel & Morris, 2016). It was not changed under some unusual circumstances as well. In case of data arrangement regarding the industry in which the underlying information can be gathered physically, it is considered to be beyond the sphere of imagination for expecting to have some similar information display as the data is being gathered in continuous ways. At the point when this is not comprehended by the architect the issue emerges that time as the creator can’t keep up the best possible ease of use of the database when the volume of information is excessively enormous. This happens in light of the fact that there is an enormous distinction that deals with a number of information every month and a huge number of similar information in a similar timeframe. Such poor treatment of the database makes trouble principally for the learning based working environment in which it is constantly required to comprehend the genuine motivation behind the relevant information.

The solution for Database mistakes

Database mistakes explained above can be mitigated by following some steps. When the data has been shared among multiple rows, it should be moved into another table so that change in one table cannot affect the other significant rows (Shrivastava, Saxena & Patidar, 2017). Here the catalogue related to customers must be split off from the orders given by them only. In this regards, stored procedure overuse is also relevant and useful however for many modern applications, using those procedures is also not good always. The organizations need to use modern ORMs and its related innovative techniques so that stored value procedures can be developed in proper ways.


Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management. Cengage Learning.

Harrington, J. L. (2016). Relational database design and implementation. Morgan Kaufmann.

Shrivastava, R., Saxena, G. K., & Patidar, K. (2017). Implementation Of Unified Query For Big Database Using SQL On Oracle Platform. International Journal of Current Innovation Research, 3(03), 616-621 – Savankumar Patel s server, net an
NET Interview Qu…
Smount su
FataFat Stock Scr.
My Library Redsh..
Building a Web As,
Clannad Episode
Real-World Exercises
Exercise 8-1
Using a Web search engine, look up “Trojan Defense.” How can it be used to
question the conclusions drawn from a forensic investigation?
Exercise 8-2
At the end of 2006, a new edition of the Federal Rules of Civil Procedure (FRCP) went into
effect. Using a Web search tool, learn more about the FRCP. What likely effect will its
emphasis on electronically stored information (ESI) have on an organization’s need for a
digital forensic capability?
Exercise 8-3
Using a Web search tool, identify some common certifications for digital forensic practi-
tioners and determine whether the certifications are for practitioners at public sector organi-
zations or private sector organizations.
Exercise 8-4
Using a Web search tool, identify cases in which private information was disclosed when
computer equipment was discarded. Recent examples have included smartphones (like Black-
Berry) that were sold without proper data cleansing and hard drives that were sold without
data cleansing after the computers they were originally used in were upgraded.

Purchase answer to see full

Homework On Time
Calculate the Price of your PAPER Now
Pages (550 words)
Approximate price: -

Why Choose Us

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional academic writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.


Admission help & business writing

You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.


Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.


Revising your paper

Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers