+
CIS 515 CASE STUDY A GRADED

CIS 515 CASE STUDY A GRADED

Rating:
Rating
(0)
Author: un quite
Description:

http://unquite.com/question-details/CIS-515-CASE-STUDY-A-GRADED/2265

or email us

query@unquite.com

CIS 515 CASE STUDY A GRADED

Study: Database Development – A Graded Paper

Instant Download

Due Week 8 and worth 90 points

Read the following articles available in the ACM Digital Library:

Dual Assessment of Data Quality in Customer Databases, Journal of Data and Information Quality (JDIQ), Volume 1 Issue 3, December 2009, Adir Even, G. Shankaranarayanan.

Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. Paige.

Please follow the steps below to access ACM Digital Library:

1.     Login to iCampus at https://icampus.strayer.edu/login

2.     From iCampus:

1.     Click STUDENT SERVICES >> Learning Resources Center >> Databases

2.     Scroll down to “Information Systems/Computing”

3.     The ACM Digital Library is located below the heading “Information Systems/Computing”.

Write a two to three (2-3) page paper in which you:

1.     Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.

2.     Recommend the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

3.     Suggest three (3) maintenance plans and three (3) activities that could be performed in order to improve data quality.

4.     From the software development methodologies described in the article titled, “Process-centered Review of Object Oriented Software Development Methodologies,” complete the following.

1.     Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

2.     Analyze how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Your assignment must follow these formatting requirements:

(more)
See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

25 Sophia partners guarantee credit transfer.

221 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 20 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.

Tutorial