Wild Wood Apartments needs a database that is more efficient in its reporting of leasing, maintenance, and repairs from individual apartment managers to the central headquarters for review and approval. This database needs to be easy to use and accessible for apartment managers and have two basic sections, based on leasing and maintenance needs. Apartment managers can then input all requests, reports, and financial data into the system as it occurs, rather than filing monthly reports.
Issues with Current System
The current system has a number of issues. First and foremost, it requires individual apartment managers to manually fill out forms quarterly that includes any new or changes to rentals in his or her building, as well as reports regarding repairs and maintenance. This means that money spent on maintenance is not repaid until the end of the quarter, which can be frustrating for managers. Moreover, the forms are bulky and difficult to fill out for each and every incident at the end of the quarter. The database will increase the efficiency by storing certain apartment and leasing information, making it easier for managers to pull up what is already stored and then adding information as it occurs, rather than waiting till the end of the quarter to be bogged down by paperwork. The database will also help streamline the process so that individual managers are not overwhelmed with making decisions about certain events, as they are immediately uploaded to the headquarters for review.
Database Requirements for Stakeholders
The first group of stakeholders is the apartment managers. These are the individuals that hold the responsibility of making the reports quarterly and dealing with the tenants on a daily basis. Managers will need an easy to use spreadsheet system that can store rental and unit information, so that information on certain units can easily be pulled up without the manager having to re-input information...
Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee
Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,
With optimistic concurrency control, the database checks resources to determine if any conflicts have occurred only when attempting to change data. If a conflict occurs, the application must read the data and attempt the change again. Pessimistic concurrency, on the other hand, control locks resources as they are required, for the duration of a transaction. Unless deadlocks occur, a transaction is assured of successful completion 5.5 Audit Tracking Although auditing does
Database designers and administrators can work concomitantly with it professionals and researchers to implement the security measures necessary to mitigate risks to data. I have been a database user at my company for a number of years. As such, I am allowed access from only a limited number of locations; one static connection at home, one at work, and one laptop connection that I carry with me when traveling. Each
Strengths vs. Weaknesses The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways
Database Security Case Study Database Security: Case Study The objective of this study is to answer specific questions following have read the case study which is the focus of this work in writing including naming the concepts which are illustrated in the case study and why a customer database is useful for companies related in the case study under review. This work will additionally answer as to what would occur if the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now