Explain How Potential Errors In The Design And Construction Of A Database

Improved Essays
D1 - Discuss how potential errors in the design and construction of a database can be avoided.
Accidental deletion of fields

When a database is being used you might find it easy to accidently delete data which could mean a lot of stress if it is something which is very valuable. One main way to avoid this would be to make sure that back-ups are made of the data, so whatever the matter the data will not be completely lost. Back-ups can be stored on anything like a memory stick or an external hard drive basically anywhere you feel is most safe. However, if data is deleted it can be very time costly because it will take a long time to rebuild also it is annoying when data becomes deleted and if you don’t have a back-up then you will take a lot of your own time and effort to retype the data if it is not saved this is why it is best to always save your work to a secondary location for example to another device. The best way to stop accidental deletion of something important in a database is to set the database to only the designer can manipulate it, so this means that only the person who created it can change and delete things which is
…show more content…
An example of this would be if a field called ‘fees’ in a table in the database, it will go wrong is a text value that is inserted instead of a numerical field value like two hundred instead of the numerical value of 200. This can be avoided as you can tell the database what to input so in this case you tell he database to only allow numerical values to be inputted within that field so this error won’t accrue again. You can do this by going into design view and changing the command from text to number so this will only allow you to input a number so the database in this case does all of the work for you. The database won’t allow anything inputted other than numbers which fixes the potential problems that might occur had it not been

Related Documents

  • Decent Essays

    To avoid this DBA can use policy based management which can do the regular checks and make sure that database server are properly configured as we want them to be. 4. Policy based management offers another ability to DBA that it enforces the best practice standards against the databases. Apart from able to create a custom policies we can also use the SQL Server best practice policies which will come default when…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Part 2: Describe a risk event, the consequences, and the risk-response plan for the data-mining software project. (15 points) (Points : 30) 6. (TCO F) Analyze and compare the performance of the following two projects in terms of cost, schedule, and efficiency. Make sure to show your calculations and analyze and explain the results.…

    • 961 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Layla Micheli Monica Malt LVN 121 11/17/2017 What were the Contributing Factors to the problems in this Case? Describe them by category below. Equipment (design, availability and maintenance) The Pyxis machine is designed to calculate patient medications and doses accurately and should have alerted the nurse when the dosage was too high for a pediatric patient.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Pt2520 Week 2 Assignment

    • 517 Words
    • 3 Pages

    This week we learned lots about the decomposition of our relations we are creating in the database as well how to make the relations into normal forms, which there are three normal forms. I learned that there can be data that is redundant and therefore not useful for the database. This data has no integrity and can be misplaced and even confuse how the data can be used and retrieved. This type of problem must be avoided. I had a hard time understanding how the breaking down of one relation into two or more would help keep all the data from being redundant.…

    • 517 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Is3350 Unit 3 Case Study

    • 201 Words
    • 1 Pages

    Although we are confident that our project will meet all of the requirements for the class, the following are a few concerns that have been brought up when discussing this project: 1. Will the client provide enough information or access required to properly complete the project? a. Having direct access to business information for this project is not required but it would definitely help us in primarily meeting our requirements for the class. 2. Will we be able adapt to changes and properly meet project requirements if the client decides to change his opinion on the initially agreed upon scope?…

    • 201 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    College to Career: A recent survey commissioned by Bentley University in 2014 found that “compared with business decision-makers and corporate recruiters, high school and college students were far less likely to define preparedness in terms of personal traits or work ethic” (Chase, 2015). This means skills and experience rank high for college students when they evaluate preparedness. Unfortunately, the same survey found “thirty-seven percent of recent college graduates give themselves a grade of “C” or lower on their individual level of preparedness” (Chase, 2015).…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    US Honors Pre-WWI

    • 1380 Words
    • 6 Pages

    U.S. Honors Pre-WWI Name: Yash Parikh_________________ Score: ______ Read Chapter 8. Do further research on databases and books. Your textbook is a resource but cannot be used as a cited source. You must have a Works Cited page. 1.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Case Study Assignment – I Campbellsville University MASSIVE DATABASE MASTERING - MASTERCARD INTERNATIONAL Various affiliations are endeavoring to address the open entryways and limit challenges related with "huge data." Industry masters gage that the total volume of data is increasing at general interims and most by a wide margin of new data being delivered is prepared to go spaces. MasterCard Universal (www.mastercard.com) is not any more impossible to miss to think about the issues identified with monstrous databases. MasterCard has amassed a data circulation focus that is more than 100-terabytes in size. Insiders expect that it will create to more than 1.8 petabytes.…

    • 933 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    • The common data quality problem in healthcare performance measurement is: First, the lack of knowledge about the purpose of healthcare performance measurement. The purpose is to: - Assessment of current performance: need to find out the strength and weakness of current process - Demonstration and verification of performance improvement: evaluate and compare whether the improvement had made any difference. - Control of performance (Joshi, Ransom, Nash, & Ransom, 2014, p.135)…

    • 850 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Reginald, Eveyone uses statistic on a daily basis, however some individuals do not realize they are using statistic practices in solving there problems. I enjoyed reading your post. Moreover, how you where able to apply the knowledge of larger samples produce significat outcomes in your IT department. The data has proven to be critical in assisting you in making sound business decisions.…

    • 104 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    There are several ways to ensure that data integrity is being followed by using: constraints, primary and foreign keys, and removing duplicate data from the database. When merging two company’s data into one data warehouse, data integrity needs to be checked using a technique known as data scrubbing.…

    • 1257 Words
    • 5 Pages
    Superior Essays