BA 227 Midterm Exam - Tibay, Krismar
BA 227 Midterm Exam - Tibay, Krismar
Midterm Examination
By
Krismar D. Tibay
MBA 2-1A-1
Here are some of the important factors when deciding on a particular DBMS:
1. Data Model Compatibility - The type of data model that a DBMS can support comes first.
One can use traditional databases for structured or relational data, whereas non-traditional
databases are the best solution for non-structured or big data use cases with systems. This is
something you would want to consider in terms of your data and what its use cases are like.
2. Scalability – It is another critical factor. When talking about enterprises that expect to grow
within a short period, it becomes essential to have a DBMS that can accommodate the ever-
increasing volume of data and number of users.
3. Performance – Measurements such as speed of querying and throughput of transactions are
very important. High-speed retrieval of data by the use of in-memory databases such as
Redis may work well for systems that need to carry out processing of data in an order of a
few seconds. Assessing your performance requirements can ease the burden of selecting an
appropriate DBMS that also meets the expected criteria for speed and efficiency.
4. Security - The security of data is another important aspect to look at. Encryption and user
access levels, including access control, are very important. To prevent any unauthorized
access or theft of private information stored within their database system, companies that
provide DBMSs have additional security measures installed.
5. Cost - Cost is a factor that cannot be avoided. Free to use of open-source DBMSs that come
with plenty of features without the need to pay for any licenses, making them suitable for
young enterprises and small companies. Enterprise solutions, however, come with a large
cost but also offer many more features and support that could make the cost worth it.
Choosing the appropriate database management system is based on a number of criteria such as
data model fit, scalability, effectiveness, security, and cost which have to be critically analyzed.
Bringing these factors on board and coupled with your organizational goals and objectives,
contributes to sensible and constructive data management.
The two fundamental types of data storage are: Primary and Secondary:
1. Primary or Volatile Memory, which is basically RAM and similar components that hold
temporary data and information for fast access by the system.
1
2. Secondary or Non-volatile memory, for example, hard disk, solid state drives, etc. are the
ones used for secondary media storage and help in keeping information for extended
periods of time. The choice of which of these types to use will however depend on speed,
cost, and data persistence.
The future brings with it such technologies as quantum computers and cloud storage, both of
which seem to alter the conception of data management. Cloud storage is flexible and
affordable while quantum computing, when it realizes its potential, will help in solving a
certain class of complex data retrieval problems in polynomial time which classical computers
strive endlessly to solve within exponential limits. Lastly, saving and accessing information is
very complicated but an important component of today’s computing. The determination of
different storage types, retrieval methods, problems, and appreciation of present and future
improvement in this field have been provided.
The data in the network model is summarized as records connected to each other through links.
The structure is shown graphically in the form of a graph, where records are the nodes and
relationships among the records are the edges.
The network database model is highly important in those cases where the data structure is
highly interconnected and where quick access to such data is necessary. While it has some
benefits due to how flexible and cohesive the model is, it also poses some challenges due to its
complexity and low popularity. The knowledge of the planning and elements of the network
model can help us understand the scope of its use, and more importantly, the problems that it
can solve within the context of database management.
4. Data Modeling
The practice of data modeling pertains to the activity of showing and considering a visual
picture of the system or the structure of a certain database in order to classify, outline, and
synchronize individual constituents of information and their interrelations. It is a graphic design
2
for the purpose of the development of databases and applications so that data is organized in a
proper way devoid of inaccuracies, inconsistencies, and inaccessibility.
The process of data modeling entails various elements, some of which include:
1. Entities: These can be considered as objects or concepts with a separate existence within
the system. Examples include customers, goods, and orders.
2. Attributes: These items are the various properties or characteristics of entities.
3. Relations: These state the ways through which entities interact. For example, a single
customer can place many orders, which means that the relationship between the customer
entities and order entities is a one-to-many relationship.
4. Data types: Each attribute is accompanied by a data type and an example would be a
number, string, or date which describes exactly what kind of data it is going to hold.
5. Constraints: These are the restrictions and limitations imposed on the data in order to
maintain its accuracy and reliability.
Data models, on the other hand, have a wide variety of representations which include, but are
not limited to:
1. Conceptual Models: These are general overview representations with diagrams that relate
to different aspects but do not include system technicalities.
2. Logical Models: Contain detailed descriptions of thanks of the data structures, without any
references to their future physical realization.
3. Physical Models: These models give specifications of how the data will be kept in the
Database including structures of the tables, index definitions as well as detail of the
storage.
Communication
Communication has reached another level due to the integration of the Internet into the
activities of people. Social media including Twitter, Facebook, Instagram, messengers, and
video calling devices have made communication easier across countries. Although this has
created a global village, the worry of intrusion, relationship management issues, and
propaganda has escalated.
Economy
The World Wide Web (WWW) has affected the economy positively in that, it has created room
for online, telecommuting, and business economies. Hence businesses can now operate in any
part of the world and customers have better access to products. Transformation attracts caution
as well in that people lose their traditional jobs to technology in other industries and worries
arise about consumers’ data.
3
Education
The advent of online learning platforms and resources has transformed education by making it
easier for people to take up classes wherever and whenever they want. It has empowered a lot,
however, it has also created a gap in international society, where access to technology in some
situations helps to aggravate inequalities.
Social Issues
The Internet has acted as a catalyst in some social movements, enabling mobilization and
outreach. In the same manner, this phenomenon has also led to the emergence of anti-social
practices such as cyberbullying, hate speech, and division of society.
In conclusion, undoubtedly, the Internet is one of the foundations of modern society, however,
it presents both advantages and disadvantages. Yes, it has made many people and sources
connected and more readily available than ever before, but it has also brought along problems
such as exposure, social inequities, and social relations. It is essential to weigh these pros and
cons as societies progress into the digital scope.
6. Digital Etiquette
The term ‘netiquette’ refers to Digital Etiquette as a broad reference towards respectful
interaction when engaging in any form of online communication. Netiquette helps in creating
and upholding the standards for healthy communication in any environment, especially online.
1. Respectful Communication: As the golden rule suggests, one should treat others as he/she
would love to be treated. This entails politeness, avoiding abusive language, and accepting
varied views without hostility.
2. Positive Engagement: Avoid sending messages and making posts that are unnecessarily
harmful and false. Make your communications positive and honest.
3. Privacy Considerations: It is proper to respect other people’s confidentiality by not
divulging information without their consent. Seeking approval from individuals concerned
before circulating documents deemed personal.
”Digital etiquette” can be described as a collection of rules and behaviors one should observe
when communicating in an electronic format to remain respectful and responsible. This also
meant avoiding cryptic or abusive language, respecting others personally and their space as
well as their time, turning off all unnecessary distractions, especially spam messages and calls,
and acknowledging sources of information among others. Also, it is important to note that
without any physical presence or gestures, a person's voice can easily be misunderstood in
terms of its purpose and importance. Good digital etiquette is critical in ensuring that
individuals effectively interact and participate in online content within a healthy and positive
online space.
4
7. Network of Companies
The term network of companies refers to a set of interconnected firms striving to achieve a
common objective given that they represent different industries. Such a network can take the
form of joint ventures, strategic partnerships, or alliances and may include the exchange of
resources, knowledge, or technology.
Several reasons can be identified for the existence of a network of firms, such as promoting
innovation, expanding the customers’ reach in terms of location, reducing costs, and gaining
competitive advantage. Sufficient resources and capacities of each participant make it possible
to create such networks that facilitate efficiency and performance in the course of. Such
networks can be most effectively used in research and development or market responsiveness
and supply chain management. For example, within information technologies, software
companies may develop certain products jointly. Manufacturers of cars may join efforts to
develop electric vehicle technology. Healthcare providers may exchange information to
enhance health service quality.
Artificial intelligence (AI) is the theoretical capability of a machine to execute activities that
would otherwise require the intelligence of a human being. This includes activities such as
reasoning and solving complex problems, speech and language comprehension, pattern
recognition, and most importantly, decision-making. AI systems can either function based on
logical rules as in the case of expert systems or they can learn from experience in order to
provide better results than before.
Machine Learning (ML) is a branch of AI research that deals with Machine Learning
algorithms as well as statistical models in order for a computer to be able to perform a task
without explicit commands. In other words, instead of explicit codes being written for certain
issues, the systems and applications learn by themselves and eventually get better at what they
do with increased data.
All in all, the trends of both AI and ML are responsible for the progress of numerous
applications such as language processing, computer visualization, self-driving cars, and
forecasting, all of which impact sectors positively and also improve technology on a day-to-day
basis.
9. Cyber Security
Cyber security refers to the protection of systems, networks, and programs from cyber-crime.
Such attacks are often targeted at gaining access to, modifying, or destroying sensitive
information, making threats to the users (like through ransomware), or interfering with the
business performance of the organization. In general fact, the chief aim of cyber security is to
5
protect information and information systems from all possible threats. This includes the use of
technology, processes, and controls in defending such information systems from unauthorized
access and exploitation.
Cyber Security may keep your digital devices and information without the fear of any danger,
especially to individuals and organizations. With the growth of technological advancements,
one will need to develop new defense mechanisms against the strategies otherwise one would
be under threat of falling victim to cyber-crimes, hence there is continuous education and
learning because it is important in this profession.
6
4. Measured Service: Cloud systems automatically control and optimize resource usage at a
level regarding the service provided based on a built-in metering feature.