Share
Explore BrainMass

Five software components of DBMS

1. Should organizations be left to police themselves with respect to providing access to information or should the goverment impose privacy legislation?

Please answer this question with respect to
(1) Customer information shared by organizations,
(2) Employee information shared within a specific organization, and
(3) Business information available to customers.

2. Five important software components of a DBMS are: DBMS engine, the data definition, data manipulation, application generation, and data administration subsytem:

a. Which of those are most and least important to users of a database?

b. Which of those are most and least important to technology specialists who develop data application?

c. Which of those are most and least important to the chief information officer (CIO)?.

Solution Preview

1. Should organizations be left to police themselves with respect to providing access to information or should the government impose privacy legislation?

Please answer this question with respect to (1) Customer information shared by organizations, (2) employee information shared within a specific organization, and (3) business information available to customers.

Organizations should not be allowed to police themselves, but government should impose privacy legislations for each of the following: 1) Customer information shared by organizations, (2) employee information shared within a specific organization, and (3) business information available to customers.

With regards to Customer information shared by organizations, information about the customer may be with an organization for different reasons. Making deliveries, providing services, receiving payments from customers, and credit card information, each gives private information about the customer to the organization. The organization should be disallowed to share this information with anyone. The information should not be disclosed to telemarketing firms, mailing lists, or any other person. The reason is that the information can be misused. For example, credit card information may be used to commit credit card fraud.

Employee information ...

Solution Summary

This posting gives you an in-depth insight into Five software components of DBMS

$2.19