What is data redundancy and which characteristics of the file system can lead to it?

1 Answers

What is data redundancy and which characteristics of the file system can lead to it?

Anonymous answered

Data redundancy is symptomatic of afile system, in its inability to represent or manage data. It may also be the result of poorly designed databases that allow the same data to be kept in different locations.

comes to data independence a condition in which data access is unaffected by changes inthe physical data storage characteristics.A database system usually contains a lot of data in extension to users’ data.For example, it saves data about data, known as metadata, to discover and retrieve dataeasily. It is difficult to change or update a set of metadata once it is saved in the database.But as a DBMS grows, it demands to change over time to satisfy the necessities of theusers. If the entire data is dependent, it would enhance a tedious and complexjob[CITATION Tut \l 1033 ].When modifications to the data’s characteristics can be made without requiringmodifications to be made to the application connected with that data i.e. these data areindependent of the application.Inside a file system, each file of data requires its own application to organize the data,however, ss a result file system lack data independence.1.Logical Data IndependenceIt stores information about how data is managed inside.

  1. All Textbook Solutions
  2. Database Systems: Design, Implementation, & Management (13th Edition)
  3. What is data redundancy, and which characteristics of the file system can lead to it?

Chapter 1, End of Chapter, Review Questions, Exercise 2

What is data redundancy, and which characteristics of the file system can lead to it?

Verified Answer and Explanation

Explanation

a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac mag

Verified Answer

et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus effi

Related Exercises

Similar Documents

Premium Essay

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a......

Words: 2493 - Pages: 10

Premium Essay

Chapter 1 Review Questions

...CHAPTER 1 SOLUTIONS 1-2 There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject to government auditing regulations also purchase various forms of auditing and assurance services. 1-3 There is a natural conflict of interest in the agency relationship between an owner and manager because of differences in the two parties’ goals. For example, the manager may spend funds on excessive personal benefits or favour entity growth at the expense of stockholders values. If both parties seek to maximize their own self-interest, it is likely that the manager will not act in the best interest of the owner and may manipulate the information provided to the owner accordingly. 1-7 Audit risk is defined as the risk that ‘the auditor expresses an inappropriate audit opinion when the financial statements are materially misstated’ (ISA 200). Materiality: ‘Misstatements, including omissions, are considered to be material if they, individually or in the......

Words: 857 - Pages: 4

Premium Essay

Business Management Chapter 1 Review Questions

...Chapter 1 – Subject Review Questions 1. I have worked for my current boss, Mr. Ford, in the field of youth social services for nearly a decade. Due to his leadership, I have remained with the agency throughout tumultuous periods. He has always challenged his employees to strive for quality of service at the greatest speed possible. Mr. Ford organizes employees to create a dynamic workforce capable of adapting to changes affected by the macroenvironment. In an effort to continue to win Requests for Proposal bids, Mr. Ford has consistently operated an efficient service program that is cost competitive with other service providers and fiscally sustainable. 2. One of the greatest ways that the Internet impacts my life on a daily basis involves how it has allowed knowledge to be shared instantaneously and with increasing accuracy. I am able to receive information about events and interests in real time. Instead of having to search libraries for dated information, as I did as a youth, I can find information that is relevant and current from trusted sources. Now it is possible to access peer-reviewed publications from esteemed institutions. Globalization, in conjunction with the Internet, has provided access to news and information from around the world. I enjoy reading articles from the perspectives of those of other nationalities and now, thanks to Google Translate, I can read articles that were written in foreign languages. 3. I have always admired Google for......

Words: 542 - Pages: 3

Premium Essay

Project Management Chapter 1 Review Questions

...Chapter 1: Review Questions 1. What is a project? It is a temporary effort intended to create a unique product, service, or result. 2. What is project management? It is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. 3. How are projects different from ongoing operations? Projects are temporary and unique while operations are continuous. Operations are an ongoing process to ensure that an organization continues to work effectively. For instance, operation managers can often use checklists to guide much of their work, but project managers rarely have checklists that identify all of the activities they need to accomplish. 4. What types of constraints are common to most projects? Time and budget constraints are common to most projects for clients, and the amount of resources available and the decision maker’s risk tolerance are constraints from an internal point of view. 5. Which deliverable authorizes the project team to move from Selecting and Initiating to Planning? The approval of a charter 6. At what stage of a project life cycle are the majority of the “hands-on” tasks completed? At the execution stage 7. During which state of the project life cycle are loose ends tied up? During the Closing stage 8. What are the five process groups of project management? Initiating, planning, executing, monitoring and controlling, and closing 9. Which process group...

Words: 868 - Pages: 4

Premium Essay

Chapter 4 Review Questions 1-5

...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share......

Words: 3229 - Pages: 13

Premium Essay

Database Design Chapter 1 Review Questions

...1. a. Data – Raw facts b. Field – An alphabetic or numeric character or group of characters that defines a characteristic of a person, place, or thing. c. Record – A collection of related fields. d. File – A named collection of related records 2. Data redundancy occurs when the same data are stored in multiple places unnecessarily. Have more than one incorrect copies of information can cause it. 3. Data independence exists when you can change the data storage characteristics without impeding the program's ability to access the data. It is lacking because of how it has to tell the computer what to do, and how to do it. Causing the program to have much more lines of code than should be needed. 4. It is a software tool that makes it possible to organize data in a database. Its functions are data dictionary management, data storage management, data transformation and presentation. 5. Structural independence exists when you can change the file structure without affecting the application's ability to access the data. If it did not exist, any change to a files structure would require several extra steps for every single record in the file. 6. Data is raw facts that have not been processed. Information is data that has been processed and given context. Databases help to organize the manipulation of data to create information by providing an organizational structure that makes relationships and connections between data explicit. 7. The DBMS serves as the......

Words: 480 - Pages: 2

Premium Essay

Chapter 10 Exercises Review Questions 1-10

...Chapter 10 Exercises Review Questions 1-10 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Then, Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is important to consider in implementing systems that are volume related, such as transaction processing systems. 2. When selecting an architecture, what items should a systems analyst consider as part of the overall design checklist? Before selecting a system architecture, the analyst must consider the following issues: Enterprise resource planning (ERP) Initial cost and (TCO) Scalability Web integration Legacy system interface requirements Processing options Security issues 3. What is enterprise resource planning (ERP)? What is supply chain management? Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easyintegration of future applications, including in house software and commercial packages. ERP also can extend to suppliers......

Words: 404 - Pages: 2

Premium Essay

Caff 321 Chapter 1-4 Review Questions

...MICHELLE LU - 011810966 CAFF 321 CHAPTER REVIEW QUESTIONS (1-4) Chapter 1 1. Why does Daniel Gilbert, author of Stumbling on Happiness, say that experiences might bring more satisfaction than durable goods? Do you agree or disagree? Although happiness is not easily defined and it really depends on who you ask and what their degree of happiness is in their life, Gilbert the author of Stumbling on Happiness, explains that experiences might bring more satisfaction than that of durable goods.  With this he is simply stating the fact that happiness is dependent the things you do in life and not the objects. It is the time that you share with friends and family what makes life meaningful and that creates happiness. All the objects in the world that money can buy is meaningless when you don't have anyone to share it with. 2. Harvard economists Alberto Alesina and Paolo Giuliano say that strong family ties imply more reliance on the family as an economic unit that provides goods and services and less on outside institutions such as those found in the market place and government.  Why does household production (doing things together or making things within the home) activity have such an impact on family ties?  Can you give an example from your own family?   Not completely sure if I am answering this question correctly but basically the way I see things, I must say I agree with both economists who say that strong family ties imply more reliance on the family as an economic unit......

Words: 2837 - Pages: 12

Premium Essay

Principles of Security 5th Edition Chapter 1 Review Questions

...Review Questions 1. What is the difference between a threat agent and a threat? A threat agent is a specific component that represents a danger to an organization’s assets. And a threat is an object, person or entity that represents a constant danger. 2. What is the difference between vulnerability and exposure? Vulnerability is a weakness is a system that leaves the system open to attacks. Exposure is the known vulnerabilities that make a system weak and open to attacks without protection. 3. How is infrastructure protection (assuring the security of utility services) related to information security? If the infrastructure of a network is exposed and accessible to anyone this leaves the network vulnerable to damage both to hardware and software. The infrastructure must be protected to allow only authorized user to have access to the network. 4. What type of security was dominant in the early years of computing? Physical security. 5. What are the three components of the C.I.A. triangle? What are they used for? Confidentiality, Integrity and availability are the three components of the C.I.A triangle. They are used as a standard for computer security. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? The C.I.A triangle provides a basic standard of what is needed to keep information secured. 7. Describe the critical characteristics of information. How are they used in the study of computer security?......

Words: 829 - Pages: 4

Premium Essay

Gmat Syllabus

..................... 37 - 42 Try More IR.................................................... 43 Try More Essay............................................. 44 Page 1 of 44 Bird's Eye View of Class Attended In Class Quant Verbal Topics & Methods Sentence Correction Critical Reasoning Reading Comprehension Other IR / Essay Preparing for the GMAT Session 1 □ DS Methods & Computation Methods 2 □ FDPs 3 □ Algebra 1 4 □ Algebra 2 5 □ Word Probs 1 6 □ Word Probs 2 7 □ Geometry 8 □ Num Props 1 9 □ Num Props 2 Subj-Verb Parallelism Pronouns Arg. Structure Assumption Modifiers Verbs Evaluate Comparisons Str/Weaken Idioms etc. Evidence Short Long IR Basics Essay Review Assess Gameplan Build "Do This" Checklist At Home Quant FoM Odds After Session 1 2 3 4 5 6 x 7 x 8 x 9 x x x □ □ □ □ □ □ □ x x x x □ □ □ □ □ □ □ □ □ x x □ □ □ □ □ □ □ □ □ x x □ □ □ □ □ □ □ x x □ □ □ □ □ x x x x Strat Guide Read Odds OG PS DS □ □ □ □ □ □ x x x x □ □ □ □ □ □ x x □ □ □ □ □ □ x x □ □ □ □ x x Verbal SC Strat Guide Read OG SC RC Strat Guide Read OG RC CR Strat Guide Read OG CR □ □ x x x x □ □ □ x □ □ □ x x x □ □ x □ □ □ x x x Other Roadmap CAT IR / Essay Other Read Do Do Do □ □ #1 x...

Words: 10013 - Pages: 41

Premium Essay

International Business

...LL.M INTERNATIONAL BUSINESS TRANSACTIONS LAW 5901 Kazakhstan Institute of Management, Economics, and Strategic Research School of Law REQUIRED TEXT: International Business and Trade [4th ed.] Ricky W. Griffen, Michael W. Pustay COURSE MATERIALS: http://www.eilfe.com/online-courses/kimep.html International Business Transactions REQUIRED TEXT: International Business and Trade [4th ed.] Ricky W. Griffen, Michael W. Pustay COURSE MATERIALS: http://www.eilfe.com/online-courses/kimep.html International Business Transactions KIMEP SUMMER I 2010 COURSE NUMBER: LAW5901 COURSE NAME: INTERNATIONAL BUSINESS TRANSACTIONS CLASS TIME: MTWTHF 20:15 – 21:45, HALL, NEW BUILDING FINAL EXAM: WEEK SIX; Time and date TBA KIMEP SUMMER I 2010 COURSE NUMBER: LAW5901 COURSE NAME: INTERNATIONAL BUSINESS TRANSACTIONS CLASS TIME: MTWTHF 20:15 – 21:45, HALL, NEW BUILDING FINAL EXAM: WEEK SIX; Time and date TBA Instructor: Prof. Dr. John JA Burke BA, JD, Ph.D. E-Mail: Office: 119, New Building Hours: Appointment Only Instructor: Prof. Dr. John JA Burke BA, JD, Ph.D. E-Mail: Office: 119, New Building Hours: Appointment Only INTRODUCTION AND OVERVIEW Joseph E. Stiglizt, the winner of the 2001 Nobel Prize in Economics, states, “We have a process of “globalisation” analogous to the earlier processes in which......

Words: 2119 - Pages: 9

Premium Essay

Skfaifh

... |3442 6943 | | |Mr. Kennix Chiu |Room: 5416 |3442 7585 | | |Ms. Maria Wong |Room: 5423 |3442 9762 | | Course Aims: Provide students with some fundamental concepts of modern financial management theory relevant to making operating and investment decisions. The course also introduces some of the core financial management and decision making techniques used in the business world. Course Intended Learning Outcomes (CILOs) Upon successful completion of this course, students should be able to: 1. Describe the financial environment, agency costs, the goals of the participants, and the basic structure of Hong Kong financial and banking systems 2. Explain working capital policies and apply working capital management tools 3. Apply the concepts of risk-return trade-off and time value of money in financial management decisions, and in stock, bond, and asset valuation; 4. Describe the meaning & implications of efficient capital markets; 5. Evaluate competing sources, uses and costs of finance available to corporations in corporate financing decisions; 6. Evaluate corporate investment decisions using capital budgeting techniques with consideration to ethics and corporate governance. Academic Honesty (Extracted from...

Words: 1218 - Pages: 5

Premium Essay

Financial Management

... |3442 6943 | | |Mr. Kennix Chiu |Room: 5416 |3442 7585 | | |Mr. Peter Yip |Room: 5406 |3442 7903 | | Course Aims: Provide students with some fundamental concepts of modern financial management theory relevant to making operating and investment decisions. The course also introduces some of the core financial management and decision making techniques used in the business world. Course Intended Learning Outcomes (CILOs) Upon successful completion of this course, students should be able to: 1. Describe the financial environment, agency costs, the goals of the participants, and the basic structure of Hong Kong financial and banking systems 2. Explain working capital policies and apply working capital management tools 3. Apply the concepts of risk-return trade-off and time value of money in financial management decisions, and in stock, bond, and asset valuation; 4. Describe the meaning & implications of efficient capital markets; 5. Evaluate competing sources, uses and costs of finance available to corporations in corporate financing decisions; 6. Evaluate corporate investment decisions using capital budgeting techniques with consideration to ethics and corporate governance. Academic Honesty (Extracted from...

Words: 1220 - Pages: 5

Free Essay

Haha

...Date | Week | Topics | 30/11/14-6/12/14 | Week 1 | Ice Breaking & Chapter 1a ( Introduction To Management) & Chapter 1b (Evolutions Of Management Thought)-Ice Breaking Session-Inform about entrance & exit survey-Provide information regarding Lesson Plan, Assessment and Quizzes-Tutorial Activity: * Discuss about 4 process of management that have been practised as a student in their daily life or during an event that they involved. * Share the process by a short and simple presentation. * Answer past year exams question on Ch2 (Quiz 10 minutes)-Students need to draw mind map for Chp 1 on white board and do short review -Blended Learning: Share how a company involved in POLC for an event for the organization | 7/12/14-13/12/14 | Week 2 | Chapter 2 (Planning)-Students need to draw mind map for Chp 2 on white board and do short review -Tutorial Activity: * Answer past year exams question on Ch2(Quiz 10 minutes) * If planning is important, why do some managers choose not do it? Submit a short presentation about planning barriers and the benefit of the planning.-Blended Learning:Students are request to share their planning that they have prepare to study in UiTM | 14/12/14-20/12/14 | Week 3 | Chapter 3 (The Nature Of Decision Making)-Students need to draw mind map for Chp 3on white board and do short review -Tutorial Activity: * Answer past year exams question on Ch3 (Quiz 10 minutes) * Form a group of 4 persons. Students need to discuss......

Words: 1251 - Pages: 6

Premium Essay

Annual Report

...the questions in the annual report project. If you did not purchase the workbook you are not permitted to use this template. INTRODUCTION TO THE CORPORATE ANNUAL REPORT: A Business Application with IFRS Content 3rd edition Copyright 2011 by Applied Accounting Analytics. All rights reserved. Reproduction or translation of this book beyond that permitted by the applicable copyright law without Applied Accounting Analytics’ permission is prohibited. Requests for permission to reprint or for further information should be directed to or . ISBN: 978-0-9841839-2-0 To be completed by the student and submitted with the completed annual report project according to your instructor’s requirements. Complete the following before you submit your assignment. This step is required to validate your compliance with sections 107 or 108 of the 1976 United States Copyright Act.  1. Remove the front cover of the workbook and identify: Student Name: Wesley Franklin | Term: First Term |   Selected Company: Pepsico | Instructor: Brandy Havens | 2. Print your completed electronic template.   3. Attach the following: * This page completed with all required information. * Completed Word template. Template boxes expand as you input responses. Adjust page breaks as necessary to submit a professional representation of your work. Chapter 1 - Introduction Select a Company and Gather Documents Chapter 1:......

Words: 6378 - Pages: 26

What is data redundancy explain?

Data redundancy refers to the practice of keeping data in two or more places within a database or data storage system. Data redundancy ensures an organization can provide continued operations or services in the event something happens to its data -- for example, in the case of data corruption or data loss.

What is redundancy in file system?

Data redundancy is when multiple copies of the same information are stored in more than one place at a time. This challenge plagues organizations of all sizes in all industries and leads to elevated storage costs, errors, and compromised analytics.

What factors might lead to redundant data across multiple files?

Data redundancy Inconsistency in data format. The same information being kept in several different places (files) Data inconsistency, a situation where various copies of the same data are conflicting, wastes storage space and duplicates effort.

What is redundancy in DBMS and what are the problems caused by redundancy?

Redundancy in DBMS is having several copies of the same data in the database. Redundancy in DBMS occurs when the database is not normalized. Redundancy causes insertion, deletion, and updation anomalies. Redundancy can be avoided by normalizing the database, maintaining master data, etc.