Explain How Potential Errors In The Design And Construction Of A Database

Improved Essays
D1 - Discuss how potential errors in the design and construction of a database can be avoided.
Accidental deletion of fields

When a database is being used you might find it easy to accidently delete data which could mean a lot of stress if it is something which is very valuable. One main way to avoid this would be to make sure that back-ups are made of the data, so whatever the matter the data will not be completely lost. Back-ups can be stored on anything like a memory stick or an external hard drive basically anywhere you feel is most safe. However, if data is deleted it can be very time costly because it will take a long time to rebuild also it is annoying when data becomes deleted and if you don’t have a back-up then you will take a lot of your own time and effort to retype the data if it is not saved this is why it is best to always save your work to a secondary location for example to another device. The best way to stop accidental deletion of something important in a database is to set the database to only the designer can manipulate it, so this means that only the person who created it can change and delete things which is good so anyone using the database without authorisation cannot manipulate or delete anything and the database is only readable for the non authorised person which is good because they can’t delete anything out of the database so this way it is safer and no risk of deletion. Incorrect data types Incorrect data type issues can occur when an unmatched data type is used within the database.
…show more content…
An example of this would be if a field called ‘fees’ in a table in the database, it will go wrong is a text value that is inserted instead of a numerical field value like two hundred instead of the numerical value of 200. This can be avoided as you can tell the database what to input so in this case you tell he database to only allow numerical values to be inputted within that field so this error won’t accrue again. You can do this by going into design view and changing the command from text to number so this will only allow you to input a number so the database in this case does all of the work for you. The database won’t allow anything inputted other than numbers which fixes the potential problems that might occur had it not been inforced. Renaming Incorrectly Renaming something or someone’s name incorrectly on a database can be a huge mistake to make I say huge because if it were to happen to be for a person’s bank account this could lead to a lot of complications this is because that person may not be allowed to enter that account, this is because they might be portending to be someone they are not which is classed as fraud and from this it can lead to arrest as it is a criminal offence. However, this might not be that persons fault who’s account it is. This is mostly done by a human error which could simply be a typo or the person inputting the name has simply misheard information. This means if the error isn’t spotted then it will not be sorted out and people won’t be able to use the account however this can be fixed by simply double checking the information given that is typed then and only then can they continue. Validation Validation

Related Documents

  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    o Description of this job:  Responsibilities to contain database administration, optimization, security,…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Pt2520 Week 2 Assignment

    • 517 Words
    • 3 Pages

    This week we learned lots about the decomposition of our relations we are creating in the database as well how to make the relations into normal forms, which there are three normal forms. I learned that there can be data that is redundant and therefore not useful for the database. This data has no integrity and can be misplaced and even confuse how the data can be used and retrieved. This type of problem must be avoided. I had a hard time understanding how the breaking down of one relation into two or more would help keep all the data from being redundant.…

    • 517 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Layla Micheli Monica Malt LVN 121 11/17/2017 What were the Contributing Factors to the problems in this Case? Describe them by category below. Equipment (design, availability and maintenance) The Pyxis machine is designed to calculate patient medications and doses accurately and should have alerted the nurse when the dosage was too high for a pediatric patient.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 2.3

    • 955 Words
    • 4 Pages

    One of the problems that occur frequently within our business is that clients have brought in bank statements with sheets missing. To solve this problem we have to get in touch with the client and tell them exactly what we are missing and tell them to send this on to us as soon as possible. 2.3 Give reasons for having support and feedback from others when problem…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Is3350 Unit 3 Case Study

    • 201 Words
    • 1 Pages

    Although we are confident that our project will meet all of the requirements for the class, the following are a few concerns that have been brought up when discussing this project: 1. Will the client provide enough information or access required to properly complete the project? a. Having direct access to business information for this project is not required but it would definitely help us in primarily meeting our requirements for the class. 2. Will we be able adapt to changes and properly meet project requirements if the client decides to change his opinion on the initially agreed upon scope?…

    • 201 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    College to Career: A recent survey commissioned by Bentley University in 2014 found that “compared with business decision-makers and corporate recruiters, high school and college students were far less likely to define preparedness in terms of personal traits or work ethic” (Chase, 2015). This means skills and experience rank high for college students when they evaluate preparedness. Unfortunately, the same survey found “thirty-seven percent of recent college graduates give themselves a grade of “C” or lower on their individual level of preparedness” (Chase, 2015).…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    US Honors Pre-WWI

    • 1380 Words
    • 6 Pages

    U.S. Honors Pre-WWI Name: Yash Parikh_________________ Score: ______ Read Chapter 8. Do further research on databases and books. Your textbook is a resource but cannot be used as a cited source. You must have a Works Cited page. 1.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Case Study Assignment – I Campbellsville University MASSIVE DATABASE MASTERING - MASTERCARD INTERNATIONAL Various affiliations are endeavoring to address the open entryways and limit challenges related with "huge data." Industry masters gage that the total volume of data is increasing at general interims and most by a wide margin of new data being delivered is prepared to go spaces. MasterCard Universal (www.mastercard.com) is not any more impossible to miss to think about the issues identified with monstrous databases. MasterCard has amassed a data circulation focus that is more than 100-terabytes in size. Insiders expect that it will create to more than 1.8 petabytes.…

    • 933 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    • The common data quality problem in healthcare performance measurement is: First, the lack of knowledge about the purpose of healthcare performance measurement. The purpose is to: - Assessment of current performance: need to find out the strength and weakness of current process - Demonstration and verification of performance improvement: evaluate and compare whether the improvement had made any difference. - Control of performance (Joshi, Ransom, Nash, & Ransom, 2014, p.135)…

    • 850 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Reginald, Eveyone uses statistic on a daily basis, however some individuals do not realize they are using statistic practices in solving there problems. I enjoyed reading your post. Moreover, how you where able to apply the knowledge of larger samples produce significat outcomes in your IT department. The data has proven to be critical in assisting you in making sound business decisions.…

    • 104 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    There are several ways to ensure that data integrity is being followed by using: constraints, primary and foreign keys, and removing duplicate data from the database. When merging two company’s data into one data warehouse, data integrity needs to be checked using a technique known as data scrubbing.…

    • 1257 Words
    • 5 Pages
    Superior Essays