StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

DBMS I - The Role of Database Administrators - Research Paper Example

Cite this document
Summary
In fact, they run and compete in this ever-increasing competitive world on the basis of data and information. In this scenario, they use databases to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
DBMS I - The Role of Database Administrators
Read Text Preview

Extract of sample "DBMS I - The Role of Database Administrators"

THE ROLE OF DATABASE ADMINISTRATOR The Role of Database Administrator Affiliation Without a doubt, the majority of business organizations heavily depends on digital information and technological data resources. In fact, they run and compete in this ever-increasing competitive world on the basis of data and information. In this scenario, they use databases to store and manage this huge amount of data. In addition, managing databases is a necessary job for every business which deals with the processes of storing, controlling or distribution of data.

In this scenario, extremely qualified and skillful professionals known as database administrators are required to carry out this task. Additionally, a database administrator (DBA) is an information technology (IT) expert whose particular task is to design and manage database systems and put into practice efficient ways to organize and store data. In a lot of circumstances, database administrators have to shift data from out-dated systems into new systems (DegreeFinders.com, 2011; TechTarget, 1999).

In addition, the database administrator is frequently available and required to work when required. This situation carries a huge accountability. Additionally, a DBA is responsible for protecting the database for example he implements the business internet access inside the corporate. In this scenario, he needs to implement policies and security measures that no one could be able to access an illegal website at the workplace such as Facebook. Moreover, every database has one or more administrators who are accountable for upholding the entire characteristics of the security strategy.

However, if the business database system is not large in size, the database administrator can also perform the tasks of the security manager. Though, if the database system is huge, a particular person or group of people can have tasks partial to those of a security administrator (Vennapoosa, 2005; Alapati, 2005; Newcombe, 2013). ReferencesAlapati, S. R. (2005). Expert Oracle Database 10g Administration. A Press.DegreeFinders.com. (2011). How to Become a Database Administrator. Retrieved February 19, 2013, from http://www.

degreefinders.com/education-articles/careers/how-to-become-a-database-admin.htmlNewcombe, L. (2013). Database administration security strategy. Retrieved February 18, 2013, from http://www.computerweekly.com/opinion/Database-administration-security-strategyTechTarget. (1999, March). database administrator (DBA). Retrieved February 23, 2013, from http://searchsqlserver.techtarget.com/definition/database-administratorVennapoosa, C. (2005, December 07). Database Administrator Roles and Responsibilities.

Retrieved February 23, 2013, from http://geekswithblogs.net/freetraining/archive/2005/12/07/62434.aspx

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“DBMS I - The Role of Database Administrators Research Paper”, n.d.)
DBMS I - The Role of Database Administrators Research Paper. Retrieved from https://studentshare.org/information-technology/1615998-dbms-i-the-role-of-database-administrators
(DBMS I - The Role of Database Administrators Research Paper)
DBMS I - The Role of Database Administrators Research Paper. https://studentshare.org/information-technology/1615998-dbms-i-the-role-of-database-administrators.
“DBMS I - The Role of Database Administrators Research Paper”, n.d. https://studentshare.org/information-technology/1615998-dbms-i-the-role-of-database-administrators.
  • Cited: 0 times

CHECK THESE SAMPLES OF DBMS I - The Role of Database Administrators

Application Development and Databases

hellip; The granularity of such access control can be on different levels, like on directories or folder level, database level, table level, and even on individual record (tuple) and data field level. Ans: Access control determines whether access to a resource is acceptable.... The Account level: At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.... However, complex role based access control conditions are difficult to implement....
17 Pages (4250 words) Essay

Distributed Database System Design

A Distributed database System facilitates various applications to have an easy access to the data from local as well as remote databases.... Client-server… rchitecture is used by the Distributed database Systems, whereby the database server is the Oracle software that manages the database, and the client may be an application that requests information from the database server.... Each computer in this network consists of a node which The client can access information by directly or indirectly connecting to the database server....
10 Pages (2500 words) Essay

DBMS Support and Security

database security has been overlooked in… It is often not possible to put a price tag on the stored data but the organization knows that it is its most valuable asset.... As mentioned earlier, most organizations have security strategies, but miss out on database security or do not adequately address the issue.... Proactive database security management and planning can save organizations significant amounts of money and reduce the overall exposure to risk....
5 Pages (1250 words) Research Paper

BDX Company Description

The objective of the company is to sell oil and natural gas for significantly more than the cost incurred in finding, developing, and producing it.... The vision of the company is to become the leading… The company also seeks to create subsidiaries in other nations and expand its businesses. BDX is a small group composed of four partners....
8 Pages (2000 words) Research Paper

Database Administration -2

However, depending on the experience and organization the role and… The following list provides all the required skills of the database administrator for information system database of large organizations (Kioskea, The database administrator would have the above given skills in order to perfectly perform his/her roles and responsibilities to manage the information system database in an organization.... The database Administrator is responsible for establishing effective control over the database, moreover, the performance/efficiency, integrity or correctness and security of an information system database....
4 Pages (1000 words) Essay

RCP 3 Chapter 3

This measure is appropriate because a larger number of malicious users of database systems are found among this user category (Meghanathan & CNSA, 2010).... The principle dictates that each module within an IT environment (such as a user) should be capable of… Besides, the principle also restricts the level of use of administrative credentials among administrators just to the administrative tasks....
3 Pages (750 words) Coursework

The Term Knowledge Worker in The Context of Todays Business World

In this context, the role of the Knowledge Worker becomes of much relevance.... The aim of the essay "The Term Knowledge Worker in The Context of Today's Business World" defines the nature of the knowledge worker in the business.... Furthermore, the essay would provide an investigation of the contributions of average knowledge worker effectively for the company....
12 Pages (3000 words) Essay

Types and Categories of Threats to IT Systems

The paper "Types and Categories of Threats to IT Systems" states that CISM is an internationally recognized certification.... This certification was specifically designed for information security professionals who work is to oversee the day to day running of the system.... hellip; CSSLP is the newest type of certification that ensures security is maintained throughout the software lifecycle....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us