Preview

End User

Good Essays
Open Document
Open Document
584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
End User
End user database
Description
A simple, searchable online database made up of structured records whose content is generated by the participants. The records normally contain personal information relating to a set of individuals. The database is self-perpetuating in that in order to access it, participants are usually made to submit their own information. Usually incorporates instant messaging capability for connecting participants based on a match.

Purpose
The purpose of this method is to ‘find’ others with matching needs or take control over your data. For example, matching interests in order to connect or trade. Participants benefit from being able to use a single touch point for identifying matches and are able to compare offers from a pool of potentially similar records. Improves the likelihood of success through pre-vetting.
Strengths
* Can offer anonymity while retaining high levels of personal detail and control over how these are shared (i.e. citizen held records). * May include advanced testing to determine compatibility or matches between participants and records. * Useful research tool, e.g. for determining average prices.
Weaknesses
* There is often a charge to access the database. * Sometimes there can be a stigma associated with being on a private database (e.g. if participants are looking to date). * Can soon become out of date and usefulness out of perspective if inactive records are not deleted.

End users are those persons who interact with the application directly. They are responsible to insert, delete and update data in the database. They get information from the system as and when required.
Types:
a) Direct users: Direct users are the users who se the computer, database system directly, by following instructions provided in the user interface. They interact using the application programs already developed, for getting the desired result. E.g. People at railway reservation counters, who directly interact

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | This is customer support and technical support, and the people who do the customer billing. They are also the designers of the sites and responsible for creating sites that match the needs of the customers.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    End User – Are the same as end users in the present day. The end user is not aware of how the network is constructed and interacts with the SP the user is subscribed to.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Dbm 380 Week 1

    • 1191 Words
    • 5 Pages

    Database environments are very important in today’s industries. In selecting an organization that will need a database, I choose Smith Consulting. Smith Consulting will need a database to track their consulting staff, each staff member’s skill sets, and what projects they will be working on. This document will provide information on the following area’s listed below:…

    • 1191 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Bus/660 Week 1

    • 434 Words
    • 2 Pages

    End users may be anyone who use information systems or the information which is produced by the system, this may include clients/customers, salespeople, clerks, or anyone in management. Information obtained in business should be treated as confidential. As a responsible end-user of this information any worker or individual who has access to the information, no matter what their position in the company, should respect and uphold the confidentiality of the information. It is their ethical responsibility as well as their duty. As a manager we should always consider how the information is used, not only by our workers but also how we use the information. Information systems are available to the business to use as tools to meet the goals of the organization, and not to be…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 2: Portfolio Work

    • 4787 Words
    • 20 Pages

    * Permits an individual who uses services to find out from any person or organisation whether information is being kept about them, and if they do, to be told the type of information kept and the purposes for which it is kept”.…

    • 4787 Words
    • 20 Pages
    Good Essays
  • Better Essays

    In the following paragraphs LTA will discuss the database architecture briefly and primary keys, which play a vital role in an Entity-Relational Database. The discussions of the different types of mistakes that are made in the design phase that led to a poor database design are also discussed. Mistakes include the lack of careful planning, proper normalization of data, poor naming conventions, lack of sufficient documentation and extensive testing. The ERD for the database will be revealed along with the choice of the program to manage the database and allow for versatility for various platforms, applications, and features.…

    • 2033 Words
    • 9 Pages
    Better Essays
  • Good Essays

    The people involved in the database system are the system administrator, data modelers, database administrator, system analysts, and end users. The system administrator will oversee the general operations of the database. The database modelers will create the design of the database. The system analysts will create GUI based input screens, reports, and procedures which end users will use to modify the database, and retrieve the needed data.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ‘Confidentiality’ can be maintained by remaining aware and conscious of the information you share or discuss.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Application Software

    • 425 Words
    • 2 Pages

    2) Spreadsheet; provides a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. I.e., Microsoft Excel, IBM Lotus 1-2-3, Google Spreadsheet, Apple Numbers and Sun Calc.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Confidentiality is a human right. Some people are really personal and keep themselves to themselves, while others tell everyone and the world about themselves.…

    • 1019 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Gives individuals the right to know what information is held about them and provides a framework to ensure the personal information is handled properly.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    GBDA 303 Chapter 7

    • 366 Words
    • 4 Pages

    • There are several privacy issues related to the use of online / computer resources.…

    • 366 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Rooney, Ben. "The Debate Over Online Anonymity." The Wall Street Journal. N.p., 16 Jan. 2013. Web. 4 May 2013.…

    • 3516 Words
    • 15 Pages
    Best Essays
  • Good Essays

    Auchards Claim

    • 470 Words
    • 2 Pages

    The information people put on display on their social networking profiles, is not up to the sites but the individual. Sites like Facebook let the user choose whether they want to display age, race, location, and occupation. The “publicness” as Auchard refers, is up to the individual, as the site has options to protect the user, the choice remains in the individuals hands, “but while policy makers ponder how to bolster online anonymity, social network users are more concerned about deciding what to recall about them next,’’ says Auchard. It is choice if people want to make very personal information public or private.…

    • 470 Words
    • 2 Pages
    Good Essays