logo

Business Information System

   

Added on  2023-03-17

5 Pages1063 Words70 Views
Running head: BUSINESS INFORMATION SYSTEM
BUSINESS INFORMATION SYSTEM
(Student Name)
(Tutor Name)
(Course Name)
(Date)

BUSINESS INFORMATION SYSTEM 2
Introduction
Tour Down under is one of the cycling race in Adelaide is South Australia. The cycling
race was established in 1999 after the support of John Olsen as a gap left by Australian Grand
Prix. The first race was held in 1999 under the banner Santos Tour Down. The race has always
been held in the middle of Australian summer. Some of the features of the race is incorporating
flat and hills sections over a six-day period. It is also important to note that the race, it is a 11-
day event which brings UCI WorldTour professional male cycling teams who are supposed to
race on the streets of Adelaide. One of the advantages of Santos Tour Down under usually
provides an important contribution to the state tourism. It also showcases the attraction of South
Australia. Currently Santos Tour Down is managed and owned by events South Australia which
is a division of the South Australian Tourism Commission (About the santos tour down under,
2018).
Santos Tour Down database issues
It is important to note that data plays a very important role to the functioning and
operations of Santos Tour Down. To accommodate the racing events which is an exponentially
growing data, South Australian Tourism Commission started using database management
systems for ease of data storage and better management of the organizational database. One of
the common issues with any database set-up regardless of the organization set-up, is deployment
failures. South Australian Tourism Commission tend to have preliminary tests before deploying
the database but they often fall short in testing it properly. Another common issues is privilege-
based issues; after a database is set-up it is very essential to give the required access or privileges
to the applications and to the users of the database. Most of the database are often resulted by
privilege-based issues like legitimate privilege abuse, unused privilege-based, and privilege

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Event Legacy Proposal
|10
|643
|106