Approachs of database management system, Database Management System

Assignment Help:

 The Database Approach

In order to overcome the limits of a file system, a new approach was needed. Hence a database approach emerged. A database is a persistent collection of logically related data. The initial attempts were to give a centralised collection of data. A database has a self-describing nature. It has not only the data but also the full definition of the database structure and constraints, which are stored in a system catalog. A DBMS manages this data. It permits data sharing and integration of data of an organisation in a single database. DBMS controls access to this data and therefore needs to give features for data manipulation, database creation such as data value modification, data integrity , data retrieval and security etc. Let us explain some of the benefits of the database approac

The database approach has many benefits. Let us talk about these in more detail.

Reduction of Redundancies

In a file processing system, every user group keeps its own files resulting in a considerable amount of redundancy of the stored data. These results in wastage of storage space but more importantly might result in data inconsistencies. Also, the similar data has to be updated more than once resulting in duplication of effort. The files that represent the similar data may become inconsistent as some may be updated whereas others may not be.

In database approach data can be stored at a one place or with controlled redundancy under DBMS, which saves space and does not allow inconsistency.

 

Shared Data

A DBMS permits the sharing of database under its control by any number of users or application programs. A database belongs to the whole organisation and is shared by all authorised users (may not be the complete data, why?). This scheme can be best described with the help of a logical diagram. New applications can be built and added to the present system and data not at present stored can be stored.

Data Independence

In the file-based system, the explanations of data and logic for accessing the data are built into each application program making the program more dependent on data. A change in the structure of data may need alterations to programs. Database Management systems divides data descriptions from data. Therefore, it is not affected by changes. This is known as Data Independence, where details of data are not shown. DBMS gives an abstract view and hides details. For instance, logically we can say that the interface or window to data given by DBMS to a user may still be the similar although the internal structure of the data may be changed.

Improved Integrity

Data Integrity refers to consistency and validity of data. Data Integrity means that the data should be consistent and accurate. This is done by giving some constraints or checks. These are consistency rules that the database is not allowing to violate. Constraints may apply to data items within a record or relationships among records. For instance, the age of an employee can be between 18 years and 70 years only. While entering the data for the age of an employee, the database should check this. Therfore, if Grades of any student are entered, the data can be erroneously entered as Grade C for Grade A. In this situation DBMS will not be able to give any check as both A and C are of the similar data type and are valid values.

Efficient Data Access

DBMS utilises techniques to retrieve and store the data efficiently at least for unforeseen queries. A difficult DBMS should be able to gives services to end users, where they can efficiently find the data almost instantly.

Multiple User Interfaces

Since a lot of users having varying levels of technical knowledge use a database, a DBMS should be able to give a variety of interfaces. This contains -

A.     Programming language interfaces for application programmers,

B.     Query language for casual users,

C.     Codes and forms for parametric users,

D.     menu driven interfaces, and

E.   Natural language interfaces for standalone users, these interfaces do still not exist in standard form with commercial database.


Related Discussions:- Approachs of database management system

BCA, Ask qu. Write a XML with database with book details (Book ID, Title, A...

Ask qu. Write a XML with database with book details (Book ID, Title, Author, subject, published year, language, vendor, and price).estion #Minimum 100 words accepted#

Explain candidate key, Explain Candidate key? Candidate Key - A candi...

Explain Candidate key? Candidate Key - A candidate key is a minimal superkey, that can be used to uniquely identify a tuple in the relation.

Describe the different raid levels, Describe the different RAID levels.  Di...

Describe the different RAID levels.  Discuss the choices of the different RAID levels for different applications.          Ans:   There are several combinations of these approa

Abap/4 statements to access internal tables without header, What should be ...

What should be declared explicitly in the corresponding ABAP/4 Statements to access internal tables without header lines & why? Work Area. This is needed as the Work Area is

Define partial key and primary key, Define Partial Key and Primary Key ...

Define Partial Key and Primary Key A partial key, also known as discriminator, is the set of attributes which can uniquely identify weak entities that are related to similar o

What are the two statements regarding transaction, What are the two stateme...

What are the two statements regarding transaction? The two statements regarding transaction of the form are:- A)     Begin transaction B)      End transaction

Need for distributed database systems, Need For Distributed Database System...

Need For Distributed Database Systems A distributed database is a set of database kept on multiple computers that appears to applications as a one database. As a result, an app

Describe the four main ways of optimising disk block access, Describe the f...

Describe the four main ways of optimising disk block access. Ans: a. Disk  b. Non-volatile writes buffers c. File organization (Clustering) d. Log-based file system

What is meant by software and hardware raid systems, What is meant by softw...

What is meant by software and hardware RAID systems? RAID can be executed with no change at the hardware level, using only software modification. Such RAID implementations are

Explain sorted file with advantages, Explain sorted File with advantages? ...

Explain sorted File with advantages?  Sorted file The sort utility shall perform one of the subsequent functions: 1.Sort lines of all the named files together and write the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd