Approachs of database management system, Database Management System

 The Database Approach

In order to overcome the limits of a file system, a new approach was needed. Hence a database approach emerged. A database is a persistent collection of logically related data. The initial attempts were to give a centralised collection of data. A database has a self-describing nature. It has not only the data but also the full definition of the database structure and constraints, which are stored in a system catalog. A DBMS manages this data. It permits data sharing and integration of data of an organisation in a single database. DBMS controls access to this data and therefore needs to give features for data manipulation, database creation such as data value modification, data integrity , data retrieval and security etc. Let us explain some of the benefits of the database approac

The database approach has many benefits. Let us talk about these in more detail.

Reduction of Redundancies

In a file processing system, every user group keeps its own files resulting in a considerable amount of redundancy of the stored data. These results in wastage of storage space but more importantly might result in data inconsistencies. Also, the similar data has to be updated more than once resulting in duplication of effort. The files that represent the similar data may become inconsistent as some may be updated whereas others may not be.

In database approach data can be stored at a one place or with controlled redundancy under DBMS, which saves space and does not allow inconsistency.

 

Shared Data

A DBMS permits the sharing of database under its control by any number of users or application programs. A database belongs to the whole organisation and is shared by all authorised users (may not be the complete data, why?). This scheme can be best described with the help of a logical diagram. New applications can be built and added to the present system and data not at present stored can be stored.

Data Independence

In the file-based system, the explanations of data and logic for accessing the data are built into each application program making the program more dependent on data. A change in the structure of data may need alterations to programs. Database Management systems divides data descriptions from data. Therefore, it is not affected by changes. This is known as Data Independence, where details of data are not shown. DBMS gives an abstract view and hides details. For instance, logically we can say that the interface or window to data given by DBMS to a user may still be the similar although the internal structure of the data may be changed.

Improved Integrity

Data Integrity refers to consistency and validity of data. Data Integrity means that the data should be consistent and accurate. This is done by giving some constraints or checks. These are consistency rules that the database is not allowing to violate. Constraints may apply to data items within a record or relationships among records. For instance, the age of an employee can be between 18 years and 70 years only. While entering the data for the age of an employee, the database should check this. Therfore, if Grades of any student are entered, the data can be erroneously entered as Grade C for Grade A. In this situation DBMS will not be able to give any check as both A and C are of the similar data type and are valid values.

Efficient Data Access

DBMS utilises techniques to retrieve and store the data efficiently at least for unforeseen queries. A difficult DBMS should be able to gives services to end users, where they can efficiently find the data almost instantly.

Multiple User Interfaces

Since a lot of users having varying levels of technical knowledge use a database, a DBMS should be able to give a variety of interfaces. This contains -

A.     Programming language interfaces for application programmers,

B.     Query language for casual users,

C.     Codes and forms for parametric users,

D.     menu driven interfaces, and

E.   Natural language interfaces for standalone users, these interfaces do still not exist in standard form with commercial database.

Posted Date: 3/5/2013 4:30:16 AM | Location : United States







Related Discussions:- Approachs of database management system, Assignment Help, Ask Question on Approachs of database management system, Get Answer, Expert's Help, Approachs of database management system Discussions

Write discussion on Approachs of database management system
Your posts are moderated
Related Questions
Consider the following relational scheme: R (a,b,c,d,e,f) and its corresponding set of FDs {d→ a, be → c, ac → e, b → f, f → d, a → c}. a. Is the following decomposition i) non

Question 1 Suppose the employee employee id, name, designation, salary, attendance and address of any employee has to be stored in a database. You can store these data in a sequen

What is Multivalued Attribute? Multivalued Attribute - Multivalued attribute might have more than one value for an entity. For instance, PreviousDegrees of a STUDENT.

What are the different integrity constraints in RDBMS? The various integrity constraints in RDBMS are as: Primary Key: primary key is a grouping of one or more attributes

describe all the tables you have created. ?get table_name, status, num_rows, user_stats in user_tables system view ?get table_name, constraint_name, constraint_type in user_constr

Two-way Associations Mostly, associations are travel in both directions, although not usually with same frequency. There are three approaches for the implementation. In

What is database Trigger? A database trigger is a PL/SQL block that can explained to automatically execute for insert, update, and delete statements against a table. The trigge

How to create a biological database based on viruses. How to decide which attribute should be there in the table and schema? How to identify the primary keys, foreign keys, domain,

We are looking to find someone to prepare a database which improves upon the one we are using at present. The present database will be found here: Click on filter options and yo

What is a Built-in A notation of identity is built-into the data model or programming language and no user-supplied identifier is needed. This form of identity is used in objec