Sources of utilities for a dbms, Database Management System

Assignment Help:

There are three main sources of utilities and applications for a DBMS:

a. Vendor applications and utilities are given for working with or maintaining the database, and generally allow users to manipulate and create a database without the need to write custom applications.

b. User applications are usually custom-made application programs written for a exact purpose using a conventional programming language. This programming language is joined to the DBMS query language by the application program interface (API). This permits the user to utilise the power of the DBMS query language with the flexibility of a custom application.

c. Third party applications may be same to those given by the vendor, but with enhancements, or they may load a perceived need that the vendor hasn't formed an application for. They can also be same to user applications, being written for a definite purpose they think a large majority of users will need.


Related Discussions:- Sources of utilities for a dbms

ERD, A student entity type has the following attributes,name..

A student entity type has the following attributes,name..

Which is a valid sql type, Which is a valid SQL type? A valid SQL Shoul...

Which is a valid SQL type? A valid SQL Should be in CHARACTER it is should be NUMERIC and FLOAT.

Give an example of multiple inheritance, Give an example of multiple inheri...

Give an example of multiple inheritance.  One example of multiple inheritance is a committee for students affair which include faculty and administrative staff member.

How many levels can be viewed architecture of the database, How many levels...

How many levels can be viewed in Architecture of the database ? Architecture of the database can be viewed as three levels.

What is the need of a log in a dbms, What is the need of a log in a DBMS? B...

What is the need of a log in a DBMS? Briefly describe the various types of records that are normally present in a log.            Ans:  The system log, which is generally writt

Two phase locking (2pl), Two Phase Locking (2PL) The two-phase locking ...

Two Phase Locking (2PL) The two-phase locking protocol having of two phases: Phase 1 : The lock acquisition phase : If a transaction T needs to read an object, it wants to

What are the uses of the information in the data dictionary, What are the u...

What are the uses of the information in the Data dictionary? The following information is directly taken from the Data dictionary: Information on fields displayed with

Define an operator that a relational algebra does not have, Define an opera...

Define an operator that a Relational Algebra does not have Ans: Relational Algebra does not have Aggregation operators.

Thid, describe objectivde of file organisation

describe objectivde of file organisation

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd