What are the advantages of dbms, Database Management System

Assignment Help:

What are the advantages of DBMS ?

1. Centralized Management and Control - One of the major advantages of using a database system is in which the organization could exert, through the DBA, centralized management and control over the data.

2. Reduction of Redundancies and Inconsistencies - Centralized control prevents unnecessary duplication of data and efficiently reduces the total amount of data storage needed. Removing redundancy eliminates inconsistencies.

3. Data Sharing - A database permits the sharing of data under its control through any number of application programs or users.

4. Data Integrity - Data integrity means in which the data holds in the database is both accurate and consistent. Centralized control could also ensure in which adequate checks are incorporated within the DBMS to gives data integrity.

5. Data Security - Data is of vital significance to an organization and may be confidential. Such secret data must not be accessed through unauthorized persons.

The DBA who has the ultimate responsibility for the data in the DBMS can ensure in which proper access process are followed. Different stages of security could be implemented for several kinds of data and operations.

6. Data Independence - Data independence is the capacity to modification the schema at one stage of a database system without having to modify the schema at the further level. It is commonly considered from two points of view: physical data independence and logical data independence. Physical data independence is the capacity to modify the internal schema without having to modify conceptual schema. Logical data independence is the capacity to change the conceptual schema without having to change external schemas or application programs.

7. Providing Storage Structures for Efficient Query Processing - Database systems gives capabilities for well executing queries and updates. Auxiliary files known as indexes are used for this reasons.

8. Backup and Recovery - These facilities are given to recover databases from hardware and/or software failures.


Related Discussions:- What are the advantages of dbms

Extend the database, Now that she understands more about the benefits of da...

Now that she understands more about the benefits of databases, the play-scheme manager would like to extend the play-scheme database to include data for schools and instructors as

Explain the dynamic hashing techniques, Explain the Dynamic Hashing Techniq...

Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica

Post vbulletin hack and new server problem, Project Description: My VBul...

Project Description: My VBulletin forum was hacked, and soon after my server machine died. So, I'm now on a new machine, and I think that I've taken care of 99% of the hacking..

Explain about the guard condition, What is a guard condition? Explain it wi...

What is a guard condition? Explain it with a suitable example. The guard-condition is a Boolean expression written with respect to parameters of triggering event and attributes

Concept of foreign key, Fundamentals of Database Management 1. Explai...

Fundamentals of Database Management 1. Explain the concept of Foreign Key. How a foreign key differs from a Primary Key? Can the Foreign Key accept nulls? 2. With a necess

Data flow diagram of structured analysis and design, From SAD to OOAD (Stru...

From SAD to OOAD (Structured Analysis and Design (SAD) to Object Oriented Analysis and Design (OOAD). We will find here how we can map various models in SAD to different model

Cases of constraint violations, (1)     Insert into PERSON Violated con...

(1)     Insert into PERSON Violated constraint: - Key constraint Reason: - Primary key 1 already exists in PERSON. Dealing: - DBMS could ask the user to provide valid PER

Define deadlock recovery measures, Define Deadlock recovery measures       ...

Define Deadlock recovery measures                   To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollbac

Oracle, Extend your CREATE TABLE statement from problem 3 with referential ...

Extend your CREATE TABLE statement from problem 3 with referential integrity constraints. Updates and deletes on related rows are restricted. 6. From examination of the sample data

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd