What are the drawbacks of file oriented system in details, Database Management System

Assignment Help:

What are the drawbacks of File Oriented System in details?


Related Discussions:- What are the drawbacks of file oriented system in details

Candidate keys, Super keys of a relation can have extra attributes. Candida...

Super keys of a relation can have extra attributes. Candidate keys are minimal super key, i.e. such a key have no extraneous attribute. An attribute is known as extraneous if even

Define query language, Define query language?   A query is a statement ...

Define query language?   A query is a statement requesting the retrieval of information. The portion of DML that includes information retrieval is known as a query language.

What are the different kinds of database end users, What are the different ...

What are the different kinds of database end users? Discuss the major activities of each? End-Users - End-users are the people whose jobs need access to the database for que

Relational schema for person, Example: RELATIONAL SCHEMA for PERSON: ...

Example: RELATIONAL SCHEMA for PERSON: PERSON (PERSON_ID: integer, NAME: string, AGE: integer, ADDRESS: String) RELATION INSTANCE In this instance, m = 3 and n = 4

Write a short note on built in function in qbe, Write a short note on built...

Write a short note on built in function in QBE? Built in function in QBE: QBE involves various built in functions like AVG, MAX,MIN,SUM and CNT. We must prefix these operator

Compute the closure set, Compute the closure (F+) for the following set of ...

Compute the closure (F+) for the following set of the functional dependencies defined on R(a,b,c,d), where F - {c→ a, ab → d, a → b, d → c}, i.e. what are all of the FDs implied b

Data model in DBMS, how many types of data model in DBMS? explain data abst...

how many types of data model in DBMS? explain data abstraction with its different level

Explain the weak entity set, Explain the Weak Entity Set An Entity set...

Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in

Explain the process-oriented decomposition, Breaking into Subsystems D...

Breaking into Subsystems Decomposition is a significant technique for coping with complexity based on idea of divide and conquers. In dividing a problem into sub problems, the

12/5/2013 4:16:59 AM

These are the disadvantages of File-Oriented System:


(i) Data redundancy and Inconsistency: Since files and application programs are formed by different programmers in excess of a long period of time, files are likely to be have different formats and the programs might be written in several programming languages. Moreover, same piece of information might be duplicated in several places. This unemployment leads to higher storage and access rate. In addition, it leads to data inconsistency such as the various copies of same data may no longer agree.

(ii) Difficulty in accessing data: the conventional file processing environments do not allow necessary data to be retrieved in convenient and efficient manner. Better data retrieval system has to be developed for general use.

(iii) Data isolation: Because data is scattered in a range of files, and files might be in different formats, it is tough to write new application programs to retrieve appropriate data.

(iv) Concurrent access anomalies: In order to improve overall performance of the system and obtain faster response time, many schemes allow multiple users to inform the data. In such an environment, interaction of parallel updates might result in inconsistent data.

(v) Security problems: Not every user of database system must be able to access all data. For example, in banking system, payroll personnel require only that part of the database that has information about various bank employees. They do not want access to information about the customer accounts. It is difficult to enforce security const rains.

(vi) Integrity problems: The data values stored in the database should satisfy certain types of consistency constraints. Such as the balance of a bank account may never fall below a prescribed amount. These constraints are forced in system by adding appropriate code in different application programs. When new restraints are added, it would difficult to change programs to implement them. The problem is compounded when constraints involve quite a few data items for dissimilar accounts.

(vii) Atomicity problem: A computer system like any other mechanical or electrical device is subject to failure. In many applications, it is vital to ensure that once a failure has occurred and has been detected, data will be restored to the consistent state existed prior to the failure.

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd