2. What are the advantages of database systems and database management? Discuss based on Data Independence, data modeling, Managing Structured, Semi-Structured, and Unstructured Data, Managing Data Redundancy, Specifying Integrity Rules, concurrency control, Backup and Recovery Facilities, Data Security, Performance Utilities. Use 3 of your own examples in your own words!!!
A Database Management System (DBMS) is defined as the software
system that allows users to define, create, maintain and control
access to the database.
advantages of Database Management System
Data Independence
Data Independence is defined as a property of DBMS that helps you
to change the Database schema at one level of a database system
without requiring to change the schema at the next higher level.
Data independence helps you to keep data separated from all
programs that make use of it.
You can use this stored data for computing and presentation. In
many systems, data independence is an essential function for
components of the system.
In DBMS there are two types of data independence
Physical data independence
Logical data independence
---------------------------------------------------------------------------------------------------------------------------
data modeling
Data modeling (data modelling) is the process of creating a data
model for the data to be stored in a Database. This data model is a
conceptual representation of Data objects, the associations between
different data objects and the rules. Data modeling helps in the
visual representation of data and enforces business rules,
regulatory compliances, and government policies on the data. Data
Models ensure consistency in naming conventions, default values,
semantics, security while ensuring quality of the data.
The main goal of a designing data model is to make certain that
data objects offered by the functional team are represented
accurately.
The data model should be detailed enough to be used for building
the physical database.
The information in the data model can be used for defining the
relationship between tables, primary and foreign keys, and stored
procedures.
---------------------------------------------------------------------------------------------------------------------------
Managing Structured
The Management System of a Database acts as an interface between
the user and the database. The user requests the DBMS to perform
various operations viz., insert, delete, update and retrieve data.
Various components which perform these operations on the database
constitute the structure of the DBMS.
---------------------------------------------------------------------------------------------------------------------------
Semi-Structured and Unstructured Data
Semi-structured data is information that does not reside in a
relational database but that have some organizational properties
that make it easier to analyze. With some process, you can store
them in the relation database (it could be very hard for some kind
of semi-structured data), but Semi-structured exist to ease space.
Example: XML data.
Unstructured data is a data that is which is not organized in a
pre-defined manner or does not have a pre-defined data model, thus
it is not a good fit for a mainstream relational database. So for
Unstructured data, there are alternative platforms for storing and
managing, it is increasingly prevalent in IT systems and is used by
organizations in a variety of business intelligence and analytics
applications. Example: Word, PDF, Text, Media logs.
---------------------------------------------------------------------------------------------------------------------------
Managing Data Redundancy
The file based data management systems contained multiple files
that were stored in many different locations in a system or even
across multiple systems. Because of this, there were sometimes
multiple copies of the same file which lead to data redundancy.
This is prevented in a database as there is a single database and any change in it is reflected immediately. Because of this, there is no chance of encountering duplicate data.
---------------------------------------------------------------------------------------------------------------------------
Specifying Integrity Rules
Integrity constraints are a set of rules. It is used to maintain
the quality of information.
Integrity constraints ensure that the data insertion, updating, and
other processes have to be performed in such a way that data
integrity is not affected.
Thus, integrity constraint is used to guard against accidental
damage to the database
Domain constraints
Domain constraints can be defined as the definition of a valid set
of values for an attribute.
The data type of domain includes string, character, integer, time,
date, currency, etc. The value of the attribute must be available
in the corresponding domain
Entity integrity constraints
The entity integrity constraint states that primary key value can't
be null.
This is because the primary key value is used to identify
individual rows in relation and if the primary key has a null
value, then we can't identify those rows.
A table can contain a null value other than the primary key
field.
Referential Integrity Constraints
A referential integrity constraint is specified between two
tables.
In the Referential integrity constraints, if a foreign key in Table
1 refers to the Primary Key of Table 2, then every value of the
Foreign Key in Table 1 must be null or be available in Table 2.
Key constraints
Keys are the entity set that is used to identify an entity within
its entity set uniquely.
An entity set can have multiple keys, but out of which one key will
be the primary key. A primary key can contain a unique and null
value in the relational table.
---------------------------------------------------------------------------------------------------------------------------
concurrency control
Concurrency Control deals with interleaved execution of more than
one transaction. In the next article, we will see what is
serializability and how to find whether a schedule is serializable
or not.
Concurrency control protocols ensure atomicity, isolation, and
serializability of concurrent transactions. The concurrency control
protocol can be divided into three categories:
Lock based protocol
Time-stamp protocol
Validation based protocol
---------------------------------------------------------------------------------------------------------------------------
Backup and Recovery Facilities
Database Management System automatically takes care of backup and
recovery. The users don't need to backup data periodically because
this is taken care of by the DBMS. Moreover, it also restores the
database after a crash or system failure to its previous
condition.
---------------------------------------------------------------------------------------------------------------------------
Data Security
Data Security is vital concept in a database. Only authorised users
should be allowed to access the database and their identity should
be authenticated using a username and password. Unauthorised users
should not be allowed to access the database under any
circumstances as it violates the integrity constraints.
---------------------------------------------------------------------------------------------------------------------------
Performance Utilities
Loading : A loading utility is used to load existing data
files-such as text files or sequential files-into the database.
Usually, the current (source) format of the data file and the
desired (target) database file structure are specified to the
utility, which then automatically reformats the data and stores it
in the database. With the proliferation of DBMSs, transferring data
from one DBMS to another is becoming common in many organizations.
Some vendors are offering products that generate the appropriate
loading programs, given the existing source and target database
storage descriptions (internal schemas). Such tools are also called
conversion tools.
Backup: A backup utility creates a backup copy of the database, usually by dumping the entire database onto tape. The backup copy can be used to restore the database in case of catastrophic failure. Incremental backups are also often used, where only changes since the previous backup are recorded. Incremental backup is more complex but saves space.
File Reorganization: This utility can be used to reorganize a
database file into a different file organization to improve
performance.
Performance Monitoring: Such a utility monitors database usage and
provides statistics to the DBA. The DBA uses the statistics in
making decisions such as whether or not to reorganize files to
improve performance.
2. What are the advantages of database systems and database management? Discuss based on Data Independence,...
.1. Discuss the advantages and disadvantages of Database Management Systems (DBMS). 2. What is a data model? Discuss the main types of data models. 3. Define the term "database integrity." How does database integrity differ from database security?
give each of the roles of the Database administrator Real world examples for each of the roles of database administrator below: • Selection of DBMS and software tools • Installing/upgrading DBMS • Tuning database performance • Improving query processing performance Managing data security, privacy, and integrity Data backup and recovery
True or False? 1. Using a database approach entails providing specialized sets of data for each of several different organizational units. 2. Microsegmentation of customers is enabled by employing a big data approach to customer records 3. Unstructured, semi-structured and structured data can all be handled using a big data approach. 4. One of the advantages of datawarehouses is that users can change or update the data. 5. One of the problems involved in employing the Internet worldwide is translating...
Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...
3. What are the advantages and disadvantages of the various options that Amelectserv is evaluating ERP IMPLEMENTATION COSTS Berp Corporation: ON Premise Macrosoft ON Premise 4718 4719 Macrosoft Cloud 4.718 2080 1575 2 DOO 2250 2.250 2980 none none 1675 none 349 10.200 InitialHardware Network Costs Workstations UPS for Werkstations Laptops Server Back Server Server UPS Systems Router Network Infrastrutture set-up Total Ongoing Hardware Network Costs Hardware Maintenance Router Maintenance Network in structure Maintance 2MBPS internet line Totalt year) Total...
Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
Playgrounds and Performance: Results Management at KaBOOM! (A) We do this work because we want to make a difference in the world; how can we go further faster? - Darell Hammond, CEO and co-founder, KaBOOM! Darell Hammond stepped onto the elementary school playground and took a long, slow look around. It was 8 a.m. on an unusually warm fall day in 2002 and the playground was deserted, but Hammond knew the children would start arriving soon to admire their new...
STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...
We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in line with related studies [10,11,35]. All searches were done by the same person in English, mainly using Google Scholar. This was further complemented through reference harvesting, citation tracking, abstracts in conference programs, and author search, using Research Gate and Mendeley (see PRISMA Flowchart in Supplementary Figure S1 Checklist and list of studies reviewed in Table S1). We then removed duplicate and unrelated results. Finally,...