Question

2. What are the advantages of database systems and database management? Discuss based on Data Independence,...

2. What are the advantages of database systems and database management? Discuss based on Data Independence, data modeling, Managing Structured, Semi-Structured, and Unstructured Data, Managing Data Redundancy, Specifying Integrity Rules, concurrency control, Backup and Recovery Facilities, Data Security, Performance Utilities. Use 3 of your own examples in your own words!!!

0 0
Add a comment Improve this question Transcribed image text
Answer #1


A Database Management System (DBMS) is defined as the software system that allows users to define, create, maintain and control access to the database.

advantages of Database Management System


Data Independence
Data Independence is defined as a property of DBMS that helps you to change the Database schema at one level of a database system without requiring to change the schema at the next higher level. Data independence helps you to keep data separated from all programs that make use of it.

You can use this stored data for computing and presentation. In many systems, data independence is an essential function for components of the system.
In DBMS there are two types of data independence

Physical data independence
Logical data independence


---------------------------------------------------------------------------------------------------------------------------

data modeling
Data modeling (data modelling) is the process of creating a data model for the data to be stored in a Database. This data model is a conceptual representation of Data objects, the associations between different data objects and the rules. Data modeling helps in the visual representation of data and enforces business rules, regulatory compliances, and government policies on the data. Data Models ensure consistency in naming conventions, default values, semantics, security while ensuring quality of the data.

The main goal of a designing data model is to make certain that data objects offered by the functional team are represented accurately.
The data model should be detailed enough to be used for building the physical database.
The information in the data model can be used for defining the relationship between tables, primary and foreign keys, and stored procedures.


---------------------------------------------------------------------------------------------------------------------------


Managing Structured
The Management System of a Database acts as an interface between the user and the database. The user requests the DBMS to perform various operations viz., insert, delete, update and retrieve data. Various components which perform these operations on the database constitute the structure of the DBMS.


---------------------------------------------------------------------------------------------------------------------------

Semi-Structured and Unstructured Data
Semi-structured data is information that does not reside in a relational database but that have some organizational properties that make it easier to analyze. With some process, you can store them in the relation database (it could be very hard for some kind of semi-structured data), but Semi-structured exist to ease space. Example: XML data.


Unstructured data is a data that is which is not organized in a pre-defined manner or does not have a pre-defined data model, thus it is not a good fit for a mainstream relational database. So for Unstructured data, there are alternative platforms for storing and managing, it is increasingly prevalent in IT systems and is used by organizations in a variety of business intelligence and analytics applications. Example: Word, PDF, Text, Media logs.


---------------------------------------------------------------------------------------------------------------------------


Managing Data Redundancy
The file based data management systems contained multiple files that were stored in many different locations in a system or even across multiple systems. Because of this, there were sometimes multiple copies of the same file which lead to data redundancy.

This is prevented in a database as there is a single database and any change in it is reflected immediately. Because of this, there is no chance of encountering duplicate data.


---------------------------------------------------------------------------------------------------------------------------


Specifying Integrity Rules
Integrity constraints are a set of rules. It is used to maintain the quality of information.
Integrity constraints ensure that the data insertion, updating, and other processes have to be performed in such a way that data integrity is not affected.
Thus, integrity constraint is used to guard against accidental damage to the database

Domain constraints
Domain constraints can be defined as the definition of a valid set of values for an attribute.
The data type of domain includes string, character, integer, time, date, currency, etc. The value of the attribute must be available in the corresponding domain

Entity integrity constraints
The entity integrity constraint states that primary key value can't be null.
This is because the primary key value is used to identify individual rows in relation and if the primary key has a null value, then we can't identify those rows.
A table can contain a null value other than the primary key field.

Referential Integrity Constraints
A referential integrity constraint is specified between two tables.
In the Referential integrity constraints, if a foreign key in Table 1 refers to the Primary Key of Table 2, then every value of the Foreign Key in Table 1 must be null or be available in Table 2.


Key constraints
Keys are the entity set that is used to identify an entity within its entity set uniquely.
An entity set can have multiple keys, but out of which one key will be the primary key. A primary key can contain a unique and null value in the relational table.

---------------------------------------------------------------------------------------------------------------------------


concurrency control
Concurrency Control deals with interleaved execution of more than one transaction. In the next article, we will see what is serializability and how to find whether a schedule is serializable or not.

Concurrency control protocols ensure atomicity, isolation, and serializability of concurrent transactions. The concurrency control protocol can be divided into three categories:
Lock based protocol
Time-stamp protocol
Validation based protocol

---------------------------------------------------------------------------------------------------------------------------


Backup and Recovery Facilities
Database Management System automatically takes care of backup and recovery. The users don't need to backup data periodically because this is taken care of by the DBMS. Moreover, it also restores the database after a crash or system failure to its previous condition.


---------------------------------------------------------------------------------------------------------------------------

Data Security
Data Security is vital concept in a database. Only authorised users should be allowed to access the database and their identity should be authenticated using a username and password. Unauthorised users should not be allowed to access the database under any circumstances as it violates the integrity constraints.

---------------------------------------------------------------------------------------------------------------------------

Performance Utilities
Loading : A loading utility is used to load existing data files-such as text files or sequential files-into the database. Usually, the current (source) format of the data file and the desired (target) database file structure are specified to the utility, which then automatically reformats the data and stores it in the database. With the proliferation of DBMSs, transferring data from one DBMS to another is becoming common in many organizations. Some vendors are offering products that generate the appropriate loading programs, given the existing source and target database storage descriptions (internal schemas). Such tools are also called conversion tools.

Backup: A backup utility creates a backup copy of the database, usually by dumping the entire database onto tape. The backup copy can be used to restore the database in case of catastrophic failure. Incremental backups are also often used, where only changes since the previous backup are recorded. Incremental backup is more complex but saves space.

File Reorganization: This utility can be used to reorganize a database file into a different file organization to improve performance.
Performance Monitoring: Such a utility monitors database usage and provides statistics to the DBA. The DBA uses the statistics in making decisions such as whether or not to reorganize files to improve performance.

Add a comment
Know the answer?
Add Answer to:
2. What are the advantages of database systems and database management? Discuss based on Data Independence,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Discuss the advantages and disadvantages of Database Management Systems (DBMS).

    .1. Discuss the advantages and disadvantages of Database Management Systems (DBMS). 2. What is a data model? Discuss the main types of data models. 3. Define the term "database integrity." How does database integrity differ from database security?

  • give each of the roles of the Database administrator Real world examples for each of the...

    give each of the roles of the Database administrator Real world examples for each of the roles of database administrator below: • Selection of DBMS and software tools • Installing/upgrading DBMS • Tuning database performance • Improving query processing performance Managing data security, privacy, and integrity Data backup and recovery

  • True or False? 1. Using a database approach entails providing specialized sets of data for each...

    True or False? 1. Using a database approach entails providing specialized sets of data for each of several different organizational units. 2. Microsegmentation of customers is enabled by employing a big data approach to customer records 3. Unstructured, semi-structured and structured data can all be handled using a big data approach. 4. One of the advantages of datawarehouses is that users can change or update the data. 5. One of the problems involved in employing the Internet worldwide is translating...

  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

  • 3. What are the advantages and disadvantages of the various options that Amelectserv is evaluating ERP...

    3. What are the advantages and disadvantages of the various options that Amelectserv is evaluating ERP IMPLEMENTATION COSTS Berp Corporation: ON Premise Macrosoft ON Premise 4718 4719 Macrosoft Cloud 4.718 2080 1575 2 DOO 2250 2.250 2980 none none 1675 none 349 10.200 InitialHardware Network Costs Workstations UPS for Werkstations Laptops Server Back Server Server UPS Systems Router Network Infrastrutture set-up Total Ongoing Hardware Network Costs Hardware Maintenance Router Maintenance Network in structure Maintance 2MBPS internet line Totalt year) Total...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Playgrounds and Performance: Results Management at KaBOOM! (A) We do this work because we want to...

    Playgrounds and Performance: Results Management at KaBOOM! (A) We do this work because we want to make a difference in the world; how can we go further faster? - Darell Hammond, CEO and co-founder, KaBOOM! Darell Hammond stepped onto the elementary school playground and took a long, slow look around. It was 8 a.m. on an unusually warm fall day in 2002 and the playground was deserted, but Hammond knew the children would start arriving soon to admire their new...

  • STEP 1: In your own words define problem employees and the categories they may fall into....

    STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...

  • We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in...

    We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in line with related studies [10,11,35]. All searches were done by the same person in English, mainly using Google Scholar. This was further complemented through reference harvesting, citation tracking, abstracts in conference programs, and author search, using Research Gate and Mendeley (see PRISMA Flowchart in Supplementary Figure S1 Checklist and list of studies reviewed in Table S1). We then removed duplicate and unrelated results. Finally,...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT