0% found this document useful (0 votes)
7 views22 pages

DB_Chapter 1 (1)

Uploaded by

edag38776
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views22 pages

DB_Chapter 1 (1)

Uploaded by

edag38776
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Chapter - One

Introduction To Database
Systems
Basic Definitions
• Data: A collection of raw or unprocessed facts and figures.
• Data can be represented in the form of: numbers , words , image
video, audio that can be stored in computer’s
• Information is a processed data .
• Database: A collection of related data that represents some real
world entity. If any change made on real world entity that change
Should be reflected on the DB.
Ex. Online banking System , Library Mgt. system
• Database Management Systems (DBMS)
are software that provides an environment
to the user to perform operations on the
database for creation, insertion, deletion,
updating and retrieval of data.
2
Compiled By: Daniel S
Basic Definitions….

The database contains not only the database itself but also a
complete definition or description of the database.

 Meta-data stored in DBMS catalog which stores the


description of a particular database (e.g. data type &
structures , table name , No. of columns, and constraints).
As shown in slide 5 six.

3 Compiled By: Daniel S..


Database that store student Course Information

4
Compiled By: Daniel S.
Example of Database catalog

5 Compiled By: Mekuanent B.


What is DBMS?
DBMS is a collection of programs that enables users to create
and maintain a database. It is a general-purpose software system
that facilitates the following processes.
Functionalities
• Defining a database involves specifying the data types,
structures, and constraints(limit) for the data to be stored in
the database.
• Constructing is the process of storing the data itself on some
storage medium.
• Manipulating includes querying the database to retrieve data,
updating the database and generating reports from the data.

6 Compiled By: Daniel S.


DBMS…..

• Sharing allows multiple users and programs to access the


database concurrently.

• Protection includes system protection against hardware or


software malfunction (or crashes), and security protection
against unauthorized or malicious access.

• Maintaining is making the database system to evolve as


requirements change over time.

7 Compiled By: Daniel S..


Advantages of DBMS
• Controlling redundancy in data storage
• Sharing of data among multiple users.
• Restricting unauthorized access to data.
• Providing backup and recovery services.
• Providing multiple interfaces to different classes of
users.
• Representing complex relationships among data.
• Enforcing integrity constraints on the database.
• Potential for enforcing standards
• Reduced application development time
• Flexibility to change data structures
• Availability of up-to-date information
8 Compiled By: Daniel S
Disadvantages of DBMS

• The overhead costs of hardware, software, professionals and


training
• Overhead for providing security, concurrency control,
recovery, and integrity functions
• High impact of failure
• Performance problem(response time problem) due to high
memory space consumption

9 Compiled By: Daniel S


Database system environment

10 Compiled By: Daniel S


Types of databases
• Traditional database: most of the information that is stored and
accessed is either textual or numeric.
• Advances databases
1. Multimedia databases can now store pictures, video clips,
and sound messages. E.g. YouTube , spotify
2. Geographic information systems (GIS) can store and analyze
maps, weather data, and satellite images. E.g. Google map
store geo-info.
3. Data warehouses and online analytical processing systems
are used in many companies to extract and analyze useful
information from very large databases for decision making.
4. Real-time and active database technology is used in
controlling industrial and manufacturing processes. (storage
and retrieval of extremely volatile data ,high frequency trading and
11
sensors
Compiled )By: Daniel S.
Basic database terminologies

• Enterprise: An organization: A library, a bank, a university, etc.


• Entity: Person, place, thing, or event which is an "object" in the
real world that we are interested in. Eg. Student is an entity
• Attribute (Field): A character or group of characters (alphabetic
or numeric), that has a specific meaning.
Eg. Name, age, telephone, grade, sex, of a person etc.
• Record: A logically connected set of one or more attributes that
describe a person, place or thing. (Logically related data)
• Primary key- attribute that uniquely identify an entity
12 Compiled By: Daniel S.
Data management approaches

Data management (keeping your data records)

1. Manual Approach
2. File-Based Approach
3. Database Approach

13 Compiled By: Daniel S.


Manua l Approach
The primitive and traditional way of information handling where
cards and papers are used for the purpose.

• It includes intensive human labor


• Events and objects are written on files (paper)
• Each of the files containing various kinds of information is
labeled and stored in one or more cabinets
• The cabinets could be kept in safe places for security purpose
based on the sensitivity of the information contained in it.
• Insertion and retrieval is done by searching first for the right
cabinet then for the right file then the information

14 Compiled By: Daniel S


Manual Approach
Limitations with all manual systems

• Prone to error
• Difficult to update, retrieve, integrate
• You have the data but it is difficult to compile the
information
• Significant amount of duplication of data
• Cross referencing is difficult

15 Compiled By: Daniel S


File-Based Approach

• This approach is a decentralized computerized data handling


method which develops a program or a number of programs
for each different application.
• Since every application defines and manages its own data, the
system is subjected to serious data duplication problem.
• Unstructured and not predefined data

16 Compiled By: Daniel S


Examples
File-Based Approach
Limitations of File-Based systems
• Data Redundancy (Duplication of data)
• Separation and isolation of data: different format of file in d/f file
e.g. Gender in a given file might be written Female & Male in other file F&M (the
same file in d/f format )
• Data Inconsistency and confusion
- Due to various copies of same data/ the database consistent among many files
-Poor Security and administration: The DBMS provide access only the required data
based on user access control/password , However in case of file system
very difficult to maintain security measure (can’t put RW security
in some portion of the file inFS)
-Difficulty in accessing data- : in the case of file system need to write a program to
access a given data. However in csse of DB you can write SQL queries
- E.g. finding Max. mark in Database from file
-Data integrity problem : is DBMS difficult in file system b/c of unstructured data,
thus it is difficult to avoided errors but in DBMS it can impose rules / constraints
-Concurrency access anomalies :

18 Compiled By: Daniel S.


Database Approach
• Single repository of data is maintained(centralized)
• Data can be shared
• Improved data accessibility - By using structured query
languages, the users can easily access data without programming
experience.
• Redundancy can be reduced
• Inconsistency can be avoided
• Integrity can be maintained
• Security measures can be enforced
• Less Labor
• Centralized information control: Since relevant data in the
organization will be stored at one repository, it can be controlled
and managed at the central level.

19 Compiled By: Daniel S.


Database Approach
Limitations and risk of database approach

• Introduction of new professional and specialized personnel


• High cost to be incurred to develop and maintain the system
• Complex backup and recovery services from the users
perspective
• High impact on the system when failure occurs to the central
system

20 Compiled By: Daniel S.


Users in database systems
1) Database Administrator is responsible for managing resources
(the database itself(1), the DBMS and Related software(2) ) and
authorizing access to the database
•The DBA has all the system privileges allowed by the DBMS and
can assign(grant) and remove (revoke) levels of access(privileges) to
and from other users.
•The DBA is also responsible for the evaluation, selection and
implementation of DBMS package.
2) Database Designer is responsible for identifying the data to be
stored in the database choosing appropriate structures to
represent and store this data , communicate with DB user to
understand their requirement to design the DB
3) System Analysts and Application Programmers (SW. Engineers)
1. System analysts: determine the requirements of end users
2. Application programmers: implement these specifications as programs,
21 i.e. use
Compiled By: the DBSby developing application programs
Daniel
Users in database systems…
4)End users – people whose jobs require access to the DB
- Casual end users: occasionally access the database, but they may
need different information each time.(access the DB occasionally )
- Middle or high level managers
- Naive or parametric end users: Naive users are those users who need
not be aware of the presence of the database system .
 Naive users are end users of database who work through a menu
driven application program. e.g. ATM
- Sophisticated end users: familiarize themselves with the facilities of
the DBMS so as to implement their applications to meet their
complex requirements. they can interact the DB directly they don’t
need any application program, /No-GUI Env.
Eg. Engineer ,Business analyst

22 Compiled By: Mekuanent B.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy