Professional Documents
Culture Documents
Chapter 1
Chapter 1
Introduction to DBMS
1.1 INTRODUCTION
DataBase Management System has evolved from a specialized computer application to a
central component of computing environment. Database system plays a vital role in
organizing data about a particular enterprise. Consider an example of a company which
stores data about following:
Departments (Department_ID, Department_Name, Location)
Employees (Employee_ID, Employee_Name, Address, Salary, Department_ID)
Project (Project_Name, Project_ID, Department_ID)
Which may have following relations :
An Employee works in a Departments.
An Employee works on many Projects.
A Department handles many Project.
Therefore, a system is needed which can effectively organize the data and also use it to
analyze and guide operations of the company.
Now–a–days, the amount of information to be stored is increasing enormously and thus the
need of flexible and powerful system is also increasing day–by–day which has the ability
not only to effectively organize or maintain large collection of data but also provides easy
access to data.
Figure 1.1 One to one correspondences between applications and data files
(vi) Security
File system does not provide any security to the data stored, as there are no authentication
rights provided to user for the file. Complete file is at expose of user. The DBA has to
guarantee that only authorized persons have access to the database. The DBA defines the
security checks to be carried out. Different checks can be applied to different operation on
the same data. For instance, a person may have the access rights to query on a file, but may
not have the rights to delete or update that file. The DBMS allows such security checks to
be established for each piece of data in the database.
(vii) Integrity
Inconsistency between two entries can lead to integrity problems. However, even if there
is no redundancy, the database can still be inconsistent. For example, a student may be
enrolled in 10 courses in a semester when the maximum number of courses, one can enroll
is 7. Another example could be that of a student enrolling in a course that is not being
offered that semester. Such problems can be avoided in a DBMS by establishing certain
integrity checks to be carried out whenever any update operation is done.
So, it is quite advantageous to use file system in certain situations, which are:
a. Database and application are simple and not expected to change.
b. Concurrent access is not required.
c. Real time applications as time constraints are not easy to maintain with DBMS.
Customer
Cust_ID TYPE = BYTE (4), OFFSET = 0
External
Loan_No TYPE = BYTE (4), OFFSET = 4
Amount_in_Dollars TYPE = BYTE (7), OFFSET = 8
Customer_Loan
Cust_ID : 101
Loan_No : 1011 Conceptual
Amount_in_Dollars : 8755.00