You are on page 1of 4

CHRISTIAN Z.

AGPOON
B.I.M.S (2038)

Activity 1.2 Reflection/Synthesis


Based on your learning in this module, answer the following questions:

1.List five issues of the file processing approach that have been resolved by the database approach.
Write your insights in not more than 200 words. Give an example for further discussion.

2.What do you think is/are the security issues of the database approach in today’s situations in its
emergence in internet technology? Discuss in not more than 200 words.

3.In not more than 300 words, discuss the evolution of database technology. Highlight how the database
started, its current status, and the predicted future.

(1)FILE PROCESSING AND DATABASE APPROACH


The means of how our computer manages and stores data has been in a long cycle of
innovation in the past years. In the Contemporary world, we already feel the convenience that it has
provides in the emerging needs of humankind, benefits that are advantageous in dealing with the worst
scenarios. The database system has gone farther into its revolution compare to what it is over. Once
upon a time when we are still at the age of our computer that is still reliant with different terms and give
us a huge blow, just imagine the fact that it’s quite different now, still, we are still encountering unusual
event. The system is still in the process of innovation, it continuously innovating in providing ease to the
people.
It was not yet a long era ago to say the existence of the new platform, back then we are
having the so-called File-based system, that place is ideally much less convenient and considered as an
expensive tool. This is a storage of group data of an organization or institution. It has different files that
are independent of each other and each file is called a flat-file. Respective file has its own niche and
undertakes for sole function. The previous system has various lapses that already overcome by the
database approach. Before there are data that were being duplicated but now the new approach can
only be stored once and there’s no need to put in a different program. It eliminated data redundancy
and the applications that need data can just access the central based to look for that item. Duplicated
data, doubles, and tables, it doesn’t matter what kind of thing is this but the fact here is it’s giving the
people a hard time locating one data because it might lead to mistakes. Previously the school was using
the old system that’s why it has an instance to commit wrong and long process whenever there
someone who would like to look for their records since we have the new approach it gives ease to the
system and lessens uncertainties. Another thing is the excessive program maintenance that involves a
huge amount of money and time maintenance of the program when the database approach has come it
introduces a
new way to deal with it. Since the data is being stored once, any revision or change to the system can
be accomplished easily and faster without consuming much time. For example, the system of your store
needs to be change given to the new entrants of manpower, it just easy to add or delete because it
doesn’t require you anymore to look for the same data and change it. Also, the new approach
introduces data independence that made data not anymore reliant. Before all programs maintain
metadata for each file used in a database approach it allows multiple application programs to use the
data simultaneously. In addition, it’s now easy to access unlike in the previous system. Whenever you
are dealing with the system for example in a learning institution that has various records of their
enrollees most likely when you are finding something the programs would have to be revised to access
small or big data. The next problem that has been resolved by the database approach is limited data
sharing whereas there’s no centralized control of data or the data are scattered. The data sharing was
hard then because of the inconsistency of the file system, now the possession of the new approach
mitigates the sharing of data. If you are a fan of storing files it already alleviated the process and it incurs
costs and time like as in youtube and other social media platforms. Lastly, lengthy development times
requiring the programmer to design their own file format. As one organization grow it needs to develop
or adopt from the revolution to meet the value. The database approach uses a nonprocedural data
system that only specifies what must be done without being particular on how the process of it. For
example, if the programmers need to develop or retrieve other data since the technological
development prevails it will not anymore require to have extensive programming.
As one organization grow it needs to develop or adopt from the revolution to meet the value.
The existing revolution should be equipped with the necessary tools to come up with ease and
convenience. Our environment has been exposed to technological matters and it should really be a
matter.

(2)DATABASE APPROACH THREATS IN THE CONTEMPORARY WORLD


The rapid technological revolution has brought terror to the emergence of the database
approach. It has led to various threats that involve cyber-attack incidents most likely catastrophic and
grievous outcomes. The database approach is a vital medium in storing and retrieving valuable pieces of
information that have a significant role in different industries. Each information can be considered as
sensitive and vital as it uses in one’s industrial operations. In today’s modern world, our society and
other critical foundations are being run by this system. We are totally equipped with the industry of
technology that makes us reliant on it. The problem that concerns the system is a wide spectrum that no
one has ever locate each section of it. This is a diverse and unknown place to be searched.
The existence of new internet interconnections produces a higher chance of inconsistencies
since the people are now literate and liberate in mechanizing the system as their weapon. Cybercrime is
a common and prominent attack because of its convenience and less risk that has a great
return, still this is a crime that is prohibited inhuman laws. Anyone can be a victim, every second or one
in a million can be blown by disastrous consequences. For many reasons that it has on why the
protection of the system is a must, a sole reason that this system has been part of our life is a key point
why the security of the system is a paramount feature that should never neglect. The security system of
this program can be configured of an initial set-up and with corresponding security patches. One of the
most common causes of breaches is the unavailability of the system checks before deployment. The
negligence of overlooking the process will give the hackers ample time to execute their plan to
destabilized the system. The stolen of database backups can also be a major cause of security issues
whereas the company is not 100% sure with regards to the loyalty of their subordinates. Some flaws can
be derived from the inside job, the company doesn’t have any idea that there someone who is already
manipulating the system to execute their plan. There are several loopholes that need to be assisted to
comply with a stronger range of security.
So why is then it should be protected that the big question that needs to be answered
for so many claims of cybercrime. The fact here is this system is the main source of information that
supports the foundation of an organization. This is considered a primary tool to effectively integrate the
process within an organization. Given the large scale of embedment of security features, this is still
prone to several attacks, the vulnerability of the system will be taken advantage of by hackers who
would like to make a profit out of it and destroy the system. If the new approach is left unprotected it
will lead to a higher cost and another process of establishment. The new platform has been the center
of the industry, that’s why it should be protected and never be overlooked.

(3)EVOLUTION OF DATABASE TECHNOLOGY


Databases have been part of humankind’s daily routine, even if you don’t have one of
these but you are supposed to encounter this technology since that it surrounds our environment.
Whenever we are going out on a date, tour, shopping we are used to accessing various systems to pay
our expenses. Designation of the database system is a hard task given that it contains sensitive
information that might leak, that’s why there’s a process of implementing it. It’s a no joke for
programmers in dealing with this huge responsibility that needs extra effort and proper analysis to come
up with a good system.

Before the so-called database has ever existed, everything needs to be recorded and stored
manually by means of paper. Just imagine how hard and time consuming this process before and how
the new program gives ease to the storing of information. It’s almost different now. Before we need to
face physically searching for a particular document and sorting out the document one by one just to find
that data. There is no place that guarantees its safety since it’s only put from paper, it’s prone to
damage because of termites and other environmental factors. Once the files had burned it will be hard
to locate if there are still the same copies of destroyed pages. It will leave out the history of a place or
even a person’s identity once it’s not taken care of. The existence of the database system uplifts the
limitation
that can do by the traditional approach. ​The storing of information is now integrated and it lessens the
possibility of uncertain events. The first-ever system was known, the hierarchical model that consists of
a tabular tree-like data structure. This was being credited from IMB for creating this model in 1960. It’s
simply organized in the form of a tree that symbolizes degree from lowest to highest like in a rank of
military or government officials. Since the process of innovation continuously growing it introduces the
network model that resolved the restrictions of the previous system. Next, they come up with the
relational model which in fact is much easier to understand and to be designed and the consistency of
data prevails. The oracles corporation dominated the market by providing a database with excellent
performance and they reign since there’s no competition at all. Afterward the Microsoft corp.
Introduced another significant innovation known as the windows used by businesses. When software
development exists it helps developers to be liberated in creating websites without relying on other
companies. Later on, web 1 and web 2 existed and provide a greater chance for various websites and as
well as to us people. Business intelligence provided by computers provides less work to the manpower
because of the dominance of the technology. Businesses rely on the ease and convenience of the system
that helps in developing business transactions. The databases have given the companies the chance to
create a sophisticated central based system that can use to locate every data that they need with ease
and less interaction.

We are still in the process of technological revolution, the growth of the internet is rapidly
changing in the response to people’s needs. After a lot of years, it will already occupy a major
percentage of our society. We are going to be run by electronic machines because of the age of
technology. This new system has come a long way since the earliest system has been introduced. Finally,
we have a database that can give protection to the storage of valuable data without compromising its
safety. Over time, the database has been t5he main focal point of the story. The intelligence of the new
medium helps us realize better accuracy. Have you ever imagine if we are still reliant on traditional
approaches given that we are suffering from this pandemic, it will be horrible and terrific to imagine if
this is gone wrong.

It’s indeed a fact that Nothing is impossible to Science!!!

You might also like