You are on page 1of 48

Practical File

On

Data Base Management System


Submitted to
MAHARSHI DAYANAND UNIVERSITY, ROHTAK
In partial fulfillment of the requirements for the award of the degree of
BACHELOR OF BUSINESS ADMISNISTRATION
(Regular Degree)
(4th SEMESTER)
Submitted by

Name: Deepak Kumar Raj


REG. No: 2116241086
Page |-2-

INDEX

Page
S No. Topic Name Remarks
No.
1 Exercise 1
2 Exercise 2

3 Exercise 3

4 Exercise 4 Part I and Part II

5 Exercise 5 Part I and Part II


6 Unit – 1
1. Difference Between Data and
7
Information
2. Difference Between File System
8
and Database system
3. Advantage and Disadvantage of
9
DBMS.
4. Describe The Components of
10
DBMS.
11 5. Responsibilities of DBA.
12 Unit – 2
13 1. Describe Database Architecture
14 2. Types of Mapping in DBMS
3. Difference Between Instance and
15
Schema.
4. Difference Between Physical and
16
Logical Data Independence.
17 5. Classification of DBMS.
18 Unit – 3
Page |-3-

1. Why Database Security is


19
Important?
2. Data protection Tools and
20
Platform.
21 3. Why Firewall is Important?

22 4. Types of Distributed Database


System.
23 Unit – 4

24 1. How Data warehouse works?

25 2. Advantage and Disadvantage of


Data Mining.
26 3. Difference Between Spatial
Database and Non-Spatial Database.
27 4. Multimedia Database in DBMS.
Page |-4-

Exercise 1
1. Create a new database, save it on the desktop and name it “School Database”.

2. Create a Table in the school Database with the following structure using the
design mode:
Page |-5-

3. Make the “ID Number” Field the primary Key.

4. Save the table as “Student’s Table”.


Page |-6-

5. Now go to Datasheet View.

Exercise 2

1. Open your “Student’s Table” and enter 5 complete records.

2. Sort the table in ascending order by surname.


Page |-7-

3. Delete the last Record you have entered.

4. Change the field size of the Surname to 20


Page |-8-

Exercise 3

1. Create query: NY Customers


= Create a query that displays only the NY customers sorted by last name in
ascending order.

2. Create report: NY Customers Report


= Create a report from the NY Customers query
Page |-9-

3. Create form: New Customers


= Create a form for the Customers table. Include all fields in the form. Use the
Form Wizard to create a form.
P a g e | - 10 -
P a g e | - 11 -
P a g e | - 12 -
P a g e | - 13 -
P a g e | - 14 -

Exercise – 4

PART 1:
1. Create a table with the following field.

2. From Datasheet View, Click on File menu, and select Page Setup option.
P a g e | - 15 -

3. Click on Page tab and change paper orientation to Landscape.

4. Save query as STORE1.

5. Print a copy.
P a g e | - 16 -

PART II:

1. Create a table with the following field and criteria:

2. Set the STATE so that it lists data in ascending order.


P a g e | - 17 -

3. Type AZ on the “criteria” row.

4. Type CO on the “or” row.

5. Save query as AZ_CO STORES.


P a g e | - 18 -

6. Print a copy.

Exercise – 5

PART I:

1. Click on the Reports Tab.


P a g e | - 19 -

2. Click New and then select Report Wizard


P a g e | - 20 -

3. Use the following information to create your report:

4. Print a copy.
P a g e | - 21 -

PART II: The Company would like a report of all branches, grouped by type of
software and sorted by the branch office name. Create a report of your own design
that will display this information. Save and name the report SOFTWARE. Print a
copy.
P a g e | - 22 -

UNIT-1

1. Difference between Data and Information.

DATA INFORMATION

1. It is a raw fact. 1. It is the processed form of data.

2. It is not significant to a business. 2. It is significant to a business.

3. It does not help the decision 3. It is help in decision making.

making.

4. It is atomic level piece of 4. It is a collection of data.

Information.

5. product name , student name. 5. Student mark sheet.


P a g e | - 23 -

2. Difference between File System and Database system.


FILE SYSTEM DATABASE MANAGEMENT
SYSTEM

1. It is a software that manages and 1. It is a software application. It is used


organizes the files in a storage medium. for accessing, creating, and managing
It controls how data is stored and databases.
retrieved.

2. It provides the details of data 2. It gives an abstract view of data that


representation and storage of data. hides the details.

3. Storing and retrieving of data can’t be 3. It is efficient to use as there are a


done efficiently in a file system. wide variety of methods to store and
retrieve data.

4. It does not offer data recovery 4. It is backup recovery for data .


processes.

5. It doesn’t have a crash recovery 5. It provides a crash recovery


mechanism. mechanism.

6. Protecting a file system is very 6. It offers good protection mechanism.


difficult.

7. The redundancy of data is greater. 7. The redundancy of data is low.

8. Data inconsistency is higher. 8. Data inconsistency is low.

9. It offers less security. 9. It offers high security.

10. It allows to stores the data as 10. It stores data as well as defined
isolated data files and entities. constraints and interrelation.

11. It does not provide support for 11. It is easy to implement complicated
complicated transactions. transactions.

12. The centralization process is hard. 12. The centralization is easy to achieve.

13. It doesn’t offer backup and recovery 13. It provides backup and recovery of
P a g e | - 24 -

of data if it is lost. data even if it is lost.

14. There is no efficient query 14. It can easily query data in a database
processing. using SQL language.

15. It doesn’t offer concurrency. 15. It provides a concurrency facility.

3. Advantage and Disadvantage of DBMS.


 Advantages

1. Reduction of Redundancies: Duplicate data is created in many places because all


the programs have their own files which create data redundancy resulting in
wastage of memory. In DBMS, all the files are integrated in a single database. So
there is no chance of duplicate data.

2. Data Integrity : Integrity of data means that data in database is always accurate,
such that incorrect information cannot be stored in database. In order to maintain
the integrity of data, some integrity constraints are enforced on the database.

3. Sharing of Data : A database allows the sharing of data under its control by any
number of application program or users.

4. Providing Backup and Recovery: A DBMS must provide facilities for


recovering from hardware or software failures. The backup and recovery
subsystem of the DBMS is responsible for recovery.

5. Concurrency Control : DBMS systems provide mechanisms to provide


concurrent access of data to multiple users.

6. Conflict Resolution : Database Administrator (DBA) resolve the conflict on


requirements of various user and applications. The DBA chooses the best file
structure and access method to get optional performance for the application.

7. Restricting unauthorized access: When multiple users share a database, it is


likely that some users will not be authorized to access all information in the
database. Some users may be permitted only to retrieve data, whereas other are
allowed both to retrieve and to update. A DBMS should provide a security and
authorization subsystem, which the DBA uses to create accounts and to specify
P a g e | - 25 -

account restrictions. The DBMS should then enforce these restrictions


automatically.

 DISADVANTAGES

1. Complexity : The provision of the functionality that is expected of a good DBMS


makes the DBMS an extremely complex piece of software. Failure to understand
the system can lead to bad design decisions, which can have serious consequences
for an organization.

2. Size : The complexity and breadth of functionality makes the DBMS an


extremely large piece of software, occupying many megabytes of disk space and
requiring substantial amounts of memory to run efficiently.

3. Higher impact of a failure: The centralization of resources increases the


vulnerability of the system. Since all users and applications rely on the availabi1ity
of the DBMS, the failure of any component can bring operations to a halt.

4. Performance : The database management system works very fast when the data is
less to work on, But as the data of the organization grows, the system becomes
heavier and heavier and the performance of a DBMS decreases, so sometimes the
file management system is preferred over the database management system.

5. Cost of DBMS: The cost of DBMS varies significantly, depending on the


environment and functionality provided. There is also the recurrent annual
maintenance cost.

6. Additional Hardware costs: The disk storage requirements for the DBMS and
the database may necessitate the purchase of additional storage space. Furthermore,
to achieve the required performance it may be necessary to purchase a larger
machine, perhaps even a machine dedicated to running the DBMS.

7. Cost of Conversion: In some situations, the cost often DBMS and


extra hardware may be insignificant compared with the cost of converting existing
applications to run on the new DBMS and hardware. This cost also includes the cost
of training staff to use these new systems and possibly the employment of specialist
staff to help with conversion and running of the system.
P a g e | - 26 -

4. Describe The Components of DBMS.


Hardware, Software, Data, Database Access Language, Procedures and Users all
together form the components of a DBMS.

1. Hardware
The hardware is the actual computer system used for keeping and accessing the
database. The conventional DBMS hardware consists of secondary storage devices
such as hard disks. Databases run on the range of machines from micro computers
to mainframes.
2. Software
Software is the actual DBMS between the physical database and the users of the
system. All the requests from the user for accessing the database are handled by
DBMS.
3. Data
It is an important component of the database management system. The main task of
DBMS is to process the data. Databases are used to store the data, retrieved, and
updated to and from the databases.
4. Users
There are a number of users who can access or retrieve the data on demand using
the application and the interfaces provided by the DBMS.
The users of the database can be classified into different groups –
1. Database Administrator (DBA) :
A database administrator (DBA) is the information technician responsible for
directing and performing all activities related to maintaining a successful database
environment. A DBA makes sure an organization's databases and related
applications operate functionally and efficiently.
 DBA also monitors the recovery and backup and provide technical support.
 The DBA has a DBA account in DBMS which called a system or super user
account.
 DBA repairs damage caused due to hardware and software failures.
2. Native / Parametric End Users :
P a g e | - 27 -

Parametric End Users are the unsophisticated who doesn’t have any DBMS
knowledge but they frequently use the data base applications in their daily life to
get the desired results .
3. System Analyst :
It is a user who analyzes the requirements of parametric end users. They check
whether all the requirements of end users are satisfied.
4. Sophisticated Users :
A database administrator (DBA) is the information technician responsible for
directing and performing all activities related to maintaining a successful database
environment. A DBA makes sure an organization's databases and related
applications operate functionally and efficiently.
5. Data Base Designers :
A database designer is in charge of designing, developing, executing and
preserving a company's data management systems. One of the most important
responsibilities of a database designer is to form relationships between various
elements of data and give it a logical
1. Application Users :
An application program is a comprehensive, self-contained program that performs
a particular function directly for the user. Among many others, application
programs include – Email, Web browsers, Games, Word processors, accounting
software etc.

2. Casual users / Temporary users :

Casual users the use of who occasionally use/access the data base but each time
when they accept the data base they require the new information for example
middle or higher level manager.
P a g e | - 28 -

5. Responsibilities of Data Base Administrator

The responsibilities of data base administrator are as follows :


 Work with the security administrator to establish user management policy.
 Create and manage databases, tables, views, macros, stored procedures, user
defined functions, journals, query logs, and other database objects.
 Grant privileges to roles and users on database objects.
 Allocate space to users and databases, and manage space usage.
 Create and manage accounts.
 Manage data load and export.
 Manage data archive and restore.
 Monitor and tune system performance.
 Troubleshoot user problems.
 Manage periodic database maintenance tasks.
 Provide the support to the users.
 Defines the security and integrity checks.
P a g e | - 29 -

UNIT – 2

1. Describe Database Architecture.


Database architecture in businesses and organizations involves the application
of programming languages to design software. It mainly involves the design,
implementation, development, and maintenance of the computer programs that
store and manage data for businesses.

The architecture can be either single-tier or multi-tier like 1-tier architecture, 2-tier
architecture, 3-tier architecture, n-tier architecture, etc.

 One Tier Architecture :

The database is directly available to the user, the user can directly sit on the
DBMS and use it i.e.; the client, server and the database all present on the same
machine.

 Two Tier Architecture :

It is similar to a basic client-server model. The application at the client end directly
communicates with the database at the server-side. API like ODBC, JDBC are
used for this interaction. The server side is responsible for providing query
processing and transaction management functionalities. On the client-side, the user
interfaces and application programs are runs. The application on the client-side
establishes a connection with the server-side in order to communicate with the
DBMS.

Application Server
Application Client

 Advantages

1. Enhanced scalability due to distributed deployment of application servers.


Individual connections need not to be made between client and server.
2. Data Integrity is maintained since there is middle layer between client and
server, data corruption can be removed.
P a g e | - 30 -

3. Security is improved. This type of model prevents direct interaction of the


client with the server thereby reducing access to unauthorized data.

 Disadvantages

Increased complexity of implementation and communication. It becomes difficult


for this sort of interaction to take place due to the presence of middle layers.

 Three-Tier Architecture :

 The three tier architecture contains another layer between the client and
server. In this architecture, client can’t directly communicate with the server.
 The application on the client-ends interacts with an application server which
further communicates with the database system.
 End user has no idea about the existence of the database beyond the
application server. The database also has no idea about any other user
beyond the application.
 The 3-Tier architecture is used in case of large web applications.

2. Types of Mapping in DBMS


There are basically two types of mapping in the database architecture

 Conceptual / Internal Mapping


 External / Conceptual Mapping

 Conceptual / Internal Mapping


P a g e | - 31 -

It lies between the conceptual level and internal level. Its role is to define the
correspondence between the records and fields of the conceptual level and files and
data structures of the internal level.

 External / Conceptual Mapping

It lies between the external level and conceptual level. Its role is to define the
correspondence between a particular external and conceptual view.

 Conceptual / Internal Mapping


P a g e | - 32 -

3. Difference between Instance and Schema

Parameters Schemas in DBMS Instances in DBMS

Meaning Schema refers to the Instance basically refers


overall description of any to a collection of data and
given database. information that the
database stores at any
particular moment.
Alterations The schema remains the One can change the
same for the entire instances of data and
database as a whole. information in a database
using updation, deletion,
and addition.

Frequency of changes It does not change very It does not change very
frequently.It changes very frequently.It changes very
frequently.UsesWe use frequently.UsesWe use
Schema for defining the Schema for defining the
basic structure of any basic structure of any
given database. It defines given database. It defines
how the available needs to how the available needs to
get stored.We use get stored.We use
Instance for referring to a Instance for referring to a
set of information at any set of information at any
given instance/ time. given instance/ time.

Uses It does not change very It does not change very


frequently.It changes very frequently.It changes very
frequently.UsesWe use frequently.UsesWe use
P a g e | - 33 -

Schema for defining the Schema for defining the


basic structure of any basic structure of any
given database. It defines given database. It defines
how the available needs to how the available needs to
get stored.We use get stored.We use
Instance for referring to a Instance for referring to a
set of information at any set of information at any
given instance/ time. given instance/ time.

4. Difference between Physical and Logical Data Independence


Parameters Physical Data Independence Logical Data Independence

Basics Physical data independence is Logical data independence is


concerned mainly with how a concerned mainly with the
set of data/ info gets stored in changing definition of the
a given system. data in a system or its
structure as a whole.

Ease of Retrieving We can easily retrieve it. Retrieving is very difficult


because the data mainly
depends on its logical
structure and not its physical
location.

Ease of Achieving Achieving physical data Achieving logical data


independence is much easier independence is more
as compared to logical data difficult as compared to
independence. physical data independence.

Degree of Changes The changes made at the Any changes made at the
Required physical level need not be physical level need to be
made at the application level. made at the application level
as well.
P a g e | - 34 -

Internal We may or may not need the Making modifications at the


Modification modifications at the internal logical level is a prerequisite
level for improving the whether we want to change
performance of a system’s the database structure or not.
structure.

Type of Schema The internal schema is the The conceptual schema is the
primary concern. primary concern.

Examples For example, altering the For example, adding,


compression techniques, deleting, or modifying any
storage devices changes, and attribute in a system.
changes in the hashing
algorithms.

5. Classification of DBMS

I. Classification Based on Data Model

The most popular data model in use today is the relational data model. Well-known
DBMSs like Oracle, MS SQL Server, DB2 and My SQL support this model. Other
traditional models, such as hierarchical data models and network data models, are
still used in industry mainly on mainframe platforms. This model is a database
management system in which information is represented in the form of objects as
used in object-oriented programming. Object-oriented databases are different from
relational databases, which are table-oriented.

II. Classification Based on User Numbers

A DBMS can be classification based on the number of users it supports. It can be


a single-user database system, which supports one user at a time, or a multiuser
database system, which supports multiple users concurrently.
P a g e | - 35 -

III. Classification Based on Database Distribution

There are four main distribution systems for database systems and these, in turn,
can be used to classify the DBMS.

 Centralized systems

With a centralized database system, the DBMS and database are stored at a single
site that is used by several other systems too.

In the early 1980s, many Canadian libraries used the GEAC 8000 to convert their
manual card catalogues to machine-readable centralized catalogue systems. Each
book catalogue had a barcode field similar to those on supermarket products.

 Distributed database system

In a distributed database system, the actual database and the DBMS software are
distributed from various sites that are connected by a computer network.
P a g e | - 36 -

 Homogeneous distributed database systems

Homogeneous distributed database systems use the same DBMS software from
multiple sites. Data exchange between these various sites can be handled easily.
For example, library information systems by the same vendor, such as Geac
Computer Corporation, use the same DBMS software which allows easy data
exchange between the various Geac library sites.

 Heterogeneous distributed database systems

In a heterogeneous distributed database system, different sites might use different


DBMS software, but there is additional common software to support data exchange
between these sites. For example, the various library database systems use the
same machine-readable cataloguing (MARC) format to support library record data
exchange.

Unit – 3
1. Why Database Security is Important?

A breach of data integrity in databases. The amount of damage an incident like a


data breach can cause our business is contingent on various consequences or
elements. Security of databases refers to the array of controls, tools, and
procedures designed to ensure and safeguard confidentiality, integrity, and
accessibility.
P a g e | - 37 -

o Intellectual property that is compromised: Our intellectual property--


trade secrets, inventions, or proprietary methods -- could be vital for our
ability to maintain an advantage in our industry. If our intellectual property
has been stolen or disclosed and our competitive advantage is lost, it could
be difficult to keep or recover.
o The damage to our brand's reputation: Customers or partners may not
want to purchase goods or services from us (or deal with our business) If
they do not feel they can trust our company to protect their data or their own.
o The concept of business continuity (or lack of it): Some businesses cannot
continue to function until a breach has been resolved.
o Penalties or fines to be paid for not complying: The cost of not complying
with international regulations like the Sarbanes-Oxley Act (SAO) or
Payment Card Industry Data Security Standard (PCI DSS) specific to
industry regulations on data privacy, like HIPAA or regional privacy laws
like the European Union's General Data Protection Regulation (GDPR)
could be a major problem with fines in worst cases in excess of many
million dollars for each violation.
o Costs for repairing breaches and notifying consumers about
them: Alongside notifying customers of a breach, the company that has
been breached is required to cover the investigation and forensic services
such as crisis management, triage repairs to the affected systems, and much
more.

2. Data Protection Tools and Platform

A variety of companies provide data protection platforms and tools. A


comprehensive solution should have all of the following features:
P a g e | - 38 -

o Discovery: The ability to discover is often needed to meet regulatory


compliance requirements. Look for a tool that can detect and categorize
weaknesses across our databases, whether they're hosted in the cloud or on-
premises. It will also provide recommendations to address any vulnerabilities that
are discovered.

o Monitoring of Data Activity: The solution should be capable of monitoring and


analysing the entire data activity in all databases, whether our application is on-
premises, in the cloud, or inside a container. It will alert us to suspicious activity in
real-time to allow us to respond more quickly to threats. It also provides visibility
into the state of our information through an integrated and comprehensive user
interface. It is also important to choose a system that enforces rules that govern
policies, procedures, and the separation of duties. Be sure that the solution we
select is able to generate the reports we need to comply with the regulations.

o The ability to Tokenize and Encrypt Data: In case of an incident, encryption


is an additional line of protection against any compromise. Any software we
choose to use must have the flexibility to protect data cloud, on-premises hybrid, or
multi-cloud environments. Find a tool with volume, file, and application
encryption features that meet our company's regulations for compliance. This could
require tokenization (data concealing) or advanced key management of security
keys.

o Optimization of Data Security and Risk Analysis: An application that will


provide contextual insights through the combination of security data with advanced
analytics will allow users to perform optimizing, risk assessment, and reporting in
a breeze. Select a tool that is able to keep and combine large amounts of recent and
historical data about the security and 7 state of your databases. Also, choose a
P a g e | - 39 -

solution that provides data exploration, auditing, and reporting capabilities via an
extensive but user-friendly self-service dashboard.

3. Why Firewall is Important?

confidential or sensitive data that it is a big responsibility to protect it from


exposure or theft. Most likely there is someone interested in your sensitive
information misuse.

1. Your competitors want to get a piece of your business

2. Bad guys are planning to steal your data to sell it on the black market or
blackmail you.

3. There are some hackers that breach the databases just for fun. It provides
efficient pro-active protection by continuously monitoring the database traffic,
preventing SQL injections, data breaches, and privileged user abuse.

 Database firewall defends your databases

Database firewalls mostly rely on “signature analysis” method. These “signatures”


resemble any SQL statement sequences known as typically used by hackers. The
firewall intercepts incoming SQL query and compares its code with known
signatures.

Signature lists are being continually updated to enable firewalls to defend against
the latest threats hitting databases. Some database firewalls are able to collect
information on client application type, IP address, location, time, etc. and consider
it while performing signature analysis.
P a g e | - 40 -

Of course, signature-based systems can identify only already-known threats — the


ones they know about. That’s why firewall developers employ another, but quite
similar, technology as well.

 The White List

The White List contains SQL statement sequences routinely used in given database
environment (thus considered as safe). Database firewall compares all the
incoming queries with the White List statements to define if it should ignore them.

 The Black List

This list contains the description of potential threats. If any SQL statement detected
by a firewall is present in the Black List, that query will be blocked right away.

 Security Steps

 Database Activity Monitoring – Data Audit

At the data auditing stage data quality is ensured right from the beginning of the BI
(Business Intelligence) process and to the final objective accomplishment. At this
stage, data validation and data staging are performed. Data audit ensures that data
quality remains at the required level throughout the business process.
P a g e | - 41 -

DataSunrise helps you to administer data evaluation process due to its Data Audit
component. Information collected by the Data Audit is validated and reliable
enough to be used for SQL analysis purposes and prevent data breach or
unauthorized database access.

 Data Security

Prevention of unauthorized queries and SQL injections in the first place is even
more important. DataSunrise intercepts all the SQL queries and analyzes them to
decide which are the authorized ones and which are malicious ones. Suspicious
queries are blocked by the firewall.

 Data Masking

The feature is helpful when a company needs to provide access to its databases for
third-party employees for testing or software developing purposes. Data masking
tools change the original content with random values or certain characters, leaving
it available for testing purposes.

 Sensitive Data Discovery

High-risk data such as credit card numbers, account passwords, personally


identifiable data require special attention. Sensitive Data Discovery feature enables
P a g e | - 42 -

you to quickly detect and manage confidential data across different platforms.
Search patterns are editable so you can perform a search for any specific pattern.

4. Types of Distributed Database System.

1. Homogeneous Database: In a homogeneous database, all different sites store


database identically. The operating system, database management system, and the
data structures used – all are the same at all sites. Hence, they’re easy to manage.

Types of Homogeneous Distributed Database


There are two types of homogeneous distributed database are:

i. Autonomous − Each database is independent that functions on its own.


They are integrated by a controlling application and use message passing to
share data updates.
ii. Non-autonomous − Data is distributed across the homogeneous nodes and a
central or master DBMS co-ordinates data updates across the sites.

2. Heterogeneous Database: In a heterogeneous distributed database, different


sites can use different schema and software that can lead to problems in query
processing and transactions. Also, a particular site might be completely unaware
of the other sites. Different computers may use a different operating system,
different database application. They may even use different data models for the
database. Hence, translations are required for different sites to communicate.

Types of Heterogeneous Distributed Databases

i. Federated − The heterogeneous database systems are independent in nature


and integrated together so that they function as a single database system.
ii. Un-federated − The database systems employ a central coordinating
module through which the databases are accessed.

Unit – 4
1. How Data warehouse works?

A Data Warehouse works as a central repository where information arrives from


one or more data sources. Data flows into a data warehouse from the transactional
system and other relational databases.
P a g e | - 43 -

Data may be:

1. Structured

2. Semi-structured

3. Unstructured data

The data is processed, transformed, and ingested so that users can access the
processed data in the Data Warehouse through Business Intelligence tools, SQL
clients, and spreadsheets. A data warehouse merges information coming from
different sources into one comprehensive database. By merging all of this
information in one place, an organization can analyze its customers more
holistically. This helps to ensure that it has considered all the information
available. Data warehousing makes data mining possible.

Data Warehousing integrates data and information collected from various sources
into one comprehensive database. For example, a data warehouse might combine
customer information from an organization’s point-of-sale systems, its mailing
lists, website, and comment cards. It might also incorporate confidential
information about employees, salary information, etc. Businesses use such
components of data warehouse to analyze customers.

2. Advantages and Disadvantages of data mining

 Advantages of Data Mining

 The Data Mining technique enables organizations to obtain knowledge-based


data.

 Data mining enables organizations to make lucrative modifications in operation


and production.

 Compared with other statistical data applications, data mining is a cost-efficient.

 Data Mining helps the decision-making process of an organization.

 It facilitates the automated discovery of hidden patterns as well as the prediction


of trends and behaviors.

 It can be induced in the new system as well as the existing platforms.


P a g e | - 44 -

 It is a quick process that makes it easy for new users to analyze enormous
amounts of data in a short time.

 Disadvantages of Data Mining

 There is a probability that the organizations may sell useful data of customers to
other organizations for money. As per the report, American Express has sold credit
card purchases of their customers to other organizations.

 Many data mining analytics software is difficult to operate and needs advance
training to work on.

 Different data mining instruments operate in distinct ways due to the different
algorithms used in their design. Therefore, the selection of the right data mining
tools is a very challenging task.

 The data mining techniques are not precise, so that it may lead to severe
consequences in certain conditions.

3. Difference Between Spatial Database and Non-Spatial Database.

Spatial Data
 It answers where things are.
 It describes the absolute and relative location of geographical objects.
 It is stored in a shape file or geo database.
 Generally multi-dimensional and auto-correlated.
 Satellite maps and scanned images help to obtain spatial data.
 Relationships among spatial attributes are implicit. For example, boundaries
1 and 2 could be neighbors, but cannot be explicitly represented.
 Types of spatial data: Raster Data – Composed of grids or pixels and
identified by rows and columns. Vector Data – Composed of points, lines,
and polygons.
 Examples of spatial data are maps, photographs, satellite images, scanned
images, roads rivers, contours, etc.
Non-spatial Data
 It answers what and how much things are.
 Characteristics of geographical features that are qualitative or quantitative in
nature.
 It is stored in a database table.
 Generally one-dimensional and independent.
P a g e | - 45 -

 Forest managers, fire departments, environmental groups, and online media


helps to obtain non-spatial data.
 Relationships among non-spatial attributes are explicit. For example, two
different attributes may be a part of, a subclass of, a member of, or
represented in the form of arithmetic values or orders.
 Types of non-spatial data: Nominal Data, Ordinal Data, Interval Data, Ratio
Data
 Examples of non-spatial data are names, phone numbers, area, postal code,
rainfall, population, etc.

4. Multimedia Database in DBMS

Multimedia database is the collection of interrelated multimedia data that includes


text, graphics (sketches, drawings), images, animations, video, audio etc and have
vast amounts of multisource multimedia data. The framework that manages
different types of multimedia data which can be stored, delivered and utilized in
different ways is known as multimedia database management system. There are
three classes of the multimedia database which includes static media, dynamic
media and dimensional media.

 Content of Multimedia Database management system:

1. Media data – The actual data representing an object.

2. Media format data – Information such as sampling rate, resolution, encoding


scheme etc. about the format of the media data after it goes through the acquisition,
processing and encoding phase.

3. Media keyword data – Keywords description relating to the generation of data.


It is also known as content descriptive data. Example: date, time and place of
recording.

4. Media feature data – Content dependent data such as the distribution of colors,
kinds of texture and different shapes present in data.
P a g e | - 46 -

 Types of multimedia applications based on data management


characteristic are :

1. Repository applications – A Large amount of multimedia data as well as meta-


data(Media format date, Media keyword data, Media feature data) that is stored for
retrieval purpose, e.g., Repository of satellite images, engineering drawings,
radiology scanned pictures.

2. Presentation applications – They involve delivery of multimedia data subject


to temporal constraint. Optimal viewing or listening requires DBMS to deliver data
at certain rate offering the quality of service above a certain threshold. Here data is
processed as it is delivered. Example: Annotating of video and audio data, real-
time editing analysis.

3. Collaborative work using multimedia information – It involves executing a


complex task by merging drawings, changing notifications. Example: Intelligent
healthcare network.

 There are still many challenges to multimedia databases, some of which


are:

1. Modelling – Working in this area can improve database versus information


retrieval techniques thus, documents constitute a specialized area and deserve
special consideration.

2. Design – The conceptual, logical and physical design of multimedia databases


has not yet been addressed fully as performance and tuning issues at each level are
far more complex as 27 they consist of a variety of formats like JPEG, GIF, PNG,
MPEG which is not easy to convert from one form to another.

3. Storage – Storage of multimedia database on any standard disk presents the


problem of representation, compression, mapping to device hierarchies, archiving
P a g e | - 47 -

and buffering during input-output operation. In DBMS, a” BLOB” (Binary Large


Object) facility allows untyped bitmaps to be stored and retrieved.

4. Performance – For an application involving video playback or audio-video


synchronization, physical limitations dominate. The use of parallel processing may
alleviate some problems but such techniques are not yet fully developed. Apart
from this multimedia database consume a lot of processing time as well as
bandwidth.

5. Queries and retrieval –For multimedia data like images, video, audio
accessing data through query opens up many issues like efficient query
formulation, query execution and optimization which need to be worked upon.

 Areas where multimedia database is applied are:

 Documents and record management: Industries and businesses that keep


detailed records and variety of documents. Example: Insurance claim record.

 Knowledge dissemination: Multimedia database is a very effective tool for


knowledge dissemination in terms of providing several resources. Example:
Electronic books.

 Education and training: Computer-aided learning materials can be designed


using multimedia sources which are nowadays very popular sources of learning.
Example: Digital libraries.

 Marketing, advertising, retailing, entertainment and travel. Example: a virtual


tour of cities.

 Real-time control and monitoring : Coupled with active database technology,


multimedia presentation of information can be very effective means for monitoring
and controlling complex tasks Example: Manufacturing operation control.
P a g e | - 48 -

You might also like