Professional Documents
Culture Documents
On
INDEX
Page
S No. Topic Name Remarks
No.
1 Exercise 1
2 Exercise 2
3 Exercise 3
Exercise 1
1. Create a new database, save it on the desktop and name it “School Database”.
2. Create a Table in the school Database with the following structure using the
design mode:
Page |-5-
Exercise 2
Exercise 3
Exercise – 4
PART 1:
1. Create a table with the following field.
2. From Datasheet View, Click on File menu, and select Page Setup option.
P a g e | - 15 -
5. Print a copy.
P a g e | - 16 -
PART II:
6. Print a copy.
Exercise – 5
PART I:
4. Print a copy.
P a g e | - 21 -
PART II: The Company would like a report of all branches, grouped by type of
software and sorted by the branch office name. Create a report of your own design
that will display this information. Save and name the report SOFTWARE. Print a
copy.
P a g e | - 22 -
UNIT-1
DATA INFORMATION
making.
Information.
10. It allows to stores the data as 10. It stores data as well as defined
isolated data files and entities. constraints and interrelation.
11. It does not provide support for 11. It is easy to implement complicated
complicated transactions. transactions.
12. The centralization process is hard. 12. The centralization is easy to achieve.
13. It doesn’t offer backup and recovery 13. It provides backup and recovery of
P a g e | - 24 -
14. There is no efficient query 14. It can easily query data in a database
processing. using SQL language.
2. Data Integrity : Integrity of data means that data in database is always accurate,
such that incorrect information cannot be stored in database. In order to maintain
the integrity of data, some integrity constraints are enforced on the database.
3. Sharing of Data : A database allows the sharing of data under its control by any
number of application program or users.
DISADVANTAGES
4. Performance : The database management system works very fast when the data is
less to work on, But as the data of the organization grows, the system becomes
heavier and heavier and the performance of a DBMS decreases, so sometimes the
file management system is preferred over the database management system.
6. Additional Hardware costs: The disk storage requirements for the DBMS and
the database may necessitate the purchase of additional storage space. Furthermore,
to achieve the required performance it may be necessary to purchase a larger
machine, perhaps even a machine dedicated to running the DBMS.
1. Hardware
The hardware is the actual computer system used for keeping and accessing the
database. The conventional DBMS hardware consists of secondary storage devices
such as hard disks. Databases run on the range of machines from micro computers
to mainframes.
2. Software
Software is the actual DBMS between the physical database and the users of the
system. All the requests from the user for accessing the database are handled by
DBMS.
3. Data
It is an important component of the database management system. The main task of
DBMS is to process the data. Databases are used to store the data, retrieved, and
updated to and from the databases.
4. Users
There are a number of users who can access or retrieve the data on demand using
the application and the interfaces provided by the DBMS.
The users of the database can be classified into different groups –
1. Database Administrator (DBA) :
A database administrator (DBA) is the information technician responsible for
directing and performing all activities related to maintaining a successful database
environment. A DBA makes sure an organization's databases and related
applications operate functionally and efficiently.
DBA also monitors the recovery and backup and provide technical support.
The DBA has a DBA account in DBMS which called a system or super user
account.
DBA repairs damage caused due to hardware and software failures.
2. Native / Parametric End Users :
P a g e | - 27 -
Parametric End Users are the unsophisticated who doesn’t have any DBMS
knowledge but they frequently use the data base applications in their daily life to
get the desired results .
3. System Analyst :
It is a user who analyzes the requirements of parametric end users. They check
whether all the requirements of end users are satisfied.
4. Sophisticated Users :
A database administrator (DBA) is the information technician responsible for
directing and performing all activities related to maintaining a successful database
environment. A DBA makes sure an organization's databases and related
applications operate functionally and efficiently.
5. Data Base Designers :
A database designer is in charge of designing, developing, executing and
preserving a company's data management systems. One of the most important
responsibilities of a database designer is to form relationships between various
elements of data and give it a logical
1. Application Users :
An application program is a comprehensive, self-contained program that performs
a particular function directly for the user. Among many others, application
programs include – Email, Web browsers, Games, Word processors, accounting
software etc.
Casual users the use of who occasionally use/access the data base but each time
when they accept the data base they require the new information for example
middle or higher level manager.
P a g e | - 28 -
UNIT – 2
The architecture can be either single-tier or multi-tier like 1-tier architecture, 2-tier
architecture, 3-tier architecture, n-tier architecture, etc.
The database is directly available to the user, the user can directly sit on the
DBMS and use it i.e.; the client, server and the database all present on the same
machine.
It is similar to a basic client-server model. The application at the client end directly
communicates with the database at the server-side. API like ODBC, JDBC are
used for this interaction. The server side is responsible for providing query
processing and transaction management functionalities. On the client-side, the user
interfaces and application programs are runs. The application on the client-side
establishes a connection with the server-side in order to communicate with the
DBMS.
Application Server
Application Client
Advantages
Disadvantages
Three-Tier Architecture :
The three tier architecture contains another layer between the client and
server. In this architecture, client can’t directly communicate with the server.
The application on the client-ends interacts with an application server which
further communicates with the database system.
End user has no idea about the existence of the database beyond the
application server. The database also has no idea about any other user
beyond the application.
The 3-Tier architecture is used in case of large web applications.
It lies between the conceptual level and internal level. Its role is to define the
correspondence between the records and fields of the conceptual level and files and
data structures of the internal level.
It lies between the external level and conceptual level. Its role is to define the
correspondence between a particular external and conceptual view.
Frequency of changes It does not change very It does not change very
frequently.It changes very frequently.It changes very
frequently.UsesWe use frequently.UsesWe use
Schema for defining the Schema for defining the
basic structure of any basic structure of any
given database. It defines given database. It defines
how the available needs to how the available needs to
get stored.We use get stored.We use
Instance for referring to a Instance for referring to a
set of information at any set of information at any
given instance/ time. given instance/ time.
Degree of Changes The changes made at the Any changes made at the
Required physical level need not be physical level need to be
made at the application level. made at the application level
as well.
P a g e | - 34 -
Type of Schema The internal schema is the The conceptual schema is the
primary concern. primary concern.
5. Classification of DBMS
The most popular data model in use today is the relational data model. Well-known
DBMSs like Oracle, MS SQL Server, DB2 and My SQL support this model. Other
traditional models, such as hierarchical data models and network data models, are
still used in industry mainly on mainframe platforms. This model is a database
management system in which information is represented in the form of objects as
used in object-oriented programming. Object-oriented databases are different from
relational databases, which are table-oriented.
There are four main distribution systems for database systems and these, in turn,
can be used to classify the DBMS.
Centralized systems
With a centralized database system, the DBMS and database are stored at a single
site that is used by several other systems too.
In the early 1980s, many Canadian libraries used the GEAC 8000 to convert their
manual card catalogues to machine-readable centralized catalogue systems. Each
book catalogue had a barcode field similar to those on supermarket products.
In a distributed database system, the actual database and the DBMS software are
distributed from various sites that are connected by a computer network.
P a g e | - 36 -
Homogeneous distributed database systems use the same DBMS software from
multiple sites. Data exchange between these various sites can be handled easily.
For example, library information systems by the same vendor, such as Geac
Computer Corporation, use the same DBMS software which allows easy data
exchange between the various Geac library sites.
Unit – 3
1. Why Database Security is Important?
solution that provides data exploration, auditing, and reporting capabilities via an
extensive but user-friendly self-service dashboard.
2. Bad guys are planning to steal your data to sell it on the black market or
blackmail you.
3. There are some hackers that breach the databases just for fun. It provides
efficient pro-active protection by continuously monitoring the database traffic,
preventing SQL injections, data breaches, and privileged user abuse.
Signature lists are being continually updated to enable firewalls to defend against
the latest threats hitting databases. Some database firewalls are able to collect
information on client application type, IP address, location, time, etc. and consider
it while performing signature analysis.
P a g e | - 40 -
The White List contains SQL statement sequences routinely used in given database
environment (thus considered as safe). Database firewall compares all the
incoming queries with the White List statements to define if it should ignore them.
This list contains the description of potential threats. If any SQL statement detected
by a firewall is present in the Black List, that query will be blocked right away.
Security Steps
At the data auditing stage data quality is ensured right from the beginning of the BI
(Business Intelligence) process and to the final objective accomplishment. At this
stage, data validation and data staging are performed. Data audit ensures that data
quality remains at the required level throughout the business process.
P a g e | - 41 -
DataSunrise helps you to administer data evaluation process due to its Data Audit
component. Information collected by the Data Audit is validated and reliable
enough to be used for SQL analysis purposes and prevent data breach or
unauthorized database access.
Data Security
Prevention of unauthorized queries and SQL injections in the first place is even
more important. DataSunrise intercepts all the SQL queries and analyzes them to
decide which are the authorized ones and which are malicious ones. Suspicious
queries are blocked by the firewall.
Data Masking
The feature is helpful when a company needs to provide access to its databases for
third-party employees for testing or software developing purposes. Data masking
tools change the original content with random values or certain characters, leaving
it available for testing purposes.
you to quickly detect and manage confidential data across different platforms.
Search patterns are editable so you can perform a search for any specific pattern.
Unit – 4
1. How Data warehouse works?
1. Structured
2. Semi-structured
3. Unstructured data
The data is processed, transformed, and ingested so that users can access the
processed data in the Data Warehouse through Business Intelligence tools, SQL
clients, and spreadsheets. A data warehouse merges information coming from
different sources into one comprehensive database. By merging all of this
information in one place, an organization can analyze its customers more
holistically. This helps to ensure that it has considered all the information
available. Data warehousing makes data mining possible.
Data Warehousing integrates data and information collected from various sources
into one comprehensive database. For example, a data warehouse might combine
customer information from an organization’s point-of-sale systems, its mailing
lists, website, and comment cards. It might also incorporate confidential
information about employees, salary information, etc. Businesses use such
components of data warehouse to analyze customers.
It is a quick process that makes it easy for new users to analyze enormous
amounts of data in a short time.
There is a probability that the organizations may sell useful data of customers to
other organizations for money. As per the report, American Express has sold credit
card purchases of their customers to other organizations.
Many data mining analytics software is difficult to operate and needs advance
training to work on.
Different data mining instruments operate in distinct ways due to the different
algorithms used in their design. Therefore, the selection of the right data mining
tools is a very challenging task.
The data mining techniques are not precise, so that it may lead to severe
consequences in certain conditions.
Spatial Data
It answers where things are.
It describes the absolute and relative location of geographical objects.
It is stored in a shape file or geo database.
Generally multi-dimensional and auto-correlated.
Satellite maps and scanned images help to obtain spatial data.
Relationships among spatial attributes are implicit. For example, boundaries
1 and 2 could be neighbors, but cannot be explicitly represented.
Types of spatial data: Raster Data – Composed of grids or pixels and
identified by rows and columns. Vector Data – Composed of points, lines,
and polygons.
Examples of spatial data are maps, photographs, satellite images, scanned
images, roads rivers, contours, etc.
Non-spatial Data
It answers what and how much things are.
Characteristics of geographical features that are qualitative or quantitative in
nature.
It is stored in a database table.
Generally one-dimensional and independent.
P a g e | - 45 -
4. Media feature data – Content dependent data such as the distribution of colors,
kinds of texture and different shapes present in data.
P a g e | - 46 -
5. Queries and retrieval –For multimedia data like images, video, audio
accessing data through query opens up many issues like efficient query
formulation, query execution and optimization which need to be worked upon.