You are on page 1of 2

HAPITA, NYSSAH CHEILONE ANNE A.

BSCE 4-2
CENG116B – DATABASE MANAGEMENT IN CONSTRUCTION PURPOSE OF DBMS

LESSON 1: WHAT IS DATABASE MANAGEMENT ✓ Provides secure and survivable medium for
storage and retrieval of data
Data – collection of facts and figures which can be
✓ Data shared among several users and is
processed to produce information.
persistent
Database – a collection of data ✓ Provides mechanism to create, access, and
manipulate data without compromising
DATABASE MANAGEMENT SYSTEM (DBMS) security and integrity of data
A DBMS is a collection of data which ✓ Redundancy can be reduced
✓ Inconsistency can be avoided
✓ Provide management if databases
✓ Used to store, update, retrieve, manipulate, CONVENTIONAL FILE PROCESSING SYSTEM VS
and helps to produce information
DATABASE SYSTEM
✓ Control access to data
✓ Provide convenient and efficient to retrieve ▪ A data can be stored in either of the two.
data ▪ In Conventional File Processing System, each
✓ Supports secure, atomic access to very large
and every subsystem of the information will
amounts of data
✓ Provide concurrent access (different users at have its own set of files. As a result, there will
the same time) be duplication of data between various
✓ Provides an interface between users and the subsystems.
database ▪ In Database Systems, there is a single
✓ Backup and Recovery in event of a system centralized database which minimizes the
failure redundancy of data to a greater extent.
✓ Security – password allocation and access
rights to particular layouts FILE PROCESSING SYSTEM

APPLICATION OF DBMS - Stores permanent records in various files and


1. SALES – For customer, product, and purchase it needs different application programs to
information. extract records from, and add records to the
2. ACCOUNTING – For payments, receipts, appropriate files.
account balances, assets, and other
DISADVANTAGES OF FILE PROCESSING SYSTEM
accounting information
3. HUMAN RESOURCES – For information about 1. DATA REDUNDANCY AND INCONSISTENCY
employees, salaries, payroll taxes, benefits, Data redundancy – same information may be
and generation of paychecks. duplicated in several places. Ex. Customer
4. BANKING – For customer, information, Name, Address. Errors are generated, time
account, loans, and transaction. entering data is wasted, computer resources
5. CREDIT CARD TRANSACTION – For purchases are needlessly taken up and updates can be
on credit cards and generation of monthly an enormous problem.
statements. Data inconsistency – all copies may not be
6. UNIVERSITIES – For students’ information, updated properly; it will become a problem.
course registration, and grades. Ex. Information is duplicated in each system.
7. AIRLINE – For reservation and schedule
information. Airline were among the first to 2. DIFFICULTY IN ACCESSING DATA
use database in geographically distributed - May have to write a new application program
manner terminals situated around the world to satisfy an unusual request. Ex: Find all
accessed the central database system through customers with the same postal code. Could
phone lines and other data network. generate this data manually, but a long job.
HAPITA, NYSSAH CHEILONE ANNE A.
BSCE 4-2

3. DATA ISOLATION
- Data in different files
- Data in different formats
- Difficult to write new application programs

4. INTEGRITY PROBLEMS
- This is the quality by which information from
the system can be trusted.
- The problems already stated show that
information can be out of date, can have
different values in different parts of the
system, can be inaccurate, etc.
- Data may be required to satisfy constraints.
- Example: No account balance below 25 000
- Difficult to enforce or to change constraints

5. ATOMICITY PROBLEMS
- Transfer of funds from one account to
another should either complete or not
happen at all.

6. CONCURRENT-ACCESS ANOMALIES
- Concurrent accessed needed for performance.
Uncontrolled concurrent accesses can lead to
inconsistencies
- Example: Two people reading a balance and
updating it at the same time

7. SECURITY PROBLEMS
- Lack o security example: There are no
restrictions on who can see what
- Every used of the system should be able to
access only the data the are permitted to see.
- Example: payroll people only handle
employee records and cannot see customer
accounts.
- Difficult to enforce with application programs

You might also like