Professional Documents
Culture Documents
BSCE 4-2
CENG116B – DATABASE MANAGEMENT IN CONSTRUCTION PURPOSE OF DBMS
LESSON 1: WHAT IS DATABASE MANAGEMENT ✓ Provides secure and survivable medium for
storage and retrieval of data
Data – collection of facts and figures which can be
✓ Data shared among several users and is
processed to produce information.
persistent
Database – a collection of data ✓ Provides mechanism to create, access, and
manipulate data without compromising
DATABASE MANAGEMENT SYSTEM (DBMS) security and integrity of data
A DBMS is a collection of data which ✓ Redundancy can be reduced
✓ Inconsistency can be avoided
✓ Provide management if databases
✓ Used to store, update, retrieve, manipulate, CONVENTIONAL FILE PROCESSING SYSTEM VS
and helps to produce information
DATABASE SYSTEM
✓ Control access to data
✓ Provide convenient and efficient to retrieve ▪ A data can be stored in either of the two.
data ▪ In Conventional File Processing System, each
✓ Supports secure, atomic access to very large
and every subsystem of the information will
amounts of data
✓ Provide concurrent access (different users at have its own set of files. As a result, there will
the same time) be duplication of data between various
✓ Provides an interface between users and the subsystems.
database ▪ In Database Systems, there is a single
✓ Backup and Recovery in event of a system centralized database which minimizes the
failure redundancy of data to a greater extent.
✓ Security – password allocation and access
rights to particular layouts FILE PROCESSING SYSTEM
3. DATA ISOLATION
- Data in different files
- Data in different formats
- Difficult to write new application programs
4. INTEGRITY PROBLEMS
- This is the quality by which information from
the system can be trusted.
- The problems already stated show that
information can be out of date, can have
different values in different parts of the
system, can be inaccurate, etc.
- Data may be required to satisfy constraints.
- Example: No account balance below 25 000
- Difficult to enforce or to change constraints
5. ATOMICITY PROBLEMS
- Transfer of funds from one account to
another should either complete or not
happen at all.
6. CONCURRENT-ACCESS ANOMALIES
- Concurrent accessed needed for performance.
Uncontrolled concurrent accesses can lead to
inconsistencies
- Example: Two people reading a balance and
updating it at the same time
7. SECURITY PROBLEMS
- Lack o security example: There are no
restrictions on who can see what
- Every used of the system should be able to
access only the data the are permitted to see.
- Example: payroll people only handle
employee records and cannot see customer
accounts.
- Difficult to enforce with application programs