0% found this document useful (0 votes)
12 views9 pages

Overview of Database Management Systems

Database Management Systems (DBMS) are software applications that manage and organize data, providing tools for data backup, integrity, and security. Different types of DBMS, such as Microsoft Access for small businesses and Oracle for large enterprises, cater to various data management needs. DBMS environments consist of software, hardware, and personnel, facilitating data input, processing, and output for decision support and reporting.

Uploaded by

cinema2i.rs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

Overview of Database Management Systems

Database Management Systems (DBMS) are software applications that manage and organize data, providing tools for data backup, integrity, and security. Different types of DBMS, such as Microsoft Access for small businesses and Oracle for large enterprises, cater to various data management needs. DBMS environments consist of software, hardware, and personnel, facilitating data input, processing, and output for decision support and reporting.

Uploaded by

cinema2i.rs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

DATABASE MANAGEMENT SYSTEMS

Principles and tips


on DBMS

Rayen Souai
01 - Introduction

02 - Examples of DBMS

03 - Environment of DBMS

04 - input and output of DBMS

05 - Conclusion
01 - Introduction

DBMS, or Database Management Systems, are software applications that manage and
organize data in databases. They allow for data to be captured, analyzed, and manipulated,
and provide tools for data backup and recovery, data integrity, and data security.

There are various types of DBMS, including relational, NoSQL, and graph DBMS, each
with its own strengths and weaknesses, and suitable for different types of applications and
environments.
02 - Examples of DBMS

There are many different DBMS available,


including Microsoft Access and Oracle. These
software programs provide a user-friendly
interface for interacting with the database, and
they can handle large amounts of data.

For example, Microsoft Access is a DBMS


designed for small businesses and individuals,
providing a simple and user-friendly interface
for managing data. It is suitable for managing
small to medium-sized databases, and it
can handle various types of data, including
text, numbers, images, and audio.

On the other hand, Oracle is a DBMS


designed for large enterprises, providing
advanced features for managing large and
complex databases. It is suitable for managing
large volumes of data, and it can handle
various types of data, including structured and
unstructured data.
03 - Environment of DBMS

A database environment is a
collective system of components that
comprise and regulates the group
of data, management, and use of
data, which consist of software,
hardware, people, techniques of
handling database.
04 - input and output of DBMS

INPUT PROCESS OUTPUT

Reports
Data

Processing and
Queries analysing data Decision support

Visualizations
Updates
Visualazations :

Graphs, charts, or other visual representations of data


or information that are generated from the database.

Reports :

Summaries and analysis of data presented in various


formats, such as financial reports, sales reports, or
inventory reports.

Decision Support :

Recommendations and insights derived from data analysis to support strategic


and operational decision-making.
05 - Conclusion

In summary, DBMS are essential tools for managing and


organizing data in various applications and environments, and
they provide a wide range of benefits, including data security, data
consistency, data sharing, and data backup and recovery, as well
as data manipulation and multiple user access.

Prioritize data security


measures to protect
sensitive information and
prevent unauthorized
access
Souai Rayen

You might also like