Professional Documents
Culture Documents
DATABASE
DATABASE
RESIDENTIAL
SCHOOL, KATABAGA
BRJN
20XX 1
S.NO INDEX PAGE N
O.
1 CERTIFICATE 3
2 ACCKNOWLEDEMENT 13
3 DATABASE MANAGEMENT SYSTEM 14
4 WHY IS DATABASE NEEDED ? 15
5 ADVANTAGES OF DATABASE 17
6 DISADVANTAGES OF DATABASE 18
7 INTRODUCTION TO FEE MANAGEMENT 24
8 ABOUT THE PROJECT 25
9 OBJECTIVE AND SCOPE OF THE PROJECT 26
10 ABOUT THE SYSTEM 27
11 EXISTING SYSTEM AND DRAWBACK 28
12 PROPOSED SYSTEM AND ADVANTAGES 29
13 FEE MANAGEMENT REPORT 30
14 CONCLUSION 43
15 BIBLIOGRAPHY 44
INFORMATION TECHNOLOGY
BCRS BRJN
"FEES MANAGEMENT"
INFORMATION TECHNOLOGY
SESSION : 2023-24
SUBMITTED BY :
PALAK SARNA
CLASS : X
ROLL NO : 23
"FEES MANAGEMENT"
INFORMATION TECHNOLOGY
SESSION : 2023-24
SUBMITTED BY :
Manshi Singh
CLASS : X
ROLL NO : 16
"FEES MANAGEMENT"
INFORMATION TECHNOLOGY
SESSION : 2023-24
SUBMITTED BY :
SUNNY RAI
CLASS : X
ROLL NO : 35
"FEES MANAGEMENT"
INFORMATION TECHNOLOGY
SESSION : 2023-24
SUBMITTED BY :
TAUFIQUE ALAM
CLASS : X
ROLL NO : 35
"FEES MANAGEMENT"
INFORMATION TECHNOLOGY
SESSION : 2023-24
SUBMITTED BY :
MITHLESH RAY
CLASS : X
ROLL NO : 18
• Complex design
Database design is complex, difficult and time consuming.
• Damaged part
If one part of database is corrupted or damaged, then entire database may get
affected.
• Compatibility
DBMS software may not be compatible with other software systems or
platforms, making it difficult to integrate with other applications.
• Security
A DBMS can be vulnerable to security breaches if not properly configured and
managed. This can lead to data loss or theft.
20XX Pitch Deck 18
• Data Security
Data Security is an important concept in a database. Only authorized users should be allowed to access
the database and their identity should be authenticated using a username and password. Unauthorized
users should not be allowed to access the database under any circumstances as it violates the integrity
constraints.
• Privacy
The privacy rule in a database states that only the authorized users can access a database according to its
privacy constraints. To secure data levels are set in the database and a user can only view the data which is
allowed to be seen. For example - In social networking sites, access constraints are different for different
accounts a user may want to access.
• Backup and Recovery
Database Management System automatically takes care of backup and recovery. The users don't need to
backup data periodically because this is taken care of by the DBMS. Moreover, it also restores the
database after a crash or system failure to its previous condition.
• Data Consistency
Data consistency is ensured in a database because there is no data redundancy. Data Consistency means
there should be multiple mismatching copies of the same data. All data appears consistently across the
database and must be same for all the users viewing the database. Moreover, any changes made to the
database are immediately reflected to all the users and there is no data inconsistency.
38