Dddnotes PDF
Dddnotes PDF
Dddnotes PDF
2. The advancement in the data base enables to add more data and program to
the system.
3. The capacity to store large amount of data necessary for user’s needs. They
are stored on direct accessible devices for one line support.
4. The control in the systems limits the access to the data base files and builds
the confidentiality of all data in these files.
5. The capacity to interrogating data files, retrieving and modifying data and
recording the changes.
The cost of designing and building special purpose software systems for Data
management tasks often prohibits otherwise cost effective automation. Data
base management systems are general purpose programs that dramatically
reduce the time necessary to computerize an application.
2. Security
3. Data independence
4. Shared data
5. Conflict resolution
6. Reduction of redundancies.
1. Integrity:
Centralised control can also ensure that adequate checks are incorporated in
the DBMS to provide data integrity. Data integrity means that the data
contained in the data base is both accurate and consistent. Therefore, Data
values being entered for storage could be checked to ensure that they fall
within a specified range and are of the correct format.
For example, the value for the age of an employee may be in the range of 16
and 75.
2. Security:
Data is of vital importance to an organization and may be confidential. Such
confidential data must not be accessed by un-authorized persons. The data
base administrator (DBA) who has the ultimate responsibility for the data in
the DBMS can ensure that proper access procedures are followed, including
proper authentication schemes for access to the DBMS and additional checks
before permitting access to sensitive data.
Different levels of security could be implemented for various types of data and
operations. The enforcement of security could be data value dependent (e.g., a
manager has access to the salary details of employees in his department only),
as well as data type dependent (but the manager cannot access the medical
history of any employee, including those in his department).
3. Data Independence:
Data independence is usually considered from two points of view; physical
data independence and logical data independence. Physical data independence
allows changes in the physical storage devices or organisation of the files to be
made without requiring changes in the conceptual view or any of the external
views and hence in the application programs using the data base.
Thus, the files may migrate from one type of physical media to another or the
file structure may change without any need for changes in the application
programs. Logical data independence implies that application programs need
not be changed if fields are added to an existing record; nor do they have to be
changed if fields not used by application programs are deleted.
4. Shared Data:
A data base allows the sharing of data under its control by any number of
application programs or users. In the example discussed earlier, the
applications for the public relations and payroll departments could share the
data contained for the record type employee.
5. Conflict Resolution:
Since the data base is under the control of the data base administrator (DBA),
he should resolve the conflicting requirements of various users and
applications. In essence, the DBA chooses the best file structure and access
method to get optimal performance for the critical applications, while
permitting less critical applications to continue to use the data base, albeit with
the relative response.
6. Reduction of Redundancies:
Centralised control of data by the DBA avoids unnecessary duplication of data
and effectively reduces the total amount of data storage required. It also
eliminates the extra processing necessary to trace the required data in a large
mass of data.
Disadvantages of DBMS:
Disadvantages of data base management system are:
1. Complexity of backup and recovery