0% found this document useful (0 votes)
66 views

Week01 - Introduction To Databases

This document provides an introduction to database systems, including examples of database applications, the limitations of traditional file-based systems, and the advantages of adopting a database approach using a database management system. Key topics covered include the components and roles in a database environment, the history of database systems, and the advantages and disadvantages of implementing a DBMS.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Week01 - Introduction To Databases

This document provides an introduction to database systems, including examples of database applications, the limitations of traditional file-based systems, and the advantages of adopting a database approach using a database management system. Key topics covered include the components and roles in a database environment, the history of database systems, and the advantages and disadvantages of implementing a DBMS.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 22

Database I

Background

Introduction to Databases

1
Examples of Database
Applications
 Purchases from the supermarket
 Purchases using your credit card
 Booking a holiday at the travel agents
 Using the local library
 Taking out insurance
 Renting a video
 Using the Internet
 Studying at university

2
File-Based Systems
 Collection of application programs that
perform services for the end users (e.g.
reports).

 Each program defines and manages its


own data.

3
File-Based Processing

4
Limitations of File-Based
Approach
 Separation and isolation of data
 Each program maintains its own set of data.
 Users of one program may be unaware of
potentially useful data held by other programs.

 Duplication of data
 Same data is held by different programs.
 Wasted space and potentially different values
and/or different formats for the same item.

5
Limitations of File-Based
Approach
 Data dependence
 File structure is defined in the program code.

 Incompatible file formats


 Programs are written in different languages, and so
cannot easily access each other’s files.

 Fixed Queries/Proliferation of application


programs
 Programs are written to satisfy particular functions.
 Any new requirement needs a new program.
6
Database Approach
 Arose because:
 Definition of data was embedded in application
programs, rather than being stored separately and
independently.
 No control over access and manipulation of data
beyond that imposed by application programs.

 Result:
 the database and Database Management System
(DBMS).

7
Database
 Shared collection of logically related data
(and a description of this data), designed to
meet the information needs of an
organization.
 System catalog (metadata) provides
description of data to enable program–data
independence.
 Logically related data comprises entities,
attributes, and relationships of an
organization’s information.
8
Database Management System
(DBMS)
 A software system that enables users to
define, create, maintain, and control
access to the database.
 (Database) application program: a
computer program that interacts with
database by issuing an appropriate
request (SQL statement) to the DBMS.

9
Database Management System
(DBMS)

10
Database Approach
 Data definition language (DDL).
 Permits specification of data types, structures and any
data constraints.
 All specifications are stored in the database.

 Data manipulation language (DML).


 General enquiry facility (query language) of the data.

11
Database Approach
 Controlled access to database may
include:
 a security system
 an integrity system
 a concurrency control system
 a recovery control system
 a user-accessible catalog.

12
Views
 Allows each user to have his or her own
view of the database.

 A view is essentially some subset of the


database.

13
Views - Benefits
 Reduce complexity
 Provide a level of security
 Provide a mechanism to customize the
appearance of the database
 Present a consistent, unchanging picture
of the structure of the database, even if
the underlying database is changed

14
Components of DBMS
Environment

15
Components of DBMS
Environment
 Hardware
 Can range from a PC to a network of computers.
 Software
 DBMS, operating system, network software (if
necessary) and also the application programs.
 Data
 Used by the organization and a description
of this data called the schema.

16
Components of DBMS
Environment
 Procedures
 Instructions and rules that should be applied to the
design and use of the database and DBMS.
 People

17
Roles in the Database
Environment
 Data Administrator (DA)
 Database Administrator (DBA)
 Database Designers (Logical and
Physical)
 Application Programmers
 End Users (naive and sophisticated)

18
History of Database Systems
 First-generation
 Hierarchical and Network

 Second generation
 Relational

 Third generation
 Object-Relational
 Object-Oriented

19
Advantages of DBMSs
 Control of data redundancy
 Data consistency
 More information from the same amount of data
 Sharing of data
 Improved data integrity
 Improved security
 Enforcement of standards
 Economy of scale

20
Advantages of DBMSs
 Balance conflicting requirements
 Improved data accessibility and
responsiveness
 Increased productivity
 Improved maintenance through data
independence
 Increased concurrency
 Improved backup and recovery services

21
Disadvantages of DBMSs
 Complexity
 Size
 Cost of DBMS
 Additional hardware costs
 Cost of conversion
 Performance
 Higher impact of a failure

22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy