8
1) Define the followings, a) Data b) Database c) Database System d) Data Base Management System e) Data Warehouse f) Database Administrator g) DDL h) DML i) Entity j) Attributes 2) Briefly describe the advantages of DBMS using suitable examples. 3) What are the disadvantages of keeping DBMS. 4) What are the situations to not to have DBMS. 5) Draw a simple ER diagram with only starting entity and five attributes. Answers 1) a) Data Data is distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data. Data can exist in a variety of forms, as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a person's mind b) Database A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In

Tutorial1.docx

Embed Size (px)

Citation preview

Page 1: Tutorial1.docx

1) Define the followings,

a) Data

b) Database

c) Database System

d) Data Base Management System

e) Data Warehouse

f) Database Administrator

g) DDL

h) DML

i) Entity

j) Attributes

2) Briefly describe the advantages of DBMS using suitable examples.

3) What are the disadvantages of keeping DBMS.

4) What are the situations to not to have DBMS.

5) Draw a simple ER diagram with only starting entity and five attributes.

Answers

1)

a) Data

Data is distinct pieces of information, usually formatted in a special way. All software is

divided into two general categories: data and programs. Programs are collections

of instructions for manipulating data. Data can exist in a variety of forms, as numbers

or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored

in a person's mind

b) Database

A database is a collection of information that is organized so that it can easily be accessed,

managed, and updated. In one view, databases can be classified according to types of

content: bibliographic, full-text, numeric, and images.

c) Database System

Database system is a system to achieve an organized, store a large number of dynamical

associated data, facilitate for multi-user accessing to computer hardware, software and

data, that it is a computer system with database technology

d) Database Management System

A database management system (DBMS), sometimes just called a database manager, is a

program that lets one or more computer users create and access data in a database.

Page 2: Tutorial1.docx

e) Data Warehouse

Data warehouse is a system used for reporting and data analysis. these are central

repositories of integrated data from one or more disparate sources.

f) Database Administrator

A database administrator (DBA) is responsible for the performance, integrity and security

of a database. They will also be involved in the planning and development of the database

as well as troubleshooting any issues on behalf of the users.

g) DDL

It refers to Data Definition Language. A data definition language or data description

language (DDL) is a syntax similar to a computer programming language for defining data

structures, especially database schemas.

h) DML

DML refers to Data Manipulating Language. It  is a family of syntax elements similar to a

computer programming language used for selecting, inserting, deleting and updating data

in a database. Performing read-only queries of data is sometimes also considered a

component of DML

i) Entity

An entity is a single person, place, or thing about which data can be stored.

j) Attribute

An attribute describes the facts, details or characteristics of an entity.

2)

1. Controlling Data Redundancy:

In non-database systems (traditional computer file processing), each application program has its

own files. In this case, the duplicated copies of the same data are created at many places. In

DBMS, all the data of an organization is integrated into a single database. The data is recorded at

only one place in the database and it is not duplicated. For example, the dean's faculty file and the

faculty payroll file contain several items that are identical. When they are converted into database,

the data is integrated into a single database so that multiple copies of the same data are reduced to-

single copy.

In DBMS, the data redundancy can be controlled or reduced but is not removed completely.

Sometimes, it is necessary to create duplicate copies of the same data items in order to relate

tables with each other.

By controlling the data redundancy, you can save storage space. Similarly, it is useful for

retrieving data from database using queries.

Page 3: Tutorial1.docx

2. Data Consistency:

By controlling the data redundancy, the data consistency is obtained. If a data item appears only

once, any update to its value has to be performed only once and the updated value (new value of

item) is immediately available to all users.

If the DBMS has reduced redundancy to a minimum level, the database system enforces

consistency. It means that when a data item appears more than once in the database and is

updated, the DBMS automatically updates each occurrence of a data item in the database.

3. Data Sharing:

In DBMS, data can be shared by authorized users of the organization. The DBA manages the data

and gives rights to users to access the data. Many users can be authorized to access the same set of

information simultaneously. The remote users can also share same data. Similarly, the data of

same database can be shared between different application programs.

4. Data Integration:

In DBMS, data in database is stored in tables. A single database contains multiple tables and

relationships can be created between tables (or associated data entities). This makes easy to

retrieve and update data.

5. Integrity Constraints:

Integrity constraints or consistency rules can be applied to database so that the correct data can be

entered into database. The constraints may be applied to data item within a single record or they

may be applied to relationships between records.

Examples:

The examples of integrity constraints are:

(i) 'Issue Date' in a library system cannot be later than the corresponding 'Return Date' of a book.

(ii) Maximum obtained marks in a subject cannot exceed 100.

(iii) Registration number of BCS and MCS students must start with 'BCS' and 'MCS' respectively

etc. .There are also some standard constraints that are intrinsic in most of the DBMSs. These are;

Constraint

NameDescription

PRIMARY Designates a column or combination of columns as Primary Key and

Page 4: Tutorial1.docx

KEY therefore, values of columns cannot be repeated or left blank.

FOREIGN

KEY

Relates one table with another table.

 

UNIQUESpecifies that values of a column or combination of columns cannot be

repeated.

NOT NULL Specifies that a column cannot contain empty values.

CHECK Specifies a condition which each row of a table must satisfy.

Most of the DBMSs provide the facility for applying the integrity constraints. The database

designer (or DBA) identifies integrity constraints during database design. The application

programmer can also identify integrity constraints in the program code during developing the

application program. The integrity constraints are automatically checked at the time of data entry

or when the record is updated. If the data entry operator (end-user) violates an integrity constraint,

the data is not inserted or updated into the database and a message is displayed by the system. For

example, when you draw amount from the bank through ATM card, then your account balance is

compared with the amount you are drawing. If the amount in your account balance is less than the

amount you want to draw, then a message is displayed on the screen to inform you about your

account balance.

6. Data Security:

Data security is the protection of the database from unauthorized users. Only the authorized

persons are allowed to access the database. Some of the users may be allowed to access only a part

of database i.e., the data that is related to them or related to their department. Mostly, the DBA or

head of a department can access all the data in the database. Some users may be permitted only to

retrieve data, whereas others are allowed to retrieve as well as to update data. The database access

is controlled by the DBA. He creates the accounts of users and gives rights to access the database.

Typically, users or group of users are given usernames protected by passwords.

Most of the DBMSs provide the security sub-system, which the DBA uses to create accounts of

users and to specify account restrictions. The user enters his/her account number (or username)

and password to access the data from database. For example, if you have an account of e-mail in

the "hotmail.com" (a popular website), then you have to give your correct username and password

to access your account of e-mail. Similarly, when you insert your ATM card into the Auto Teller

Machine (ATM) in a bank, the machine reads your ID number printed on the card and then asks

you to enter your pin code (or password). In this way, you can access your account.

3)

1. Cost of Hardware & Software:

Page 5: Tutorial1.docx

A processor with high speed of data processing and memory of large size is required to run the

DBMS software. It means that you have to upgrade the hardware used for file-based system.

Similarly, DBMS software is also Very costly.

2. Cost of Data Conversion:

When a computer file-based system is replaced with a database system, the data stored into data

file must be converted to database files. It is difficult and time consuming method to convert data

of data files into database. You have to hire DBA (or database designer) and system designer

along with application programmers; Alternatively, you have to take the services of some software

houses. So a lot of money has to be paid for developing database and related software.

3. Cost of Staff Training:

Most DBMSs are often complex systems so the training for users to use the DBMS is required.

Training is required at all levels, including programming, application development, and database

administration. The organization has to pay a lot of amount on the training of staff to run the

DBMS.

4. Appointing Technical Staff:

The trained technical persons such as database administrator and application programmers etc are

required to handle the DBMS. You have to pay handsome salaries to these persons. Therefore, the

system cost increases.

5. Database Failures:

In most of the organizations, all data is integrated into a single database. If database is corrupted

due to power failure or it is corrupted on the storage media, then our valuable data may be lost or

whole system stops.

4)

If unnecessary costs are involving in the process, than the traditional file processing.

High initial investments for hardware and software and training.

Unsecured and improper designs of database.

When multiple user data access is not required.

If database applications are not well defined, not simple and expected to change.

5)

Page 6: Tutorial1.docx

Book

Edition

Language

Subject Publisher

Author