Database System Environment or Components of Database System
Database System Environment or Components of Database System
Database system refers to a set of components that define and control the collection, storage, management and use of
data. It is composed of five major parts hardware, software, people, procedures and data.
1. Hardware: Hardware refers to all of the system's physical devices; for example, computers storage devices, printers,
network devices and etc.
2. Software: To make the database system work properly, three types of software are needed: operating system, DBMS
software, and application programs.
a) Operating system: It manages all hardware components and allows other software to run on the computers.
Examples of operating system software include Windows, Linux and etc.
b) DBMS software: It manages the database within the database system. Some examples of DBMS software include
Oracle, Access, MySql and etc.
c) Application programs: These are used to access and manipulate data in the DBMS and to manage the computer
environment in which data access and manipulation take place. Application programs are most commonly used to
access data to generate reports. Most of the application programs provide GUI.
3. People: This component includes all users of the database system. According to the job nature, five types of users can
be identified: systems administrators, database administrators, database designers, systems analysts and programmers,
and end users.
a) System administrators: They supervise the database system's general operations.
b) Database administrators: They are also known as DBAs. They manage the DBMS and ensure that the database is
functioning properly.
c) Database designers: They design the database structure. They are the database architects. As this is very critical, the
designer's job responsibilities are increased.
d) Systems analysts and programmers: They design and implement the application programs. They design and create
the data entry screens, reports, and procedures through which end users can access and manipulate the data.
e) End users: They are the people who use the application programs to run the organization's daily operations. For
example, sales-clerks, supervisors, managers are classified as end users.
4. Procedures: Procedures are the instructions and rules that supervise the design and use of the database system.
Procedures are a critical component of the system. Procedures play an important role in a company because they
enforce the standards by which business is conducted in an organization
5. Data: Data refers the collection of facts stored in the database. Because data are the raw material from which
information is generated, no database can exist without database.
Dr. E.F. Codd's Rules
Every database has tables, and constraints cannot be referred to as a rational database system. And if any database has
only relational data model, it cannot be a Relational Database System (RDBMS). So, some rules define a database to be
the correct RDBMS. These rules were developed by Dr. Edgar F. Codd (E.F. Codd) in 1985, who has vast research
knowledge on the Relational Model of database Systems. Codd presents his 13 rules for a database to test the concept
of DBMS against his relational model, and if a database follows the rule, it is called a true relational database (RDBMS).
These 13 rules are popular in RDBMS, known as Codd's 12 rules.
Rule 7: Relational Level Operation (High-Level Insert, Update and delete) Rule
A database system should follow high-level relational operations such as insert, update, and delete in each level or a single
row. It also supports union, intersection and minus operation in the database system.
eginners Tutorial
There are many types of Integrity Constraints in DBMS. Constraints on the Relational database management
system is mostly divided into three main categories are:
1. Domain Constraints
2. Key Constraints
3. Referential Integrity Constraints
Domain Constraints
Domain constraints can be violated if an attribute value is not appearing in the corresponding domain or it is not of
the appropriate data type.
Domain constraints specify that within each tuple, and the value of each attribute must be unique. This is specified
as data types which include standard data types integers, real numbers, characters, Booleans, variable length strings,
etc.
Example:
Create DOMAIN CustomerName
CHECK (value not NULL)
The example shown demonstrates creating a domain constraint such that CustomerName is not NULL
Key Constraints
An attribute that can uniquely identify a tuple in a relation is called the key of the table. The value of the attribute
for different tuples in the relation has to be unique.
Example:
In the given table, CustomerID is a key attribute of Customer Table. It is most likely to have a single key for one
customer, CustomerID =1 is only for the CustomerName =” Google”.
1 Google Active
2 Amazon Active
3 Apple Inactive
Example:
Tuple for CustomerID =1 is referenced twice in the relation Billing. So we know CustomerName=Google has
billing amount $300
Whenever one of these operations are applied, integrity constraints specified on the relational database schema
must never be violated.
Insert Operation
The insert operation gives values of the attribute for a new tuple which should be inserted into a relation.
Update Operation
You can see that in the below-given relation table CustomerName= ‘Apple’ is updated from Inactive to Active.
Delete Operation
To specify deletion, a condition on the attributes of the relation selects the tuple to be deleted.
The Delete operation could violate referential integrity if the tuple which is deleted is referenced by foreign keys
from other tuples in the same database.
Select Operation