Introduction to DBMS
Introduction to DBMS
Contents:
• Concept of Data
• Database
• DBMS
• Types of Data Models
• Types of DBMS
• File system Vs DBMS
• Database users
• 3T Database architecture
• Data Independence
• Purpose of Database System
• Database Language
What is data?
• MySQL is the DBMS behind some of the top websites and web-based
applications in the world, including Airbnb, Uber, LinkedIn, Facebook,
Twitter, and YouTube.
Example of Hierarchical model
Example of Relational database
• In the above student table Std ID, Name and city are called as
attributes and their values. Std ID is a primary key attribute which
uniquely identifies each record in the student table.
The object oriented database is represented
in diagram format below −
Types of DBMS
The types of DBMS based on data model are as follows −
Relational database.
Object oriented database.
Hierarchical database.
Network database.
Basis DBMS Approach File System Approach
The file system is a collection of data. In this
DBMS is a collection of data. In DBMS, the user is
Meaning system, the user has to write the procedures for
not required to write the procedures.
managing the database.
Due to the centralized approach, data sharing is Data is distributed in many files, and it may be of
Sharing of data
easy. different formats, so it isn't easy to share data.
DBMS gives an abstract view of data that hides the The file system provides the detail of the data
Data Abstraction
details. representation and storage of data.
Security and Protection DBMS provides a good protection mechanism. It isn't easy to protect a file under the file system.
DBMS contains a wide variety of sophisticated The file system can't efficiently store and retrieve
Manipulation Techniques
techniques to store and retrieve the data. the data.
Naive Users − These naive users are those users who don’t have any database knowledge. They depend on pre-developed
applications like Bank Management Systems, Library Management Systems, Hospital Management Systems, and Railway Ticket
Booking Systems(IRCTC) and get the desired result.
Sophisticated Users − These users interact with the system without writing a program and have separate databases for personal
use. In the database, the user passes each query to the query processor.
• They use the structure query language to run the query on the database.
• They use the tool of data analysis software. For example, data engineers and data scientists are familiar with databases.
Application programmers/Specialized programmers/Back-End Developer − These programmers write the
code for an application program that uses the database. The application programmer can make the
application according to user requirements and control software that runs an entire computer system. The
application program is written in any programming language like C#, .net, JAVA, etc., and focuses on
business, engineering, and science program.
Web Developers
Database Developers
Software Developers
Examples of Application programmers develop software like −
• Content access software
• Educational Software
• Information Worker Software
• Media Development Software
• Product Engineering Software
• Enterprise Software
System Analyst − A System Analyst has also known as a business technology analyst. These
professionals are responsible for the design, structure, and properties of databases. The
application programmer uses the specifications provided by the system analyst to construct the
software that is used by end users. The analyst will gather information from the shareholders as
well as end users to understand their requirements and translate it into functional specifications
for the new system.
They are the supervisor who manages the lower-level information Staff.
Database Administrator (DBA) − The DBA is the group of people that includes everything
required to manage and solve every complex. The DBA can easily use the database to
find the information they need and to plan the goal of the database. To meet future
needs, they are ready for future scope and provide solutions for end users. Therefore,
they are known for high-level management.
For example −
• The 3-Tier architecture contains another layer between the client and
server. In this architecture, client can't directly communicate with the
server.
• The application on the client-end interacts with an application server
which further communicates with the database system.
• End user has no idea about the existence of the database beyond the
application server. The database also has no idea about any other
user beyond the application.
• The 3-Tier architecture is used in case of large web application.
Data Independence
• Data Independence is defined as a property of DBMS that helps you
to change the Database schema at one level of a database system
without requiring to change the schema at the next higher level. Data
independence helps you to keep data separated from all programs
that make use of it.
• You can use this stored data for computing and presentation. In many
systems, data independence is an essential function for components
of the system.
Purpose of Database System
• The DDL stands for Data Definition Language, Which is used to define
the database's internal structure and Pattern of the Database.
• The DDL is used for creating tables, indexes, constraints, and schema
in the Database.
• By using DDL statements we can able to create the architecture of the
required database.
• Below I list out types of database commands that are used in DDL. By
using those queries we can able to perform the DDL on the Database.
Create: It is used to create objects in the database
Alter: It is used to change or alter the structure of the database
objects
Drop: It is used to delete objects from the database
Truncate: It is used to remove all records from a table
Rename: It is used to rename the object in the database
Comment: It is used for comments on the data dictionary.
DCL (Data Control Language)
• The DCL stands for Data Control Language means these commands
are used to retrieve the saved data from the database. And one more
thing is the DCL execution is Transactional which means It has rollback
parameters. we have two tasks under the Data Control Language
below I listed them
Grant: It is used to give user access to the database
Revoke: It is used to take back access or permissions from the user
DML (Data Manipulation Language)
• The Data Manipulation Language is used to Manipulate the data in the database
by using different commands. In this category we can able to perform Insert new
data into Table, Update existing data in the Table, Delete Data from the Table, and
other functions we can perform on data by using these DML commands. Below I
listed those commands for your reference
Select: It is used to select data from the Table based on the requirements
Insert: It is used for Inserting data into an existing table
Update: It is used to update data in the Table based on the requirement
Delete: It is used to delete data from the Table
Merge: It is used for upsert operations
Call: It is used to call a structured query language or Java sub-program
Lock Table: It can control the concurrency
• The End.!!