Chapter 1
Chapter 1
Chapter 1
3. Database Approach
1. Manual Approach
• The data storage and retrieval follows the primitive and traditional way of information
handling where cards and paper are used for the purpose.
• Files for as many event and objects as the organization has are used to store information.
• Each of the files containing various kinds of information is labelled and stored in one or
more cabinets.
• The cabinets could be kept in safe places for security purpose based on the sensitivity of
the information contained in it.
Cont’d…
• Insertion and retrieval is done by searching first for the right cabinet then for the right
the file then the information.
• One could have an indexing system to facilitate access to the data.
– Separation or Isolation of data: Available information in one application may not be known.
The limitations for the traditional file based data handling approach arise from two basic
reasons:
1. Definition of the data is embedded in the application program which makes it difficult
to modify the database definition easily.
2. No control over the access and manipulation of the data beyond that imposed by the
application programs.
3. Database Approach
• Quality data can be maintained: the different integrity constraints in the database
approach will maintain the quality leading to better decision making.
• Transaction support can be provided: basic demands of any transaction support systems
are implanted in a full scale DBMS.
• Integrity can be maintained: data at different applications will be integrated together
with additional constraints to facilitate shared data resource.
• Security majors can be enforced: the shared data can be secured by having different
levels of clearance and other data security mechanisms.
Cont’d
• Improved decision support: the database will provide information useful for decision
making.
• Standards can be enforced: the different ways of using and dealing with data by different
unit of an organization can be balanced and standardized by using database approach.
• Compactness: the data is stored compactly (no voluminous papers).
• Speed: data storage and retrieval is fast as it will be using the modern fast computer
systems.
• Centralized information control: the relevant data can be controlled and managed at the
central level.
Cont’d
Limitations and risk of Database Approach
– Introduction of new professional and specialized personnel.
– Complexity in designing and managing data.
– The cost and risk during conversion from the old to the new system.
– High cost to be incurred to develop and maintain the system
– Complex backup and recovery services from the users perspective.
– Reduced performance due to centralization and high impact on the system when
failure occurs the central system.
Database Management System (DBMS)
• Sharing a database allows multiple users and programs to access the database simultaneously.
• An application program accesses the database by sending queries or requests for data to the
DBMS.
• A query typically causes some data to be retrieved; a transaction may cause some data to be
read and some data to be written into the database.
Cont’d
– INSTRUCTORs
Example of a Database (with a Conceptual Data Model)
• Restricting unauthorized access to data. Only the DBA staff uses privileged commands
and facilities.
• Providing persistent storage for program Objects
– E.g., Object-oriented DBMSs make program objects persistent.
• Providing storage structures (e.g. indexes) for efficient query processing.
Cont’d
– In embedded systems where a general purpose DBMS may not fit in available storage.
Cont’d
B. Naïve or Parametric: they make up a large section of the end-user population. They use
previously well-defined functions in the form of “canned transactions” against the database.
• Users of Mobile Apps: mostly fall in this category
• Bank-tellers or reservation clerks: are parametric users who do this activity for an entire
shift of operations.
• Social Media Users: post and read information from websites
Cont’d
C. Sophisticated:
• These include business analysts, scientists, engineers, others thoroughly familiar
with the system capabilities.
• Many use tools in the form of software packages that work closely with the stored
database.
D. Stand-alone:
• Mostly maintain personal databases using ready-to-use packaged applications.
• An example is the user of a tax program that creates its own internal database.
• Another example is a user that maintains a database of personal photos and videos.
Cont’d…
This category currently accounts for a very large proportion of the IT work force.
– System Analysts: They understand the user requirements of naïve and sophisticated
users and design applications including canned transactions to meet those requirements.
– Application Programmers: Implement the specifications developed by analysts and test
and debug them before deployment.
– Business Analysts: There is an increasing need for such people who can analyze vast
amounts of business data and real-time data (“Big Data”) for better decision making
related to planning, advertising, marketing etc.
II. Workers Behind the Scene
1. System Designers and Implementors: Design and implement DBMS packages in the
form of modules and interfaces and test and debug them. The DBMS must interface with
applications, language compilers, operating system components, etc.
2. Tool Developers: Design and implement software systems called tools for modelling and
designing databases, performance monitoring, prototyping, test data generation, user
interface creation, simulation etc. that facilitate building of applications and allow using
database effectively.
3. Operators and Maintenance Personnel: They manage the actual running and
maintenance of the database system hardware and software environment.
Impact of Databases and Database Technology
– This has given rise to a new set of applications and E-commerce is using new
standards like XML (eXtended Markup Language)
– Script programming languages such as PHP and JavaScript allow generation of
dynamic Web pages that are partially generated from a database.
• Also allow database updates through Web pages
Review Questions
• 1.1. Define the following terms: data, database, DBMS, database system, database
catalog, program-data independence, user view, DBA, end user, canned transaction,
deductive database system, persistent object, meta-data, and transaction-processing
application.
• 1.2. What four main types of actions involve databases? Briefly discuss each.
• 1.3. Discuss the main characteristics of the database approach and how it differs from
traditional file systems.
• 1.4. What are the responsibilities of the DBA and the database designers?
Cont’d…
• 1.5. What are the different types of database end users? Discuss the main activities of
each.
• 1.6. Discuss the capabilities that should be provided by a DBMS.
• 1.7. Discuss the differences between database systems and information retrieval
• 1.8. What is the difference between controlled and uncontrolled redundancy? Illustrate
with examples.