Lecture 2
Lecture 2
ADVANTAGES OF DATABASE
MANAGEMENT SYSTEM
Reducing Data Redundancy
The file based data management systems contained multiple files that were stored in
many different locations in a system or even across multiple systems. Because of this,
there were sometimes multiple copies of the same file which lead to data redundancy.
This is prevented in a database as there is a single database and any change in it is
reflected immediately. Because of this, there is no chance of encountering duplicate
data.
Sharing of Data
In a database, the users of the database can share the data among themselves. There are
various levels of authorisation to access the data, and consequently the data can only
be shared based on the correct authorisation protocols being followed.
Many remote users can also access the database simultaneously and share the data
between themselves.
Data Integrity
Data integrity means that the data is accurate and consistent in the
database. Data Integrity is very important as there are multiple
databases in a DBMS. All of these databases contain data that is
visible to multiple users. So it is necessary to ensure that the data
is correct and consistent in all the databases and for all the users.
Data Consistency
Data consistency is ensured in a database because there is no data
redundancy. All data appears consistently across the database and
the data is same for all the users viewing the database. Moreover,
any changes made to the database are immediately reflected to all
the users and there is no data inconsistency.
Enforcement of integrity constraints
Database management systems must provide the ability to define
and enforce certain constraints to ensure that users enter valid
information and maintain data integrity. A database constraint is
a restriction or rule that dictates what can be entered or edited in
a table such as a postal code using a certain format or adding a
valid city in the City field.
There are many types of database constraints. Data type, for
example, determines the sort of data permitted in a field, for
example numbers only. Data uniqueness such as the primary
key ensures that no duplicates are entered. Constraints can be
simple (field based) or complex (programming).
Restriction of unauthorized access
Not all users of a database system will have the same accessing
privileges. For example, one user might have read-only
access (i.e., the ability to read a file but not make changes), while
another might have read and write privileges, which is the ability
to both read and modify a file. For this reason, a database
management system should provide a security subsystem to
create and control different types of user accounts and restrict
unauthorized access.
Data independence
The privacy rule in a database means only the authorized users can access a database
according to its privacy constraints. There are levels of database access and a user can
only view the data he is allowed to. For example - In social networking sites, access
constraints are different for different accounts a user may want to access.
Backup and Recovery
Database Management System automatically takes care of backup and recovery. The users
don't need to backup data periodically because this is taken care of by the DBMS.
Moreover, it also restores the database after a crash or system failure to its previous
condition.
CHARACTERISTIC OF DATABASE
APPROACH
Self Describing Nature of Database
Database system contains not only the database but also
the complete definition and description of database
structure and constraints .