MIS - Chapter 6
MIS - Chapter 6
MIS - Chapter 6
Introduction to Database
system
Outline
1. Manual Approach
2. Traditional File Based Approach
3. Database Approach
1.Manual Approach
End users are the people whose jobs require access to the
database for querying, updating, and generating reports; the
database primarily exists for their use. There are several
categories of end users:
Native Users
Sizable/large proportion of users
Unaware of the DBMS
Only access the database based on their access
level and demand
Use standard and pre-specified types of queries.
Cont.
Casual users:
users who access the database occasionally.
Need different information from the database each time.
Use sophisticated database queries to satisfy their needs.
Are most of the time middle to high level managers.
Sophisticated Users:
Are users familiar with the structure of the Database and
facilities of the DBMS.
Are most of the time engineers, scientists, business
analysts, etc
Have higher level queries
Database models
• Database Model is a set of concepts to describe the
structure of a database, and certain constraints that the
database should obey.
• It is a description of the way that data is stored in a
database.
• Data model helps to understand the relationship
between entities and to create the most effective
structure to hold data.
• The main purpose of Data Model is to represent the
data in an understandable way.
Relational Database Model
• The term is originates from the branch of mathematics called
set theory and relation
• Can define more flexible and complex relationship
• Viewed as a collection of tables called “Relations” equivalent to
collection of record types
• Stores information or data in the form of tables rows and
columns
• A row of the table is called tuple equivalent to record
• A column of a table is called attribute equivalent to fields
• Data value is the value of the Attribute
It facilitates multiple views of the same database
for different users.
Advantages of using DBMS
Controlling Redundancy in data storage, development and
maintenance efforts.
Restricting Unauthorized Access (security and
authorization)
Providing persistent storage for program objects and data
structure Providing Multiple User Interfaces
Representing Complex Relationships Among data
Enforcing Integrity Constraints
Con..
Providing Backup and Recovery
Centralized control – Data quality and integrity
maintained
Data easily shared, but still controlled by DBMS
Database searches and analysis faster through DBMS
through “user-friendly” interfaces
Efficient Data Access
D! ! !
E N