SlideShare une entreprise Scribd logo
1  sur  27
Chapter 1
1Database and Database Users
Topics Covered
 Introduction to Database, DBMS, Database System
 Properties of Database
 Characteristics Of Database Approach
 Actors on the scene
 Database Administrator
 System Designer
 End Users
 Workers Behind the Scene
 Advantages of DBMS Approach
 When Not to use a Database
2Database and Database Users
Introduction
 A database is a collection of related data.
 By data, we mean known facts that can be recorded
and that have implicit meaning.
 For example : telephone numbers , addresses of the
people.
3Database and Database Users
Properties of database
 A database represents some aspect of the real world,
sometimes called the miniworld . Changes to the
miniworld are reflected in the database
 A database is a logically coherent collection of data
with some inherent meaning. A random assortment of
data cannot correctly be referred to as a database.
 A database is designed, built, and populated with data
for a specific purpose. It has an intended group of
users and some preconceived applications in which
these users are interested.
4Database and Database Users
Database management system(DBMS)
 A database management system (DBMS) is a
collection of programs that enables users to create and
maintain a database.
 The DBMS is hence a general-purpose software system
that facilitates the processes of defining, constructing,
manipulating, and sharing databases among various
users and applications.
5Database and Database Users
Database and Database Users 6
 Defining: It involves specifying the data types,
structures and constraints of the date to be stored in
the database.
Constructing : Constructing the data base is the
process of storing the data on some storage medium
that is controlled by the DBMS.
 Manipulating: Manipulating a data base includes
functions such querying the database to retrieve
specific data.
 Sharing : Sharing a data base allows multiple users
and programs to access the database simultaneously
A Simplified Database Environment
7Database and Database Users
CHARACTERISTICS OFTHE DATABASE APPROACH
 Self-describing nature of a database system
 The database system contains not only the database
itself but also a complete definition or description of the
database structure and constraints.
 This definition is stored in the DBMS catalog, which
contains information such as the structure of each file,
the type and storage format of each data item, and
various constraints on the data.
 The information stored in the catalog is called meta-
data
8Database and Database Users
CHARACTERISTICS OFTHE DATABASE APPROACH
 Insulation between programs and data, and data
abstraction
 Program-data Independence
 Program-operation Independence
 The characteristics that allows program-data
independence and program-operation independence is
called data abstraction.
9Database and Database Users
CHARACTERISTICS OFTHE DATABASE APPROACH
 Support of multiple views of the data
 A database typically has many users, each of whom may
require a different perspective or view of the database.
 A multiuser DBMS whose users have a variety of
distinct applications must provide facilities for defining
multiple views.
10Database and Database Users
CHARACTERISTICS OFTHE DATABASE APPROACH
 Sharing of data and multiuser transaction processing
 A multiuser DBMS allow multiple users to access the
database at the same time.
 The DBMS must include concurrency control software
to ensure that several users trying to update the same
data do so in a controlled manner so that the result of
the updates is correct.
11Database and Database Users
ACTORS ON THE SCENE
 Database Administrator
In a database environment, the primary resource is the
database itself, and administering these resources is
the responsibility of the database administrator
(DBA). The DBA is responsible for authorizing access
to the database, for coordinating and monitoring its
use, and for acquiring software and hardware
resources as needed.
12Database and Database Users
Database Designer
 Database designers are responsible for identifying the
data to be stored in the database and for choosing
appropriate structures to represent and store this data.
It is the responsibility of database designers to
communicate with all prospective database users in
order to understand their requirements, and to come
up with a design that meets these requirements.
13Database and Database Users
End Users
 End users are the people whose jobs require access to
the database for querying, updating, and generating
reports; the database primarily exists for their use.
There are several categories of end users:
 Casual end users occasionally access the database, but
they may need different information each time.
 Naive or parametric end users -Their main job
function revolves around constantly querying and
updating the database, using standard types of queries
and updates-called canned transactions.
14Database and Database Users
End Users
 Sophisticated end users include engineers, scientists,
business analysts, and others who thoroughly familiarize
themselves with the facilities of the DBMS so as to
implement their applications to meet their complex
requirements.
 Stand-alone users maintain personal databases by
using ready-made program packages that provide easy-
to-use menu-based or graphics-based interfaces.
15Database and Database Users
End Users
 System Analysts and Application Programmers
(Software Engineers)
 System analysts determine the requirements of end
users, especially naive and parametric end users, and
develop specifications for canned transactions that meet
these requirements. Application programmers
implement these specifications as programs.
16Database and Database Users
WORKERS BEHIND THE SCENE
 DBMS system designers and implementers are persons
who design and implement the DBMS modules and
interfaces as a software package.
 Tool developers include persons who design and
implement tools-the software packages that facilitate
database system design and use and that help improve
performance.
 Operators and maintenance personnel are the system
administration personnel who are responsible for the
actual running and maintenance of the hardware and
software environment for the database system.
17Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Controlling Redundancy
 In traditional software development utilizing file processing,
every user group maintains its own files for handling its data-
processing applications.
 Much of the data is stored twice.
 This redundancy in storing the same data multiple times
leads to several problems
 Duplication of effort
 Storage space is wasted
 In the database approach, the views of different user groups
are integrated during database design. This ensures
consistency and controls redundancy.
18Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Restricting Unauthorized Access
 When multiple users share a large database, it is likely
that most users will not be authorized to access all
information in the database.
 Hence, the type of access operation-retrieval or update-
must also be controlled.
 The DBMS should provide a security and authorization
subsystem and then enforce restrictions automatically.
19Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Providing Persistent Storage for Program Objects
 Databases can be used to provide persistent storage for
program objects and data structures.
 This is one of the main reasons for object-oriented
database systems.
 An object is said to be persistent, if it survives the
termination of program execution and can later be
directly retrieved by another program.
 Object-oriented database systems typically offer data
structure compatibility with one or more object
oriented programming languages.
20Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Providing Storage Structures for Efficient Query
Processing
 Database systems must provide capabilities for
efficiently executing queries and updates.
 Because the database is typically stored on disk, the
DBMS must provide specialized data structures to speed
up disk search for the desired records.
 Auxiliary files called indexes are used for this purpose.
21Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Providing Backup and Recovery
 A DBMS must provide facilities for recovering from
hardware or software failures.
 The backup and recovery subsystem of the DBMS is
responsible for recovery.
22Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Providing Multiple User Interfaces
 Because many types of users with varying levels of
technical knowledge use a database, a DBMS should
provide a variety of user interfaces.
 Query languages for casual users
 Programming language interfaces for application
programmers.
 Forms and command codes for parametric users
 And menu-driven interfaces and natural language
interfaces for stand-alone users.
23Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Representing Complex Relationships among Data
 A database may include numerous varieties of data that
are interrelated in many ways.
 A DBMS must have the capability to represent a variety
of complex relationships among the data as well as to
retrieve and update related data easily and efficiently.
24Database and Database Users
ADVANTAGES OF USING THE DBMS
APPROACH
 Enforcing Integrity Constraints
 Most database applications have certain integrity
constraints that must hold for the data.
 A DBMS should provide capabilities for defining and
enforcing these constraints.
 The simplest type of integrity constraint involves
specifying a data type for each data item. For example,
the value of Name must be a string.
25Database and Database Users
Implications of Using the Database
Approach
 Potential for Enforcing Standards
 Reduced Application Development Time
 Flexibility
 Availability of Up-to-Date Information
 Economies of Scale
26Database and Database Users
WHEN NOT TO USE A DBMS
 High initial investment in hardware, software, and
training
 The generality that a DBMS provides for defining and
processing data
 Overhead for providing security, concurrency
control, recovery, and integrity functions
27Database and Database Users

Contenu connexe

Tendances

Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment>. <
 
All data models in dbms
All data models in dbmsAll data models in dbms
All data models in dbmsNaresh Kumar
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management SystemAjay Jha
 
Slide 4 dbms users
Slide 4 dbms usersSlide 4 dbms users
Slide 4 dbms usersVisakh V
 
Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)Rabin BK
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbmsMegha yadav
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level ArchitectureAdeel Rasheed
 
Components and Advantages of DBMS
Components and Advantages of DBMSComponents and Advantages of DBMS
Components and Advantages of DBMSShubham Joon
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notesTanya Makkar
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMSkoolkampus
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Userssontumax
 

Tendances (20)

Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment
 
All data models in dbms
All data models in dbmsAll data models in dbms
All data models in dbms
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
 
Slide 4 dbms users
Slide 4 dbms usersSlide 4 dbms users
Slide 4 dbms users
 
Dbms models
Dbms modelsDbms models
Dbms models
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)Object Relational Database Management System(ORDBMS)
Object Relational Database Management System(ORDBMS)
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbms
 
Data Base Management System
Data Base Management SystemData Base Management System
Data Base Management System
 
Elmasri Navathe DBMS Unit-1 ppt
Elmasri Navathe DBMS Unit-1 pptElmasri Navathe DBMS Unit-1 ppt
Elmasri Navathe DBMS Unit-1 ppt
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level Architecture
 
Components and Advantages of DBMS
Components and Advantages of DBMSComponents and Advantages of DBMS
Components and Advantages of DBMS
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMS
 
Ch09
Ch09Ch09
Ch09
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
 
Data models
Data modelsData models
Data models
 

En vedette

Publishing xml
Publishing xmlPublishing xml
Publishing xmlKumar
 
Applying xml
Applying xmlApplying xml
Applying xmlKumar
 
Forms of organization
Forms of organizationForms of organization
Forms of organizationKumar
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architectureKumar
 
XML Schema
XML SchemaXML Schema
XML SchemaKumar
 
Graphics devices
Graphics devicesGraphics devices
Graphics devicesKumar
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship DiagramShakila Mahjabin
 
Chapter 1 - the role of financial management
Chapter 1  - the role of financial managementChapter 1  - the role of financial management
Chapter 1 - the role of financial managementPrafulla Tekriwal
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMSkoolkampus
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentationsameerraaj
 
Entity relationship diagram (erd)
Entity relationship diagram (erd)Entity relationship diagram (erd)
Entity relationship diagram (erd)tameemyousaf
 

En vedette (13)

Chapter1
Chapter1Chapter1
Chapter1
 
Publishing xml
Publishing xmlPublishing xml
Publishing xml
 
Applying xml
Applying xmlApplying xml
Applying xml
 
Forms of organization
Forms of organizationForms of organization
Forms of organization
 
Entity relationship modelling
Entity relationship modellingEntity relationship modelling
Entity relationship modelling
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architecture
 
XML Schema
XML SchemaXML Schema
XML Schema
 
Graphics devices
Graphics devicesGraphics devices
Graphics devices
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Chapter 1 - the role of financial management
Chapter 1  - the role of financial managementChapter 1  - the role of financial management
Chapter 1 - the role of financial management
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentation
 
Entity relationship diagram (erd)
Entity relationship diagram (erd)Entity relationship diagram (erd)
Entity relationship diagram (erd)
 

Similaire à Chapter1

DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDivyaKS12
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptxChandanHegde13
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and AdministratorA. S. M. Shafi
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfhpndegreecollegesklm
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersMustafa Kamel Mohammadi
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbmssethu pm
 
Unit 2 rdbms study_material
Unit 2  rdbms study_materialUnit 2  rdbms study_material
Unit 2 rdbms study_materialgayaramesh
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Database management systems
Database management systemsDatabase management systems
Database management systemsJoel Briza
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 

Similaire à Chapter1 (20)

DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Dbms
DbmsDbms
Dbms
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptx
 
1.introduction qb
1.introduction qb1.introduction qb
1.introduction qb
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and Administrator
 
DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
 
Chapter one
Chapter oneChapter one
Chapter one
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Assign 1
Assign 1Assign 1
Assign 1
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Unit 2 rdbms study_material
Unit 2  rdbms study_materialUnit 2  rdbms study_material
Unit 2 rdbms study_material
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
Database management systems
Database management systemsDatabase management systems
Database management systems
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
En ch01
En ch01En ch01
En ch01
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
DBMS_UNIT_1.pdf
DBMS_UNIT_1.pdfDBMS_UNIT_1.pdf
DBMS_UNIT_1.pdf
 

Plus de Jafar Nesargi

Network adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesNetwork adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesJafar Nesargi
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
Computer basics Intro
Computer basics IntroComputer basics Intro
Computer basics IntroJafar Nesargi
 
Chapter 7 relation database language
Chapter 7 relation database languageChapter 7 relation database language
Chapter 7 relation database languageJafar Nesargi
 
Chapter 6 relational data model and relational
Chapter  6  relational data model and relationalChapter  6  relational data model and relational
Chapter 6 relational data model and relationalJafar Nesargi
 
Chapter 4 record storage and primary file organization
Chapter 4 record storage and primary file organizationChapter 4 record storage and primary file organization
Chapter 4 record storage and primary file organizationJafar Nesargi
 
Introduction to-oracle
Introduction to-oracleIntroduction to-oracle
Introduction to-oracleJafar Nesargi
 
Cascading style sheets
Cascading style sheetsCascading style sheets
Cascading style sheetsJafar Nesargi
 
Session1 gateway to web page development
Session1   gateway to web page developmentSession1   gateway to web page development
Session1 gateway to web page developmentJafar Nesargi
 
Chapter 3 servlet & jsp
Chapter 3 servlet & jspChapter 3 servlet & jsp
Chapter 3 servlet & jspJafar Nesargi
 
Record storage and primary file organization
Record storage and primary file organizationRecord storage and primary file organization
Record storage and primary file organizationJafar Nesargi
 

Plus de Jafar Nesargi (20)

Network adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devicesNetwork adpater,cabel,cards ,types, network devices
Network adpater,cabel,cards ,types, network devices
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Computer basics Intro
Computer basics IntroComputer basics Intro
Computer basics Intro
 
Css
CssCss
Css
 
Chapter 7 relation database language
Chapter 7 relation database languageChapter 7 relation database language
Chapter 7 relation database language
 
Chapter 6 relational data model and relational
Chapter  6  relational data model and relationalChapter  6  relational data model and relational
Chapter 6 relational data model and relational
 
Chapter 4 record storage and primary file organization
Chapter 4 record storage and primary file organizationChapter 4 record storage and primary file organization
Chapter 4 record storage and primary file organization
 
Chapter3
Chapter3Chapter3
Chapter3
 
Introduction to-oracle
Introduction to-oracleIntroduction to-oracle
Introduction to-oracle
 
Chapter2
Chapter2Chapter2
Chapter2
 
Cascading style sheets
Cascading style sheetsCascading style sheets
Cascading style sheets
 
Session1 gateway to web page development
Session1   gateway to web page developmentSession1   gateway to web page development
Session1 gateway to web page development
 
Introduction to jsp
Introduction to jspIntroduction to jsp
Introduction to jsp
 
Chapter 3 servlet & jsp
Chapter 3 servlet & jspChapter 3 servlet & jsp
Chapter 3 servlet & jsp
 
Rmi
RmiRmi
Rmi
 
Java bean
Java beanJava bean
Java bean
 
Networking
NetworkingNetworking
Networking
 
Chapter2 j2ee
Chapter2 j2eeChapter2 j2ee
Chapter2 j2ee
 
Chapter 1 swings
Chapter 1 swingsChapter 1 swings
Chapter 1 swings
 
Record storage and primary file organization
Record storage and primary file organizationRecord storage and primary file organization
Record storage and primary file organization
 

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Chapter1

  • 1. Chapter 1 1Database and Database Users
  • 2. Topics Covered  Introduction to Database, DBMS, Database System  Properties of Database  Characteristics Of Database Approach  Actors on the scene  Database Administrator  System Designer  End Users  Workers Behind the Scene  Advantages of DBMS Approach  When Not to use a Database 2Database and Database Users
  • 3. Introduction  A database is a collection of related data.  By data, we mean known facts that can be recorded and that have implicit meaning.  For example : telephone numbers , addresses of the people. 3Database and Database Users
  • 4. Properties of database  A database represents some aspect of the real world, sometimes called the miniworld . Changes to the miniworld are reflected in the database  A database is a logically coherent collection of data with some inherent meaning. A random assortment of data cannot correctly be referred to as a database.  A database is designed, built, and populated with data for a specific purpose. It has an intended group of users and some preconceived applications in which these users are interested. 4Database and Database Users
  • 5. Database management system(DBMS)  A database management system (DBMS) is a collection of programs that enables users to create and maintain a database.  The DBMS is hence a general-purpose software system that facilitates the processes of defining, constructing, manipulating, and sharing databases among various users and applications. 5Database and Database Users
  • 6. Database and Database Users 6  Defining: It involves specifying the data types, structures and constraints of the date to be stored in the database. Constructing : Constructing the data base is the process of storing the data on some storage medium that is controlled by the DBMS.  Manipulating: Manipulating a data base includes functions such querying the database to retrieve specific data.  Sharing : Sharing a data base allows multiple users and programs to access the database simultaneously
  • 7. A Simplified Database Environment 7Database and Database Users
  • 8. CHARACTERISTICS OFTHE DATABASE APPROACH  Self-describing nature of a database system  The database system contains not only the database itself but also a complete definition or description of the database structure and constraints.  This definition is stored in the DBMS catalog, which contains information such as the structure of each file, the type and storage format of each data item, and various constraints on the data.  The information stored in the catalog is called meta- data 8Database and Database Users
  • 9. CHARACTERISTICS OFTHE DATABASE APPROACH  Insulation between programs and data, and data abstraction  Program-data Independence  Program-operation Independence  The characteristics that allows program-data independence and program-operation independence is called data abstraction. 9Database and Database Users
  • 10. CHARACTERISTICS OFTHE DATABASE APPROACH  Support of multiple views of the data  A database typically has many users, each of whom may require a different perspective or view of the database.  A multiuser DBMS whose users have a variety of distinct applications must provide facilities for defining multiple views. 10Database and Database Users
  • 11. CHARACTERISTICS OFTHE DATABASE APPROACH  Sharing of data and multiuser transaction processing  A multiuser DBMS allow multiple users to access the database at the same time.  The DBMS must include concurrency control software to ensure that several users trying to update the same data do so in a controlled manner so that the result of the updates is correct. 11Database and Database Users
  • 12. ACTORS ON THE SCENE  Database Administrator In a database environment, the primary resource is the database itself, and administering these resources is the responsibility of the database administrator (DBA). The DBA is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed. 12Database and Database Users
  • 13. Database Designer  Database designers are responsible for identifying the data to be stored in the database and for choosing appropriate structures to represent and store this data. It is the responsibility of database designers to communicate with all prospective database users in order to understand their requirements, and to come up with a design that meets these requirements. 13Database and Database Users
  • 14. End Users  End users are the people whose jobs require access to the database for querying, updating, and generating reports; the database primarily exists for their use. There are several categories of end users:  Casual end users occasionally access the database, but they may need different information each time.  Naive or parametric end users -Their main job function revolves around constantly querying and updating the database, using standard types of queries and updates-called canned transactions. 14Database and Database Users
  • 15. End Users  Sophisticated end users include engineers, scientists, business analysts, and others who thoroughly familiarize themselves with the facilities of the DBMS so as to implement their applications to meet their complex requirements.  Stand-alone users maintain personal databases by using ready-made program packages that provide easy- to-use menu-based or graphics-based interfaces. 15Database and Database Users
  • 16. End Users  System Analysts and Application Programmers (Software Engineers)  System analysts determine the requirements of end users, especially naive and parametric end users, and develop specifications for canned transactions that meet these requirements. Application programmers implement these specifications as programs. 16Database and Database Users
  • 17. WORKERS BEHIND THE SCENE  DBMS system designers and implementers are persons who design and implement the DBMS modules and interfaces as a software package.  Tool developers include persons who design and implement tools-the software packages that facilitate database system design and use and that help improve performance.  Operators and maintenance personnel are the system administration personnel who are responsible for the actual running and maintenance of the hardware and software environment for the database system. 17Database and Database Users
  • 18. ADVANTAGES OF USING THE DBMS APPROACH  Controlling Redundancy  In traditional software development utilizing file processing, every user group maintains its own files for handling its data- processing applications.  Much of the data is stored twice.  This redundancy in storing the same data multiple times leads to several problems  Duplication of effort  Storage space is wasted  In the database approach, the views of different user groups are integrated during database design. This ensures consistency and controls redundancy. 18Database and Database Users
  • 19. ADVANTAGES OF USING THE DBMS APPROACH  Restricting Unauthorized Access  When multiple users share a large database, it is likely that most users will not be authorized to access all information in the database.  Hence, the type of access operation-retrieval or update- must also be controlled.  The DBMS should provide a security and authorization subsystem and then enforce restrictions automatically. 19Database and Database Users
  • 20. ADVANTAGES OF USING THE DBMS APPROACH  Providing Persistent Storage for Program Objects  Databases can be used to provide persistent storage for program objects and data structures.  This is one of the main reasons for object-oriented database systems.  An object is said to be persistent, if it survives the termination of program execution and can later be directly retrieved by another program.  Object-oriented database systems typically offer data structure compatibility with one or more object oriented programming languages. 20Database and Database Users
  • 21. ADVANTAGES OF USING THE DBMS APPROACH  Providing Storage Structures for Efficient Query Processing  Database systems must provide capabilities for efficiently executing queries and updates.  Because the database is typically stored on disk, the DBMS must provide specialized data structures to speed up disk search for the desired records.  Auxiliary files called indexes are used for this purpose. 21Database and Database Users
  • 22. ADVANTAGES OF USING THE DBMS APPROACH  Providing Backup and Recovery  A DBMS must provide facilities for recovering from hardware or software failures.  The backup and recovery subsystem of the DBMS is responsible for recovery. 22Database and Database Users
  • 23. ADVANTAGES OF USING THE DBMS APPROACH  Providing Multiple User Interfaces  Because many types of users with varying levels of technical knowledge use a database, a DBMS should provide a variety of user interfaces.  Query languages for casual users  Programming language interfaces for application programmers.  Forms and command codes for parametric users  And menu-driven interfaces and natural language interfaces for stand-alone users. 23Database and Database Users
  • 24. ADVANTAGES OF USING THE DBMS APPROACH  Representing Complex Relationships among Data  A database may include numerous varieties of data that are interrelated in many ways.  A DBMS must have the capability to represent a variety of complex relationships among the data as well as to retrieve and update related data easily and efficiently. 24Database and Database Users
  • 25. ADVANTAGES OF USING THE DBMS APPROACH  Enforcing Integrity Constraints  Most database applications have certain integrity constraints that must hold for the data.  A DBMS should provide capabilities for defining and enforcing these constraints.  The simplest type of integrity constraint involves specifying a data type for each data item. For example, the value of Name must be a string. 25Database and Database Users
  • 26. Implications of Using the Database Approach  Potential for Enforcing Standards  Reduced Application Development Time  Flexibility  Availability of Up-to-Date Information  Economies of Scale 26Database and Database Users
  • 27. WHEN NOT TO USE A DBMS  High initial investment in hardware, software, and training  The generality that a DBMS provides for defining and processing data  Overhead for providing security, concurrency control, recovery, and integrity functions 27Database and Database Users