Database Management Systems - (Chapter 1)
Database Management Systems - (Chapter 1)
Introduction
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.2 Database Management Systems
the database description is performed using a Data Definition Language (DDL) or a graphical or
textual design interface.
Data Definition
Conceptual
Language or
Schema
Interface
Database
Description
Database
Management
System
User's View
Database
of Database
Copyright © 2016. Alpha Science International. All rights reserved.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
Introduction 1.3
2. Active Database Management System: Active Database Management Systems are data-
driven or event-driven systems. In active database management system, the users specify to
the DBMS the information they need. If the information is currently available, the DBMS
actively monitors the arrival of the desired information and provides it to the relevant users.
The scope of a query in a passive DBMS is limited to the past and present data, whereas the
scope of a query in an active DBMS additionally includes future data.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.4 Database Management Systems
This redundancy leads to wastage of storage space, high access cost and data inconsistency.
(ii) Difficulty in Accessing Data: Conventional file processing environments do not allow
needed data to be retrieved in a convenient and efficient manner.
For example, if a bank officer needs to find out the names of all customers who live within
a particular area, he has two choices:
1. Get the list of customers and extract the needed information manually.
2. Ask the data processing department to have a system programmer write the necessary
application program. Both alternatives are unsatisfactory.
(iii) Data Isolation: Data is scattered in various files, and as the files may be in different formats,
it is difficult to write new application programs to retrieve appropriate data.
(iv) Concurrent Access Anomalies: In order to improve the overall performance of the system
and obtain a faster response time many systems allow multiple users to update the data
simultaneously. In such environment, interaction of concurrent updates may result in
inconsistent data.
Consider bank account A, with ` 500. If two customers withdraw funds (say ` 50 and ` 100
respectively) from account A at the same time, the result of the concurrent executions ` 400,
rather than ` 350. In order to guard against this possibility, some form of supervision must
be maintained in the system.
(v) Security Problems: Not every user of the database system should be able to access all the
data.
For example, in a banking system, pay roll personnel need to be only part of the database that
has information about the various bank employees. They do not need access to information
about customer accounts. Since application programs are added to the system in an ad-hoc
manner, it is difficult to enforce such security constraints.
(vi) Integrity Problems
• The data values stored in the database must satisfy certain types of consistency constraints.
For example, the balance of a bank account may never fall below a prescribed amount
(say ` 100). These constraints are enforced in the system by adding appropriate code in
Copyright © 2016. Alpha Science International. All rights reserved.
the various application programs. However, when new constraints are added, it is difficult
to change the programs to enforce them. The problem is compounded when constraints
involve several data items from different files.
(vii) Atomicity Problems
• Like all devices a computer system may also be subjected to failure. If a failure occurs
the data existed prior to failure can be restored to the consistent state.
• Consider a program to transfer ` 50 from account A to account B. If a system failure
occurs during the execution of the program, it is possible that the ` 50 is removed from
account A but is not credited to account B, resulting in an inconsistent database state.
• The funds transfer must be atomic, it must happen entirety or not at all. It is difficult to
ensure atomicity in a conventional file-processing system.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
Introduction 1.5
• Data in database is stored in tables. A single database contains multiple tables and
relationships can be created between tables. This makes easy to retrieve and update data.
(v) Integrity Constraints
• Integrity constraints or consistency rules can be applied to database so that the correct
data can be entered into database.
• The constraints may be applied to data item within a single record or they may be applied
to relationships between records.
(vi) Data Security
• Data security is the protection of the database from unauthorized users. Only the
authorized persons are allowed to access the database. Some of the users may be allowed
to access only a part of database i.e., the data that is related to them or related to their
department.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.6 Database Management Systems
• Mostly, the DBA or head of a department can access all the data in the database. Some
users may be permitted only to retrieve data, whereas others are allowed to retrieve as
well as to update data. The database access is controlled by the DBA. He creates the
accounts of users and gives rights to access the database. Typically, users or group of
users are given usernames protected by passwords.
• The user enters his/her account number or username and password to access the data
from database.
For example, if you have an account of e-mail in the “gmail.com”, you have to give your
correct username and password to access your account of e-mail. Similarly, when you
insert your ATM card into the Auto Teller Machine (ATM) in a bank, the machine reads
your ID number printed on the card and then asks you to enter your pin code to access
your account.
(vii) Data Atomicity
• A transaction in commercial databases is referred to as atomic unit of work. For example,
when you purchase something from a point of sale terminal, a number of tasks are
performed such as;
— Company stock is updated.
— Amount is added in company’s account.
— Sales person’s commission increases etc.
• All these tasks collectively are called an atomic unit of work or transaction. These tasks
must be completed in all; otherwise partially completed tasks are rolled back. Thus
through DBMS, it is ensured that only consistent data exists within the database.
(viii) Development of Application
• The cost and time for developing new applications is reduced. The DBMS provides tools
that can be used to develop application programs.
For example, some wizards are available to generate Forms and Reports. Stored
procedures facility reduces the size of application programs.
(ix) Creating Forms
Copyright © 2016. Alpha Science International. All rights reserved.
• Form is very important object of DBMS. You can create Forms very easily and quickly
in DBMS, once a Form is created, it can be used many times and it can be modified very
easily. The created Forms are also saved along with database and behave like a software
component.
• A Form provides very easy way (user-friendly interface) to enter data into database, edit
data, and display data from database.
• The non-technical users can also perform various operations on databases through Forms
without going into the technical details of a database.
(x) Report Writers
• Most of the DBMSs provide the report writer tools used to create reports. The users can
create reports very easily and quickly.
• Once a report is created, it can be used many times and it can be modified very easily.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
Introduction 1.7
• The created reports are also saved along with database and behave like a software
component.
(xi) Control over Concurrency
• In a computer file-based system, if two users are allowed to access data simultaneously,
it is possible that they will interfere with each other.
For example, if both users attempt to perform update operation on the same record, then
one may overwrite the values recorded by the other. Most DBMSs have sub-systems to
control the concurrency so that transactions are always recorded with accuracy.
(xii) Backup and Recovery Procedures
• In a computer file-based system, the user creates the backup of data regularly to protect
the valuable data from damaging due to failures to the computer system or application
program. It is a time consuming method, if volume of data is large.
• Most of the DBMSs provide the ‘backup and recovery’ sub-systems that automatically
create the backup of data and restore data if required.
For example, if the computer system fails in the middle or at the end of an update
operation of the program, the recovery sub-system is responsible for making sure that the
database is restored to the state it was before the program started executing.
(xiii) Data Independence
• The separation of data structure of database from the application program that is used to
access data from database is called data independence.
• In DBMS, database and application programs are separated from each other. The DBMS
sits in between them. You can easily change the structure of database without modifying
the application program.
For example, you can modify the size or data type of a data items. On the other hand,
in computer file-based system, the structure of data items is built into the individual
application programs. Thus the data is dependent on the data file and vice versa.
(xiv) Advanced Capabilities
• DBMS also provides advance capabilities for online access and reporting of data through
Copyright © 2016. Alpha Science International. All rights reserved.
Internet.
• Today, most of the database systems are online.
• The database technology is used in conjunction with Internet technology to access data
on the web servers.
1.4 DISADVANTAGES OF DATABASE
Although there are many advantages the DBMS may also have some minor disadvantages. They are:
(i) Cost of Hardware and Software
• A processor with high speed of data processing and memory of large size is required to
run the DBMS software.
• It means that you have to upgrade the hardware used for file-based system. Similarly,
DBMS software is also very costly.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.8 Database Management Systems
1.5.1 Data Abstraction
The main objective of DBMS is to store and retrieve information efficiently; all the users should be
able to access required data. The designers use complex data structure to represent the data, so that
data can be efficiently stored and retrieved, but it is not necessary for the users to know physical
Copyright © 2016. Alpha Science International. All rights reserved.
database storage details because all database users are not computer trained. The developers hide
the complexity from users through several levels of abstraction. The data abstraction helps the users
easily interact with the database system. There are three levels of data abstraction:
(i) Physical level: It is the lowest level of abstraction that describes how the data are actually
stored. The physical level describes complex low-level data structures in details.
(ii) Logical level: It is the next higher level of abstraction that describes what data are stored in
the database and what relationships exist among those data.
(iii) View level: It is the highest level of abstraction that describes only part of the entire database.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
Introduction 1.9
View Level
Logical Level
Physical Level
1.5.2 Data Independence
The ability to modify a scheme definition in one level without affecting a scheme definition in the
next higher level is called data independence.
There are two levels of data independence:
1. Physical data independence is the ability to modify the physical scheme without causing
application programs to be rewritten. Modifications at the physical level are occasionally
necessary in order to improve performance.
2. Logical data independence is the ability to modify the conceptual scheme without causing
application programs to be rewritten. Modifications at the conceptual level are necessary
whenever the logical structure of the database is altered.
Logical data independence is more difficult to achieve than physical data independence since
application programs are heavily dependent on the logical structure of the data they access.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.10 Database Management Systems
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
Introduction 1.11
compiler.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.12 Database Management Systems
2. Application Programmers
• Application programmers are computer professionals who write application programs.
• Rapid application development (RAD) tools are tools that enable an application
programmer to construct forms and reports without writing a program.
• Special types of programming languages that combine control structures with data
manipulation language. These languages are sometimes called as fourth-generation
languages.
3. Sophisticated Users
• Sophisticated users interact with the system without writing programs. Instead, they form
their requests in a database query language. They submit each such query to a query
processor that the storage manager understands.
• Online analytical processing (OLAP) tools simplify analyst’s tasks.
• Another tool for analysts is data mining tools, which help them to find certain kinds of
patterns in data.
4. Specialized Users
• Specialized users are sophisticated users who write specialized database applications that
do not fit into the traditional data-processing framework.
• The applications are computer-aided design systems, knowledge base and expert systems,
systems that store data with complex data types
1.6.1.2 Database Administrators
A person who has such central control over the system is called a database administrator (DBA).
The functions of a DBA
• Schema definition: The DBA creates the original database schema by executing a set of
data definition statements in the DDL.
• Storage structure and access-method definition.
• Schema and physical-organization modification: The DBA carries out changes to the
schema and physical organization to reflect the changing needs of the organization.
Copyright © 2016. Alpha Science International. All rights reserved.
• Granting of authorization for data access: By granting different types of authorization, the
database administrator can regulate which parts of the database various users can access.
The authorization information is kept in a special system structure that the database system
consults whenever someone attempts to access the data in the system.
• Routine maintenance: Examples of the database administrator’s routine maintenance
activities are:
1. Periodically backing up the database
2. Ensuring that enough free disk space
3. Monitoring jobs running on the database and ensuring that performance is not degraded
by very expensive tasks submitted by some users.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
Introduction 1.13
Review Questions
1. Define
(a) Data (b) Information (c) Database
(d) DBMS (e) Database System
2. List out the applications of database.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.
1.14 Database Management Systems
qqq
Copyright © 2016. Alpha Science International. All rights reserved.
Vidhya, V., et al. Database Management Systems, Alpha Science International, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/univ-people-ebooks/detail.action?docID=5248352.
Created from univ-people-ebooks on 2025-05-10 18:04:26.