0% found this document useful (0 votes)
3 views7 pages

Ear00568022 Wps Office

The document provides an overview of databases, including their definition, maintenance, and the concept of data banks. It outlines the data hierarchy, features of database management systems (DBMS), shortcomings of conventional file structures, and functions of tools like DDL, DML, and Data Dictionary. Additionally, it lists popular DBMS and highlights major concerns such as data integrity, security, and performance optimization.

Uploaded by

lydiahakoth8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views7 pages

Ear00568022 Wps Office

The document provides an overview of databases, including their definition, maintenance, and the concept of data banks. It outlines the data hierarchy, features of database management systems (DBMS), shortcomings of conventional file structures, and functions of tools like DDL, DML, and Data Dictionary. Additionally, it lists popular DBMS and highlights major concerns such as data integrity, security, and performance optimization.

Uploaded by

lydiahakoth8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

EAR00568022

AKOTH LYDIA

UCI 204.

1.Write short note on; a) Database:

A database is an organized collection of structured data that is stored and managed in a


computer system. It provides an efficient way to store, retrieve, and manipulate large amounts
of information. Databases are used in various applications and industries to store and manage
data for different purposes. They are designed to ensure data integrity, security, and efficient
data access and retrieval.

b) Database Maintenance:

Database maintenance refers to the activities performed to ensure the smooth operation,
reliability, and optimal performance of a database system. It involves various tasks, including
routine monitoring, backup and recovery, performance tuning, data optimization, and security
management. Database maintenance is crucial to prevent data corruption, ensure data
availability, and optimize the overall performance of the database system.

c) Data Bank:

A data bank is a centralized repository or collection of data that is specifically organized,


managed, and made accessible for a particular purpose. It is usually maintained by an
organization, government agency, or research institution to store and provide access to valuable
data for analysis, research, or sharing. Data banks can contain various types of data, such as
scientific research data, financial data, demographic data, or any other form of structured or
unstructured data. The data within a data bank is typically curated, validated, and updated
regularly to maintain its accuracy and relevance.

2. State the components of a data hierarchy.

The data hierarchy represents the organization and structure of data in a computer system. It
consists of several components, each building upon the previous one. The components of a
typical data hierarchy, listed in ascending order, are as follows:

1. Bit: The smallest unit of data in a computer system. It can hold either a 0 or a 1, representing
binary information.
2. Byte: A grouping of 8 bits. It is the fundamental unit of storage in most computer systems
and can represent a single character, such as a letter or a number.

3. Field: A logical grouping of bytes that represents a single attribute or property of an entity. For
example, in a database, a field can represent a person's name, age, or address.

4. Record: A collection of related fields that represents a complete set of information about an
entity. It is often used to represent a single data entry or a row in a database table.

5. File: A collection of related records. It is typically used to organize and store data that is
related to a particular application or purpose. Files can be documents, spreadsheets, images, or
any other type of data.

6. Database: A structured collection of files that are organized and managed using a database
management system (DBMS). Databases provide a centralized and efficient way to store,
retrieve, and manage large amounts of data.

7. Data Warehouse: A large, centralized repository that integrates data from multiple sources
within an organization. Data warehouses are designed for data analysis and reporting purposes
and often support complex queries and data mining operations.

8. Data Mart: A subset of a data warehouse that focuses on a specific subject area or
department within an organization. Data marts provide a more focused and simplified view of
data, making it easier for users to access and analyze the information relevant to their needs.

9. Data Mining: The process of extracting valuable and actionable insights from large datasets.
Data mining techniques involve discovering patterns, relationships, and trends in data to
support decision-making and predictive modeling.

10. Data Analytics: The practice of examining data sets to draw conclusions and make informed
business decisions. Data analytics involves various techniques, including statistical analysis,
data visualization, and machine learning, to uncover patterns and insights from data.

It's worth noting that the components and terminology used in the data hierarchy may vary
depending on the context and the specific technology or system being used.

3. List and briefly describe two features found in a typical database management system.

1. Data Integrity: Data integrity is a crucial feature of a database management system (DBMS)
that ensures the accuracy, consistency, and reliability of data stored in the database. DBMS
provides mechanisms to enforce integrity constraints on the data, such as data type validation,
primary key constraints, foreign key relationships, and other business rules. These constraints
prevent invalid or inconsistent data from being entered into the database and maintain the
overall quality and integrity of the data. Data integrity is essential for maintaining the reliability
and trustworthiness of the database, especially in critical applications like banking, healthcare,
and e-commerce.

2. Query and Data Manipulation: Another key feature of a DBMS is its ability to handle queries
and manipulate data efficiently. DBMS provides a query language (such as SQL - Structured
Query Language) that allows users to retrieve, update, insert, and delete data from the database.
The query language provides a standardized way to interact with the database, making it easier
for users to retrieve specific information or perform complex operations on the data. The DBMS
optimizes the execution of queries by using query optimization techniques, indexing, caching,
and other performance-enhancing mechanisms. This ensures that queries are processed
quickly and efficiently, even for large and complex databases. Efficient data manipulation
capabilities are crucial for applications that require real-time data retrieval, reporting, and
decision-making.

4. Identify and describe three major shortcomings of the convectional file structures that are
being addressed by the data base approach.

Conventional file structures, which refer to the traditional methods of organizing and managing
data using file systems, have several shortcomings that have been addressed by the database
approach. Here are three major shortcomings:

1. Data Redundancy: In conventional file structures, data redundancy is a common issue.


Redundancy refers to the duplication of data across multiple files or records. When data is
duplicated, it can lead to inconsistencies and inefficiencies. For example, if a customer's
address is stored in multiple files and it changes, updating the address in all the relevant files
becomes a challenging task. Redundancy also wastes storage space and makes data
maintenance and updates more complex. The database approach addresses this issue by
providing data normalization techniques and a centralized data storage system, which
minimizes redundancy and ensures data consistency.

2. Data Inconsistency: In conventional file structures, data inconsistency can occur when the
same data item is stored in multiple files or records, and it is updated or modified in one place
but not in others. This can lead to discrepancies and errors in data interpretation and analysis.
For instance, if a customer's contact number is updated in one file but not in another, it can
result in incorrect information being used for decision-making. In contrast, a database
management system (DBMS) enforces data integrity constraints and provides mechanisms to
maintain consistency across the database. Updates and modifications are performed through
standardized operations, ensuring that changes are reflected consistently throughout the
system.

3. Lack of Data Independence: Conventional file structures lack data independence, which refers
to the ability to modify the database structure without impacting the applications that use the
data. In file-based systems, changes to the file structure or organization often require modifying
the application programs that access the data, leading to a high degree of coupling between the
data and the applications. This lack of flexibility makes it challenging to evolve and adapt the
system as requirements change. The database approach introduces data independence by
separating the logical and physical aspects of data. The DBMS provides an abstraction layer
that shields the applications from the underlying database structure, allowing changes to be
made to the database schema without affecting the applications that use the data.

By addressing these shortcomings, the database approach provides a more efficient, consistent,
and flexible way to manage and manipulate data, leading to improved data integrity, reduced
redundancy, and enhanced data independence.

5. Describe the functions of the following tools found in DBMS.

a) DDL (Data Definition Language): DDL is a component of a database management system


(DBMS) that is responsible for defining and managing the structure of the database. It consists
of a set of commands that allow users to create, modify, and delete database objects such as
tables, views, indexes, and constraints. The primary functions of DDL include:

- Creating database objects: DDL statements like CREATE TABLE, CREATE INDEX, CREATE
VIEW, etc., are used to create new database objects.

- Modifying database objects: DDL statements like ALTER TABLE, ALTER VIEW, etc., are used to
modify the structure of existing database objects.

- Deleting database objects: DDL statements like DROP TABLE, DROP INDEX, DROP VIEW, etc.,
are used to delete database objects from the database.

DDL statements are typically executed by database administrators or authorized users who
have the necessary privileges to define and manage the database structure. DDL ensures the
integrity and consistency of the database structure and provides a standardized way to define
and manage database objects.

b) DML (Data Manipulation Language): DML is a component of a DBMS that allows users to
manipulate and retrieve data stored in the database. DML is used to perform operations such as
inserting, updating, deleting, and retrieving data from database tables. The primary functions of
DML include:

- Inserting data: DML statements like INSERT INTO are used to add new records or rows into
database tables.

- Updating data: DML statements like UPDATE are used to modify existing data in the database.

- Deleting data: DML statements like DELETE are used to remove data from database tables.

- Retrieving data: DML statements like SELECT are used to retrieve data from one or more
tables based on specified conditions.

DML provides the means to interact with the database and manipulate the data stored within it.
It is commonly used by application developers and end-users to perform data-related operations
within the database.

c) Data Dictionary: The Data Dictionary, also known as the System Catalog, is a component of a
DBMS that stores metadata or data about the database itself. It contains information about the
database schema, tables, columns, indexes, constraints, views, and other objects. The primary
functions of the Data Dictionary include:
- Schema definition: The Data Dictionary stores the definitions and characteristics of database
objects, such as tables and their attributes, views, indexes, and constraints. It provides a central
repository to store and retrieve information about the database structure.

- Integrity enforcement: The Data Dictionary maintains the integrity rules and constraints
defined for the database. It enforces referential integrity, data type validation, and other
constraints to ensure the accuracy and consistency of the data stored in the database.

- Access control: The Data Dictionary stores information about users, their roles, and access
privileges. It helps in managing security and access control by determining who can access or
modify specific data or database objects.

- Query optimization: The Data Dictionary contains statistics and metadata about the database
objects, which the DBMS optimizer uses to generate efficient execution plans for queries. It
helps in optimizing query performance by providing information about data distribution and
indexes.

The Data Dictionary acts as a central repository for storing and retrieving metadata, providing
essential information for the efficient management and operation of the database.

6) State four widely used DBMS today.

1. MySQL

2. Microsoft SQL Server

3. Oracle Database

4. PostgreSQL

7) Explain three major concerns in a data base system.

Three major concerns in a database system are:


1. **Data Integrity:** Ensuring the accuracy and consistency of data within the database. This
involves preventing errors, maintaining referential integrity, and enforcing constraints to
guarantee reliable information.

2. **Security:** Protecting the database against unauthorized access, data breaches, and
malicious activities. This includes user authentication, access control, encryption, and auditing
to maintain the confidentiality and integrity of sensitive data.

3. **Performance Optimization:** Enhancing the efficiency and speed of database operations.


This involves proper indexing, query optimization, and database design to minimize response
times and ensure that the system can handle a large volume of transactions without
performance degradation.

You might also like