2
Most read
4
Most read
6
Most read
Advantages of database managementsystem
ASSIGNMENT
Advantages of Database Management System:
The DBMS has a number of advantages as compared to traditional computer
file processing approach. The DBA must keep in mind these benefits or
capabilities during designing databases, coordinating and monitoring the
DBMS.
The major advantages of DBMS are described below:
1. Controlling Data Redundancy:
In non-database systems (traditional computer file processing), each application
program has its own files. In this case, the duplicated copies of the same data
are created at many places. In DBMS, all the data of an organization is
integrated into a single database. The data is recorded at only one place in the
database and it is not duplicated. For example, the dean's faculty file and the
faculty payroll file contain several items that are identical. When they are
converted into database, the data is integrated into a single database so that
multiple copies of the same data are reduced to-single copy.
In DBMS, the data redundancy can be controlled or reduced but is not removed
completely. Sometimes, it is necessary to create duplicate copies of the same
data items in order to relate tables with each other.
By controlling the data redundancy, you can save storage space. Similarly, it is
useful for retrieving data from database using queries.
2. Data Consistency:
By controlling the data redundancy, the data consistency is obtained. If a data
item appears only once, any update to its value has to be performed only once
and the updated value (new value of item) is immediately available to all users.
If the DBMS has reduced redundancy to a minimum level, the database system
enforces consistency. It means that when a data item appears more than once in
the database and is updated, the DBMS automatically updates each occurrence
of a data item in the database.
3. Data Sharing:
In DBMS, data can be shared by authorized users of the organization. The DBA
manages the data and gives rights to users to access the data. Many users can be
authorized to access the same set of information simultaneously. The remote
users can also share same data. Similarly, the data of same database can be
shared between different application programs.
4. Data Integration:
In DBMS, data in database is stored in tables. A single database contains
multiple tables and relationships can be created between tables (or associated
data entities). This makes easy to retrieve and update data.
5. Integrity Constraints:
Integrity constraints or consistency rules can be applied to database so that the
correct data can be entered into database. The constraints may be applied to data
item within a single record or they may be applied to relationships between
records.
Examples:
The examples of integrity constraints are:
(i) 'Issue Date' in a library system cannot be later than the corresponding 'Return
Date' of a book.
(ii) Maximum obtained marks in a subject cannot exceed 100.
There are also some standard constraints that are intrinsic in most of the
DBMSs. These are;
Constraint Name Description
PRIMARY KEY Designates a column or combination of columns as Primary Key and
therefore, values of columns cannot be repeated or left blank.
FOREIGN KEY Relates one table with another table.
UNIQUE Specifies that values of a column or combination of columns cannot
be repeated.
NOT NULL Specifies that a column cannot contain empty values.
CHECK Specifies a condition which each row of a table must satisfy.
Most of the DBMSs provide the facility for applying the integrity constraints.
The integrity constraints are automatically checked at the time of data entry or
when the record is updated. If the data entry operator (end-user) violates an
integrity constraint, the data is not inserted or updated into the database and a
message is displayed by the system. For example, when you draw amount from
the bank through ATM card, then your account balance is compared with the
amount you are drawing. If the amount in your account balance is less than the
amount you want to draw, then a message is displayed on the screen to inform
you about your account balance.
6. Data Security:
Data security is the protection of the database from unauthorized users. Only
the authorized persons are allowed to access the database. Some of the users
may be allowed to access only a part of database i.e., the data that is related to
them or related to their department. Mostly, the DBA or head of a department
can access all the data in the database. Some users may be permitted only to
retrieve data, whereas others are allowed to retrieve as well as to update data.
The database access is controlled by the DBA. He creates the accounts of users
and gives rights to access the database. Typically, users or group of users are
given usernames protected by passwords.
For example,
If you have an account of e-mail in the "hotmail.com" (a popular website), then
you have to give your correct username and password to access your account of
e-mail. Similarly, when you insert your ATM card into the Auto Teller Machine
(ATM) in a bank, the machine reads your ID number printed on the card and
then asks you to enter your pin code (or password). In this way, you can access
your account.
7. Data Atomicity:
A transaction in commercial databases is referred to as atomic unit of work. For
example, when you purchase something from a point of sale (POS) terminal, a
number of tasks are performed such as;
 Company stock is updated.
 Amount is added in company's account.
 Sales person's commission increases etc.
All these tasks collectively are called an atomic unit of work or transaction.
These tasks must be completed in all; otherwise partially completed tasks are
rolled back. Thus through DBMS, it is ensured that only consistent data exists
within the database.
8. Database Access Language:
Most of the DBMSs provide SQL as standard database access language. It is
used to access data from multiple tables of a database.
9. Development of Application:
The cost and time for developing new applications is also reduced. The DBMS
provides tools that can be used to develop application programs. For example,
some wizards are available to generate Forms and Reports. Stored procedures
(stored on server side) also reduce the size of application programs.
10. Creating Forms:
Form is very important object of DBMS. You can create Forms very easily and
quickly in DBMS, once a Form is created, it can be used many times and it can
be modified very easily. The created Forms are also saved along with database
and behave like a software component.
A Form provides very easy way (user-friendly interface) to enter data into
database, edit data, and display data from database. The non-technical users can
also perform various operations on databases through Forms without going into
the technical details of a database.
11. Report Writers:
Most of the DBMSs provide the report writer tools used to create reports. The
users can create reports very easily and quickly. Once a report is created, it can
be used many times and it can be modified very easily. The created reports are
also saved along with database and behave like a software component.
12. Control over Concurrency:
In a computer file-based system, if two users are allowed to access data
simultaneously, it is possible that they will interfere with each other. For
example, if both users attempt to perform update operation on the same record,
then one may overwrite the values recorded by the other. Most DBMSs have
sub-systems to control the concurrency so that transactions are always recorded"
with accuracy.
13. Backup and Recovery Procedures:
In a computer file-based system, the user creates the backup of data regularly to
protect the valuable data from damaging due to failures to the computer system
or application program. It is a time consuming method, if volume of data is
large. Most of the DBMSs provide the 'backup and recovery' sub-systems that
automatically create the backup of data and restore data if required. For
example, if the computer system fails in the middle (or end) of an update
operation of the program, the recovery sub-system is responsible for making
sure that the database is restored to the state it was in before the program started
executing.
14. Data Independence:
The separation of data structure of database from the application program that
is used to access data from database is called data independence. In DBMS,
database and application programs are separated from each other. The DBMS
sits in between them. You can easily change the structure of database without
modifying the application program. For example you can modify the size or
data type of a data items (fields of a database table).
On the other hand, in computer file-based system, the structure of data items are
built into the individual application programs. Thus the data is dependent on the
data file and vice versa.
15. Advanced Capabilities:
DBMS also provides advance capabilities for online access and reporting of
data through Internet. Today, most of the database systems are online. The
database technology is used in conjunction with Internet technology to access
data on the web servers.

More Related Content

PPTX
Dbms slides
PPTX
Advantages of DBMS
PPTX
Types of databases
PPS
Architecture of-dbms-and-data-independence
PPTX
Dbms ppt
PPT
Database Management system
PPTX
Database management functions
PPT
Database backup & recovery
Dbms slides
Advantages of DBMS
Types of databases
Architecture of-dbms-and-data-independence
Dbms ppt
Database Management system
Database management functions
Database backup & recovery

What's hot (20)

PPTX
Google File System
PPTX
Structure of dbms
PPT
Dbms
PPTX
Advantages and disadvantages of DBMS
PPTX
Difference between File system And DBMS.pptx
PPT
Active directory
PPTX
The database applications
PPT
Database Presentation
PPTX
two tier and three tier
PPTX
Database Administration
PPTX
Introduction to database
PPTX
Database abstraction
PPTX
Dbms database models
PPTX
Database security
PPT
INTRODUCTION TO DATABASE
PPTX
Database security
PPT
Database Management System Introduction
PPT
Data Base Management System
PPTX
Database , 12 Reliability
PPTX
Dbms architecture
Google File System
Structure of dbms
Dbms
Advantages and disadvantages of DBMS
Difference between File system And DBMS.pptx
Active directory
The database applications
Database Presentation
two tier and three tier
Database Administration
Introduction to database
Database abstraction
Dbms database models
Database security
INTRODUCTION TO DATABASE
Database security
Database Management System Introduction
Data Base Management System
Database , 12 Reliability
Dbms architecture
Ad

Viewers also liked (20)

PPTX
Digital Archiving Solutions Presentation English
PPTX
Archiving & Management of Digital Communication - Presentation
PPTX
Database planning
PPTX
Kotler Keller - Marketing Management 15th edition, Chapter 01
PPT
File system-and-database-chapter01-connoly
PPTX
Dbms role advantages
PPT
data resource management
PPT
Chapter 2 database environment
PDF
File Processing System
PPTX
Database Management System
PPTX
Database management system
PPTX
Database system environment ppt.
PPTX
Disadvantages of file management system (file processing systems)
PPTX
Role of Database Management in Information Systems
PPT
Lecture 01 introduction to database
PPT
PPS
Database Design Slide 1
PPT
PPT
Basic DBMS ppt
Digital Archiving Solutions Presentation English
Archiving & Management of Digital Communication - Presentation
Database planning
Kotler Keller - Marketing Management 15th edition, Chapter 01
File system-and-database-chapter01-connoly
Dbms role advantages
data resource management
Chapter 2 database environment
File Processing System
Database Management System
Database management system
Database system environment ppt.
Disadvantages of file management system (file processing systems)
Role of Database Management in Information Systems
Lecture 01 introduction to database
Database Design Slide 1
Basic DBMS ppt
Ad

Similar to Advantages of database management system (20)

DOCX
Database Management Systems (Mcom Ecommerce)
PPTX
Components and Advantages of DBMS
DOC
Assign 1
DOCX
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
PPTX
Introduction to Database Management Systems
PDF
Characteristics and Advantages of Database Management System
PDF
data base management report
PPTX
Chapter one
PDF
DOC
Database
PPTX
DATABASE MANAGEMENT SYSTEMS_module1.pptx
DOCX
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
PPT
Database and Database Management (DBM): Health Informatics
PDF
DBMS NOTES.pdf
PPT
Introduction To Database.ppt
DOCX
DBMS NOTES UNIT I FINAL.docx was prasented
DOCX
DBMS NOTES UNIT I FINAL.docx used for preparation
PPTX
DBMS-INTRODUCTION.pptx
Database Management Systems (Mcom Ecommerce)
Components and Advantages of DBMS
Assign 1
E.F. Codd (1970). Evolution of Current Generation Database Tech.docx
Introduction to Database Management Systems
Characteristics and Advantages of Database Management System
data base management report
Chapter one
Database
DATABASE MANAGEMENT SYSTEMS_module1.pptx
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
Database and Database Management (DBM): Health Informatics
DBMS NOTES.pdf
Introduction To Database.ppt
DBMS NOTES UNIT I FINAL.docx was prasented
DBMS NOTES UNIT I FINAL.docx used for preparation
DBMS-INTRODUCTION.pptx

More from Nafeesa Naeem (20)

DOCX
Business idea of plastic
DOCX
Business plan of GFC fan
DOCX
Business Plan of glow salt
DOCX
Business plan of gourmet
DOCX
Amancio ortega gaona
DOCX
acidosis and alkalosis
DOCX
Water purification
DOCX
Water pollution
PPTX
DOC
Ozone layer
PPT
Dna as a geneticmaterial
PPTX
DOCX
atomspheric structure
DOCX
Animal behavior
DOCX
Acid rain
DOCX
FACTORS AFFECTING ENZYME ACTIVITY
DOCX
freezing point
DOCX
solutions
DOCX
Enzymes
DOCX
Industries of pakistan
Business idea of plastic
Business plan of GFC fan
Business Plan of glow salt
Business plan of gourmet
Amancio ortega gaona
acidosis and alkalosis
Water purification
Water pollution
Ozone layer
Dna as a geneticmaterial
atomspheric structure
Animal behavior
Acid rain
FACTORS AFFECTING ENZYME ACTIVITY
freezing point
solutions
Enzymes
Industries of pakistan

Recently uploaded (20)

PDF
FAMILY PLANNING (preventative and social medicine pdf)
PPTX
FILIPINO 8 Q2 WEEK 1(DAY 1).power point presentation
PPTX
MALARIA - educational ppt for students..
PDF
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
PPTX
Approach to a child with acute kidney injury
PPTX
GW4 BioMed Candidate Support Webinar 2025
PPTX
macro complete discussion with given activities
PDF
3-Elementary-Education-Prototype-Syllabi-Compendium.pdf
PPTX
Chapter-4-Rizal-Higher-Education-1-2_081545.pptx
PDF
Global strategy and action plan on oral health 2023 - 2030.pdf
PPTX
CHF refers to the condition wherein heart unable to pump a sufficient amount ...
PDF
New_Round_Up_6_SB.pdf download for free, easy to learn
PDF
NGÂN HÀNG CÂU HỎI TÁCH CHỌN LỌC THEO CHUYÊN ĐỀ TỪ ĐỀ THI THỬ TN THPT 2025 TIẾ...
PDF
Teacher's Day Quiz 2025
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
DOCX
HELMET DETECTION AND BIOMETRIC BASED VEHICLESECURITY USING MACHINE LEARNING.docx
PDF
V02-Session-4-Leadership-Through-Assessment-MLB.pdf
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PDF
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
PDF
Unleashing the Potential of the Cultural and creative industries
FAMILY PLANNING (preventative and social medicine pdf)
FILIPINO 8 Q2 WEEK 1(DAY 1).power point presentation
MALARIA - educational ppt for students..
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
Approach to a child with acute kidney injury
GW4 BioMed Candidate Support Webinar 2025
macro complete discussion with given activities
3-Elementary-Education-Prototype-Syllabi-Compendium.pdf
Chapter-4-Rizal-Higher-Education-1-2_081545.pptx
Global strategy and action plan on oral health 2023 - 2030.pdf
CHF refers to the condition wherein heart unable to pump a sufficient amount ...
New_Round_Up_6_SB.pdf download for free, easy to learn
NGÂN HÀNG CÂU HỎI TÁCH CHỌN LỌC THEO CHUYÊN ĐỀ TỪ ĐỀ THI THỬ TN THPT 2025 TIẾ...
Teacher's Day Quiz 2025
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
HELMET DETECTION AND BIOMETRIC BASED VEHICLESECURITY USING MACHINE LEARNING.docx
V02-Session-4-Leadership-Through-Assessment-MLB.pdf
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
Unleashing the Potential of the Cultural and creative industries

Advantages of database management system

  • 1. Advantages of database managementsystem ASSIGNMENT
  • 2. Advantages of Database Management System: The DBMS has a number of advantages as compared to traditional computer file processing approach. The DBA must keep in mind these benefits or capabilities during designing databases, coordinating and monitoring the DBMS. The major advantages of DBMS are described below: 1. Controlling Data Redundancy: In non-database systems (traditional computer file processing), each application program has its own files. In this case, the duplicated copies of the same data are created at many places. In DBMS, all the data of an organization is integrated into a single database. The data is recorded at only one place in the database and it is not duplicated. For example, the dean's faculty file and the faculty payroll file contain several items that are identical. When they are converted into database, the data is integrated into a single database so that multiple copies of the same data are reduced to-single copy. In DBMS, the data redundancy can be controlled or reduced but is not removed completely. Sometimes, it is necessary to create duplicate copies of the same data items in order to relate tables with each other. By controlling the data redundancy, you can save storage space. Similarly, it is useful for retrieving data from database using queries. 2. Data Consistency: By controlling the data redundancy, the data consistency is obtained. If a data item appears only once, any update to its value has to be performed only once and the updated value (new value of item) is immediately available to all users. If the DBMS has reduced redundancy to a minimum level, the database system enforces consistency. It means that when a data item appears more than once in the database and is updated, the DBMS automatically updates each occurrence of a data item in the database.
  • 3. 3. Data Sharing: In DBMS, data can be shared by authorized users of the organization. The DBA manages the data and gives rights to users to access the data. Many users can be authorized to access the same set of information simultaneously. The remote users can also share same data. Similarly, the data of same database can be shared between different application programs. 4. Data Integration: In DBMS, data in database is stored in tables. A single database contains multiple tables and relationships can be created between tables (or associated data entities). This makes easy to retrieve and update data. 5. Integrity Constraints: Integrity constraints or consistency rules can be applied to database so that the correct data can be entered into database. The constraints may be applied to data item within a single record or they may be applied to relationships between records. Examples: The examples of integrity constraints are: (i) 'Issue Date' in a library system cannot be later than the corresponding 'Return Date' of a book. (ii) Maximum obtained marks in a subject cannot exceed 100. There are also some standard constraints that are intrinsic in most of the DBMSs. These are; Constraint Name Description PRIMARY KEY Designates a column or combination of columns as Primary Key and therefore, values of columns cannot be repeated or left blank. FOREIGN KEY Relates one table with another table. UNIQUE Specifies that values of a column or combination of columns cannot be repeated.
  • 4. NOT NULL Specifies that a column cannot contain empty values. CHECK Specifies a condition which each row of a table must satisfy. Most of the DBMSs provide the facility for applying the integrity constraints. The integrity constraints are automatically checked at the time of data entry or when the record is updated. If the data entry operator (end-user) violates an integrity constraint, the data is not inserted or updated into the database and a message is displayed by the system. For example, when you draw amount from the bank through ATM card, then your account balance is compared with the amount you are drawing. If the amount in your account balance is less than the amount you want to draw, then a message is displayed on the screen to inform you about your account balance. 6. Data Security: Data security is the protection of the database from unauthorized users. Only the authorized persons are allowed to access the database. Some of the users may be allowed to access only a part of database i.e., the data that is related to them or related to their department. Mostly, the DBA or head of a department can access all the data in the database. Some users may be permitted only to retrieve data, whereas others are allowed to retrieve as well as to update data. The database access is controlled by the DBA. He creates the accounts of users and gives rights to access the database. Typically, users or group of users are given usernames protected by passwords. For example, If you have an account of e-mail in the "hotmail.com" (a popular website), then you have to give your correct username and password to access your account of e-mail. Similarly, when you insert your ATM card into the Auto Teller Machine (ATM) in a bank, the machine reads your ID number printed on the card and then asks you to enter your pin code (or password). In this way, you can access your account.
  • 5. 7. Data Atomicity: A transaction in commercial databases is referred to as atomic unit of work. For example, when you purchase something from a point of sale (POS) terminal, a number of tasks are performed such as;  Company stock is updated.  Amount is added in company's account.  Sales person's commission increases etc. All these tasks collectively are called an atomic unit of work or transaction. These tasks must be completed in all; otherwise partially completed tasks are rolled back. Thus through DBMS, it is ensured that only consistent data exists within the database. 8. Database Access Language: Most of the DBMSs provide SQL as standard database access language. It is used to access data from multiple tables of a database. 9. Development of Application: The cost and time for developing new applications is also reduced. The DBMS provides tools that can be used to develop application programs. For example, some wizards are available to generate Forms and Reports. Stored procedures (stored on server side) also reduce the size of application programs. 10. Creating Forms: Form is very important object of DBMS. You can create Forms very easily and quickly in DBMS, once a Form is created, it can be used many times and it can be modified very easily. The created Forms are also saved along with database and behave like a software component. A Form provides very easy way (user-friendly interface) to enter data into database, edit data, and display data from database. The non-technical users can also perform various operations on databases through Forms without going into the technical details of a database.
  • 6. 11. Report Writers: Most of the DBMSs provide the report writer tools used to create reports. The users can create reports very easily and quickly. Once a report is created, it can be used many times and it can be modified very easily. The created reports are also saved along with database and behave like a software component. 12. Control over Concurrency: In a computer file-based system, if two users are allowed to access data simultaneously, it is possible that they will interfere with each other. For example, if both users attempt to perform update operation on the same record, then one may overwrite the values recorded by the other. Most DBMSs have sub-systems to control the concurrency so that transactions are always recorded" with accuracy. 13. Backup and Recovery Procedures: In a computer file-based system, the user creates the backup of data regularly to protect the valuable data from damaging due to failures to the computer system or application program. It is a time consuming method, if volume of data is large. Most of the DBMSs provide the 'backup and recovery' sub-systems that automatically create the backup of data and restore data if required. For example, if the computer system fails in the middle (or end) of an update operation of the program, the recovery sub-system is responsible for making sure that the database is restored to the state it was in before the program started executing. 14. Data Independence: The separation of data structure of database from the application program that is used to access data from database is called data independence. In DBMS, database and application programs are separated from each other. The DBMS sits in between them. You can easily change the structure of database without modifying the application program. For example you can modify the size or data type of a data items (fields of a database table).
  • 7. On the other hand, in computer file-based system, the structure of data items are built into the individual application programs. Thus the data is dependent on the data file and vice versa. 15. Advanced Capabilities: DBMS also provides advance capabilities for online access and reporting of data through Internet. Today, most of the database systems are online. The database technology is used in conjunction with Internet technology to access data on the web servers.