0% found this document useful (0 votes)
38 views

Database Management System: First Assignment

This document contains an assignment to compare different database management system (DBMS) concepts. The response provides definitions and explanations for each of the requested concepts, including the differences between databases and DBMSs, how databases are defined, constructed and manipulated, the roles of application programs, queries and transactions, and more. Key concepts like logical vs physical data independence, the three schema levels, and single vs multi-valued attributes are clearly defined in the response.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Database Management System: First Assignment

This document contains an assignment to compare different database management system (DBMS) concepts. The response provides definitions and explanations for each of the requested concepts, including the differences between databases and DBMSs, how databases are defined, constructed and manipulated, the roles of application programs, queries and transactions, and more. Key concepts like logical vs physical data independence, the three schema levels, and single vs multi-valued attributes are clearly defined in the response.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

qwertyuiopasdfghjklzxcvb

nmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjkl
Database management system
First assignment
zxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklz
xcvbnmqwertyuiopasdfghj
klzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuio
By Sherin Ahmed c4

Assignment questions:
Compare between the following terms:
- Database & DBMS
- Defining & Constructing & Manipulating database.
- Application program & Query & Transaction
- System Protection & Security Protection
- Transaction Isolation & Atomicity Properties
- DBA & DB Designers & End Users
- System Analysts & Application Programmers (SW Engineers)
- Internal & Conceptual & External schema levels
- Logical data independence & Physical data independence
- DDL & DML
- Strong & Weak entity
- Query Compiler & Query Optimizer
- Composite versus simple (atomic) attributes
- Single-valued versus multivalued attributes
- Stored versus derived attributes
- Two- tier and three tier client server architecture .

Assignment answer:
1)Database and DBMS:
Database is a collection of related data while DBMS (database
management system) is a collection of programs that enable
users to create and manipulate a database.
2)Defining and Constructing and Manipulating database:
Defining a database: involves specifying the data types,
structures, and constraints of the data to be stored in the
database.
Constructing the database: is the process of storing the data
on some storage medium that is controlled by the DBMS.
Manipulating the database: includes functions such as
querying the database to retrieve specific data, updating the
database to reflect changes in the miniworld , and generating
reports from data.
3)Application program and Query and Transaction:
An application program accesses the database by sending
queries or requests for the data to the DBMS.
A query typically causes some data to be retrieved from the
DBMS.
A transaction may cause data to be read and some data to be
written into the database.
4)System protection and Security protection
System protection protects the system against hardware or
software malfunction (or crashes) while security protection
protects the system against unauthorized or malicious access.
5)Transaction isolation and Atomicity properties:

Transaction isolation property: ensures that each transaction


appears to execute in isolation from other transactions, even
though hundreds of transactions may be executing
concurrently.
Transaction atomicity property: ensures that either all the
database operations in a transaction are executed or none
are.
6)DBA and DB designers and End users:
Database administrator (DBA): The DBA is responsible for
authorizing access
to the database, coordinating and monitoring its use, and
acquiring software and hardware resources as needed. The DBA
is accountable for problems such as security breaches and poor
system response time.
Database designers: are responsible for identifying the data to
be stored in the
database and for choosing appropriate structures to represent
and store this data. It is the responsibility of database designers
to communicate with all prospective database users in order to
understand their requirements and to create a design that
meets these requirements.
End users: are the people whose jobs require access to the
database for querying, updating, and generating reports. There
are several categories of end users:
Casual end users occasionally access the database, but they
may need different information each time. They are typically
middle- or high-level managers or other occasional browsers.
Naive or parametric end users make up a sizable portion of
database end users. Their main job function revolves around
constantly querying and updating the database, using
standard types of queries and updatescalled canned
transactionsthat have been carefully programmed and
tested. The tasks that such users perform are varied:

Bank tellers check account balances and post withdrawals and


deposits.
Reservation agents for airlines, hotels, and car rental
companies check availability for a given request and make
reservations.
Sophisticated end users include engineers, scientists,
business analysts, and others who thoroughly familiarize
themselves with the facilities of the DBMS in order to
implement their own applications to meet their complex
requirements.
Standalone users maintain personal databases by using
ready-made program packages that provide easy-to-use
menu-based or graphics-based interfaces. An example is the
user of a tax package that stores a variety of personal
financial data for tax purposes.
7)System Analysts and Application Programmers (SW
Engineers):
System analysts determine the requirements of end users,
especially naive and parametric end users, and develop
specifications for standard canned transactions that meet these
requirements.
Application programmers implement these specifications as
programs; then they test, debug, document, and maintain these
canned transactions.
Such analysts and programmers commonly referred to as
software developers or software engineers, should be familiar
with the full range of capabilities provided by the DBMS to
accomplish their tasks.
8)internal and conceptual and external schema levels:
The internal level has an internal schema, which describes the
physical storage structure of the database. The internal schema

uses a physical data model and describes the complete details


of data storage and access paths for the database
The conceptual level has a conceptual schema, which describes
the structure of the whole database for a community of users.
The conceptual schema hides the details of physical storage
structures and concentrates on describing entities, data types,
relationships, user operations, and constraints.
The external or view level includes a number of external
schemas or user views. Each external schema describes the part
of the database that a particular user group is interested in and
hides the rest of the database from that user group.
9)Logical data independence and Physical data independence:
Logical data independence is the capacity to change the
conceptual schema without having to change external schemas
or application programs.
Physical data independence is the capacity to change the
internal schema without having to change the conceptual
schema. Hence, the external schemas need not be changed as
well.
10)

DDL and DML:

Data definition language (DDL): Defines both schemas.


Data manipulation language (DML): Allows retrieval, insertion,
deletion and modifications.
11)

strong and weak entity:

Weak entities: Do not have key attributes of their own. Identified


by being related to specific entities from another entity type.
Strong entity: have one or more key attributes of their own.
12)

Query compiler and Query optimizer:

Queries are parsed and validated for correctness of the query


syntax, the names of files and data elements, and so on by a

query compiler that compiles them into an internal form. This


internal query is subjected to query optimization the query
optimizer is concerned with the rearrangement and possible
reordering of operations, elimination of redundancies, and use of
correct algorithms and indexes during execution.
13)

composite versus simple (atomic) attributes:

Composite attributes can be divided into smaller subparts, which


represent more basic attributes with independent meanings.
Simple (atomic) attributes that are not divisible.
14)

single-valued versus multivalued attributes:

Single-valued attribute: has only single value .


Multi valued attribute : has more than one value.
15)

stored versus derived attributes:

Derived attributes are the attributes deduced from the attributes


stored in database.

...........................................................................................
........................

You might also like