Introduction To Database Concept
Introduction To Database Concept
DATABASE FUNDAMENTALS
Course Learning Outcome (CLO)
CLO1
Construct a database using Database Management System (DBMS)
based on the scenario (P3 , PLO3)
CLO2
Perform interpersonal and communication skills based on assigned task
(A2 , PLO5)
Topic 1
Introduction to Database Concept
01
Introduction
Definitions of Database
Banking For customer information, account activities, payments, deposits, loans, etc.
Telecommunication It helps to keep call records, monthly bills, maintaining balances, etc.
It is used for the management of supply chain and for tracking production of
Manufacturing
items. Inventories status in warehouses.
Sharing of Data
• In a database, the users of the database can share the data among themselves. There
are various levels of authorization to access the data, and consequently the data can
only be shared based on the correct authorization protocols being followed.
• Many remote users can also access the database simultaneously and share the data
between themselves.
Why Use a DBMS?
Data Integrity
• Data integrity means that the data is accurate and consistent in the database. Data
Integrity is very important as there are multiple databases in a DBMS. All of these
databases contain data that is visible to multiple users.
• So it is necessary to ensure that the data is correct and consistent in all the databases
and for all the users.
Data Security
• Data Security is vital concept in a database. Only authorized users should be allowed
to access the database and their identity should be authenticated using a username
and password.
• Unauthorized users should not be allowed to access the database under any
circumstances as it violates the integrity constraints.
Why Use a DBMS?
Privacy
• The privacy rule in a database means only the authorized users can access a database
according to its privacy constraints. There are levels of database access and a user
can only view the data he is allowed to.
• For example - In social networking sites, access constraints are different for different
accounts a user may want to access.
Hierarchical Network