0% found this document useful (0 votes)
128 views3 pages

Module 3

The document discusses database management systems and their components. It provides details on how a DBMS operates including: 1) a user program sends a request to the DBMS, 2) the DBMS authorizes the request by matching it to different views, 3) the DBMS retrieves the data from physical storage using an access method. It also lists examples of commonly used DBMS like Oracle, MySQL, and SQL Server.

Uploaded by

Lian Maragay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views3 pages

Module 3

The document discusses database management systems and their components. It provides details on how a DBMS operates including: 1) a user program sends a request to the DBMS, 2) the DBMS authorizes the request by matching it to different views, 3) the DBMS retrieves the data from physical storage using an access method. It also lists examples of commonly used DBMS like Oracle, MySQL, and SQL Server.

Uploaded by

Lian Maragay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

a.

Given the 2 diagrams as shown below, the flat file problems were addressed by
pooling data into a common database that is shared by the users.  How pooling of
data or sharing of data resolves the problems identified in diagram no. 1? (4
points)
By minimizing data redundancy, establishing a single update method, utilizing current
values or information, and separating task data, the Database Approach solves the
problem. There is no data redundancy since each data element is only stored once,
resulting in lower storage costs and no data redundancy. Because each data piece is
only stored in one place, just one update (single update) action is needed. This saves
time and money by reducing the amount of time and money it takes to maintain the
database up to date. Any alteration to the database by one user impacts the current
data values of all other users. Users get access to the whole data domain of the firm
due to task-data independence. If users' information demands spread outside their
immediate sphere, additional needs can be fulfilled more easily than with the flat-file
approach. Users are only limited by the limitations of the firm's data (the entire
database) and the authenticity of their request for access.
 
b.  Given the No. 2 diagram, the database approach where all the firm's
information was pooled in a common database or one basket, what control
definitely can be violated. Why? (4 points).
It may infringe on Access Control. Access control refers to the restriction of access.
Thanks to the construction of a common database or one basket, data that should only
be accessed or allowed by a single user are now accessible by other users, even if they
are not permitted on the supplied data. As a result, it would be against the Access
Control for that user and database.
 
c. List the four elements of the database environment as per diagram no. 3. and
explain in two to three sentences (4 points)

 USERS - The first method is through user application programs developed by


system specialists. These applications send data access requests (calls) to a
database management system, which verifies them and retrieves the information for
processing. Users are unaware of the DBMS's presence while using this kind of
access. Data processing processes (both batch and real-time) are almost the same
in a flat-file system for transactions such as sales, cash receipts, and purchases.

 DATABASE MANAGEMENT SYSTEM -The database management system is the
second component of the database approach. The database management system
(DBMS) creates a controlled environment for helping (or discouraging) user access
to the database and efficiently managing the data resource. The DBMS comes with
application development software. Both programmers and end-users can utilize this
feature to create database-accessing apps.
 DATABASE ADMINISTRATOR - The database's resource management is the
responsibility of the DBA. Multiple users using a shared database require structure,
collaboration, rules, and conventions to ensure the database's integrity. In big
businesses, the DBA position may comprise a whole technical department reporting
to the database administrator. In smaller companies, the DBA position may be filled
by a member of the computer services department.
 PHYSICAL DATABASE - The physical database is the fourth key component of the
database strategy as stated. This is the most fundamental level of the database. The
physical database is made up of magnetic dots on magnetic disks. On a physical
level, a database is a collection of records and information. The core of relational
databases is the indexed sequential file structure.

 
d. Database Management System Operation (8 points)
d.1  User program sends a request (call) for data to the DBMS. The call is written in a
special data manipulation language that is embedded in the user program. (1 pt.)
    d.2. The DBMS analyzes the request by matching the called data elements against
the  User view and the Conceptual view. If the data request matches, it is authorized
and processing proceeds to                Step 3. If it does not match the views, access is
denied. (2 pts.)
    d.3. The DBMS determines the data structure parameters from the Internal view and
passes them to the operating system, which performs the actual data retrieval. Data
structure parameters describe the organization and access method (an operating
system utility program) for retrieving the requested data. (1 pt.)
     d.4. Using the appropriate access method, the operating system interacts with the
disk storage device to retrieve the data from the Physical database. (1 pt.)
     d.5. The Operating System then stores the data in a main memory buffer area
managed by the DBMS. (1 pt.)
      d.6. The Database management system transfers the data to the user’s work
location in main memory. At this point, the user’s program is free to access and
manipulate the data. (1 pt.)
      d.7. When processing is complete, Steps 4, 5, and 6 are reversed to restore the
processed data to the Database.(1 pt)
 
e. Give at least 8 examples of commonly used Data Management Systems? (8
points)

 Oracle Database
 Maria DB
 PostgreSQL
 IBM DB
 Microsoft: Access
 MySQL
 Mongo DB
 Microsoft: SQL Server

 
f.   What My SQL can do in a Database Management System? (5 points)
MySQL creates data storage, data retrieval, administration, reporting, queries, and data
security as a database management system. The MYSQL database is the most
extensively used database management system due to its stability, performance, and
ease of use. The program is compatible with over 20 different computer platforms,
making it suitable for a wide range of operating systems. Through the program, users
may access a large library of tools, training, and support, and consultancy services.
 
g.  Are accountants responsible for normalizing an organization’s databases,
Why? (5 pts.)
No, database normalization is a technical issue that is normally handled by systems
administrators. IT workers are largely responsible for the normalization of an
organization's database. Accountants, on the other hand, should be included in the
procedure for auditing purposes. A normalized organization eliminates data redundancy
while also providing an audit trail for all collected information. As a result, accountants
are involved in the normalization of an organization's database.
 
Honor Pledge:
"I affirm that I have not given or received any unauthorized help on this assignment, that
this work is my own"

You might also like