0% found this document useful (0 votes)
16 views3 pages

UT1 QB DBMS ls1

The document discusses database management systems (DBMS), including advantages of DBMS over traditional file systems, different types of DBMS users, and the three schema architecture of DBMS.

Uploaded by

tpac21062004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views3 pages

UT1 QB DBMS ls1

The document discusses database management systems (DBMS), including advantages of DBMS over traditional file systems, different types of DBMS users, and the three schema architecture of DBMS.

Uploaded by

tpac21062004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

‭1. What is DBMS?

List advantages of DBMS‬


‭ ‬‭database-management‬‭system‬‭(DBMS)‬‭is‬‭a‬‭collection‬‭of‬‭interrelated‬‭data‬‭and‬‭a‬‭set‬‭of‬‭programs‬‭to‬‭access‬‭those‬‭data.‬‭The‬‭collection‬‭of‬‭data,‬‭usually‬
A
‭referred‬ ‭to‬ ‭as‬ ‭the‬ ‭database,‬ ‭contains‬ ‭information‬ ‭relevant‬ ‭to‬ ‭an‬ ‭enterprise.The‬ ‭primary‬ ‭goal‬ ‭of‬ ‭a‬ ‭DBMS‬ ‭is‬ ‭to‬ ‭provide‬ ‭a‬‭way‬‭to‬‭store‬‭and‬‭retrieve‬
‭database information that is both convenient and efficient.‬
‭Data‬‭Integrity,‬‭Data‬‭Security,‬‭Concurrency‬‭Control,‬‭Data‬‭Independence,‬‭Query‬‭Optimization,‬‭Scalability,‬‭ACID‬‭Properties,‬‭Data‬‭Dictionary,‬‭Backup‬‭and‬
‭Recovery, Data Redundancy Reduction, Data Access Control, Structured Query Language.‬

‭ . What are the problems with traditional file system? Explain how DBMS overcome these problems?‬
2
‭1. Data Duplication: Traditional file systems lead to the same info being stored in multiple places, wasting storage space and making updates difficult.‬
‭2. Data Isolation: Data in files is like separate islands; it's not easy to access or share between different parts of a system or among users.‬
‭3. Data Inconsistency: Because data is spread across files, it's easy for different copies of the same data to become different, causing confusion.‬
‭4. Data Integrity: File systems don't check if data is correct; you can accidentally put the wrong information in a file.‬
‭5. Data Security: File systems often lack strong control over who can see and change data, making it vulnerable to unauthorized access.‬

‭ BMS solves these issues by:‬


D
‭6. Centralization: Keeping all data in one place, making it easier to manage and update.‬
‭7. Normalization: Reducing redundancy by organizing data efficiently.‬
‭8. Data Accessibility: Allowing easy access and sharing of data among different parts of a system and users.‬
‭9. Enforcing Rules: Checking that data meets certain rules to ensure correctness.‬
‭10. Security Features: Providing strong control over who can access, modify, or delete data, ensuring it's safe from unauthorized access or tampering.‬

‭3. Compare traditional file system withy DBMS‬

‭DBMS‬ ‭File System‬

‭ BMS‬‭is‬‭a‬‭collection‬‭of‬‭data.‬‭In‬‭DBMS,‬‭the‬‭user‬‭is‬‭not‬‭required‬‭to‬‭write‬‭the‬
D ‭File‬‭system‬‭is‬‭a‬‭collection‬‭of‬‭data.‬‭In‬‭this‬‭system,‬‭the‬‭user‬‭has‬‭to‬‭write‬‭the‬
‭procedures.‬ ‭ rocedures for managing the database.‬
p

‭DBMS gives an abstract view of data that hides the details.‬ ‭File‬ ‭system‬ ‭provides‬ ‭the‬ ‭detail‬ ‭of‬ ‭the‬ ‭data‬ ‭representation‬ ‭and‬ ‭storage‬‭of‬
‭ ata.‬
d

‭ BMS‬ ‭provides‬ ‭a‬ ‭crash‬ ‭recovery‬ ‭mechanism,‬ ‭i.e.,‬‭DBMS‬‭protects‬‭the‬‭user‬


D ‭File‬‭system‬‭doesn't‬‭have‬‭a‬‭crash‬‭mechanism,‬‭i.e.,‬‭if‬‭the‬‭system‬‭crashes‬‭while‬
‭from the system failure.‬ ‭ ntering some data, then the content of the file will b lost.‬
e

‭DBMS provides a good protection mechanism.‬ ‭It is very difficult to protect a file under the file system.‬

‭ BMS‬ ‭contains‬ ‭a‬ ‭wide‬ ‭variety‬ ‭of‬ ‭sophisticated‬ ‭techniques‬ ‭to‬ ‭store‬ ‭and‬
D ‭File system can't efficiently store and retrieve the data.‬
‭retrieve the data.‬

‭DBMS takes care of Concurrent access of data using some form of locking.‬ ‭In‬‭the‬‭File‬‭system,‬‭concurrent‬‭access‬‭has‬‭many‬‭problems‬‭like‬‭redirecting‬‭the‬
‭ le while other deleting some information or updating some information.‬
fi

‭4. Explain different users of DBMS‬


-‭ ‬‭Database‬‭Administrator‬‭(DBA):‬‭The‬‭DBA‬‭is‬‭like‬‭the‬‭boss‬‭of‬‭the‬‭database.‬‭They‬‭set‬‭up‬‭how‬‭the‬‭database‬‭looks‬‭and‬‭make‬‭sure‬‭it's‬‭secure.‬‭They‬‭give‬
‭special keys (usernames and passwords) to people who need to use the database. They also fix problems and keep everything safe.‬
‭-‬‭Naive‬‭/‬‭Parametric‬‭End‬‭Users:‬‭These‬‭are‬‭regular‬‭people‬‭who‬‭use‬‭the‬‭database‬‭but‬‭don't‬‭know‬‭much‬‭about‬‭how‬‭it‬‭works.‬‭They‬‭just‬‭use‬‭it‬‭to‬‭get‬‭stuff‬
‭done, like booking train tickets or clerks in a bank.‬
‭- System Analyst: System analysts check if the regular people's needs are met by the database. They make sure everything works as it should.‬
‭-‬‭Sophisticated‬‭Users:‬‭These‬‭folks‬‭are‬‭experts.‬‭They‬‭can‬‭talk‬‭to‬‭the‬‭database‬‭directly‬‭using‬‭special‬‭language‬‭(SQL)‬‭and‬‭create‬‭custom‬‭things‬‭for‬‭their‬
‭needs.‬
‭-‬‭Database‬‭Designers:‬‭These‬‭are‬‭like‬‭the‬‭architects.‬‭They‬‭plan‬‭how‬‭the‬‭database‬‭should‬‭be‬‭built,‬‭like‬‭what‬‭information‬‭it‬‭should‬‭store‬‭and‬‭how‬‭it‬‭should‬
‭be organized.‬
‭-‬‭Application‬‭Programmers:‬‭They're‬‭the‬‭computer‬‭wizards‬‭who‬‭write‬‭the‬‭programs‬‭that‬‭talk‬‭to‬‭the‬‭database.‬‭They‬‭create‬‭the‬‭tools‬‭that‬‭regular‬‭people‬
‭use to access the database.‬
‭- Casual Users / Temporary Users: These folks only use the database now and then. They need fresh information every time they use it.‬
‭-‬‭Specialized‬‭Users:‬‭These‬‭are‬‭experts‬‭who‬‭build‬‭special‬‭tools‬‭that‬‭don't‬‭fit‬‭the‬‭usual‬‭way‬‭of‬‭working‬‭with‬‭data.‬‭They‬‭might‬‭create‬‭things‬‭like‬‭design‬
‭software or smart systems.‬
‭ . Explain the role of DBA.‬
5
‭●‬ ‭Manages‬ ‭data‬ ‭integrity‬ ‭and‬ ‭security‬ ‭–Data‬ ‭integrity‬ ‭need‬ ‭to‬ ‭be‬ ‭checked‬ ‭and‬ ‭managed‬ ‭accurately‬ ‭as‬ ‭it‬ ‭protects‬ ‭and‬ ‭restricts‬ ‭data‬ ‭from‬
‭unauthorized use. DBA eyes on relationship within data to maintain data integrity.‬
‭●‬ ‭Decides‬ ‭hardware‬ ‭–They‬ ‭decides‬ ‭economical‬ ‭hardware,‬ ‭based‬ ‭upon‬ ‭cost,‬ ‭performance‬ ‭and‬ ‭efficiency‬ ‭of‬ ‭hardware,‬ ‭and‬ ‭best‬ ‭suits‬
‭organization. It is hardware which is interface between end users and database.‬
‭●‬ ‭Database‬ ‭design‬ ‭–DBA‬ ‭is‬ ‭held‬ ‭responsible‬ ‭and‬‭accountable‬‭for‬‭logical,‬‭physical‬‭design,‬‭external‬‭model‬‭design,‬‭and‬‭integrity‬‭and‬‭security‬
‭control.‬
‭●‬ ‭Database implementation –DBA implements DBMS and checks database loading at time of its implementation.‬
‭●‬ ‭Query processing performance –DBA enhances query processing by improving their speed, performance and accuracy.‬
‭●‬ ‭Tuning‬‭Database‬‭Performance‬‭–If‬‭user‬‭is‬‭not‬‭able‬‭to‬‭get‬‭data‬‭speedily‬‭and‬‭accurately‬‭then‬‭it‬‭may‬‭loss‬‭organization‬‭business.‬‭So‬‭by‬‭tuning‬
‭SQL commands DBA can enhance performance of database.‬

‭6. Explain three schema architecture of DBMS.‬


‭ he‬‭Three-Schema‬‭Architecture,‬‭also‬‭known‬‭as‬‭the‬‭ANSI-SPARC‬‭architecture,‬‭is‬‭a‬‭framework‬‭for‬‭structuring‬‭a‬‭Database‬‭Management‬‭System‬‭(DBMS).‬
T
‭It separates the way data is viewed and accessed from the way it's physically stored. Here's an explanation in simple terms:‬
‭Three-Schema‬‭Architecture‬‭separates‬‭the‬‭way‬‭data‬‭is‬‭seen‬‭by‬‭end-users‬‭(external‬‭schema),‬‭the‬‭logical‬‭organization‬‭of‬‭the‬‭data‬‭(conceptual‬‭schema),‬
‭and‬ ‭the‬ ‭physical‬ ‭storage‬ ‭of‬ ‭data‬ ‭(physical‬ ‭schema).‬ ‭This‬ ‭separation‬ ‭makes‬ ‭it‬ ‭easier‬ ‭to‬ ‭manage‬ ‭and‬ ‭maintain‬‭large‬‭and‬‭complex‬‭databases‬‭while‬
‭providing flexibility for different user needs and optimizing data storage and retrieval.‬

‭1. **External Schema (View Level):**‬


‭- This is how the data is presented to the end-users.‬
‭- Think of it as the user interface or the "face" of the database.‬
‭- Each external schema represents a specific view of the data, tailored to the needs of different user groups.‬
‭- It hides the complexity of the underlying data structure, allowing users to interact with the data in a way that makes sense.‬

‭2. **Conceptual Schema (Logical Level):**‬


‭- This is like the blueprint of the database.‬
‭- It defines the overall structure of the data, including tables, relationships, and constraints.‬
‭- The conceptual schema is not concerned with how data is displayed; it's focused on ensuring data integrity and consistency.‬
‭- It acts as an link between the external schemas and the physical schema, providing a logical organization of the data.‬

‭3. **Physical Schema (Storage Level):**‬


‭- This represents how data is actually stored on the hardware, like on disks or in memory.‬
‭- It deals with the details of data storage, indexing, and optimization for performance.‬
‭-‬‭Changes‬‭in‬‭the‬‭physical‬‭schema,‬‭like‬‭moving‬‭data‬‭to‬‭a‬‭different‬‭storage‬‭device,‬‭don't‬‭impact‬‭the‬‭external‬‭or‬‭conceptual‬‭schemas.It's‬‭all‬‭about‬‭the‬
‭efficient and secure storage of data.‬
‭7. Explain the term Data independence and data abstraction w..r.t DBMS‬
*‭ *Data‬‭Independence:**‬‭Imagine‬‭you‬‭have‬‭a‬‭book‬‭with‬‭a‬‭table‬‭of‬‭contents.‬‭Data‬‭independence‬‭in‬‭a‬‭DBMS‬‭is‬‭like‬‭changing‬‭the‬‭page‬‭numbers‬‭or‬‭the‬
‭chapters‬‭without‬‭needing‬‭to‬‭rewrite‬‭the‬‭whole‬‭book.‬‭It‬‭means‬‭you‬‭can‬‭modify‬‭how‬‭the‬‭data‬‭is‬‭stored‬‭(like‬‭adding‬‭more‬‭chapters)‬‭without‬‭affecting‬‭how‬
‭people see and use the data (the table of contents).‬

*‭ *Data‬ ‭Abstraction:**‬ ‭Think‬ ‭of‬ ‭it‬ ‭as‬ ‭different‬‭levels‬‭of‬‭detail.‬‭Data‬‭abstraction‬‭in‬‭a‬‭DBMS‬‭provides‬‭a‬‭way‬‭to‬‭show‬‭different‬‭layers‬‭of‬‭information.‬‭For‬


‭example,‬‭you‬‭can‬‭look‬‭at‬‭a‬‭map‬‭and‬‭see‬‭just‬‭the‬‭country,‬‭then‬‭zoom‬‭in‬‭to‬‭see‬‭the‬‭state,‬‭then‬‭the‬‭city.‬‭Each‬‭level‬‭of‬‭detail‬‭is‬‭a‬‭different‬‭data‬‭abstraction,‬
‭and it lets you focus on what's important for your task without getting overwhelmed by all the details.‬

‭8. Draw and explain DBMS system architecture‬

‭ .‬ ‭**User‬ ‭Interface:**‬ ‭This‬ ‭is‬ ‭where‬ ‭users‬ ‭interact‬ ‭with‬ ‭the‬ ‭DBMS.‬ ‭It‬ ‭includes‬ ‭applications,‬ ‭forms,‬ ‭and‬ ‭queries‬ ‭that‬ ‭allow‬ ‭users‬‭to‬‭input,‬
1
‭retrieve, and manipulate data.‬
‭2.‬‭**Query‬‭Processor:**‬‭When‬‭a‬‭user‬‭requests‬‭data‬‭or‬‭issues‬‭a‬‭query,‬‭the‬‭query‬‭processor‬‭takes‬‭care‬‭of‬‭understanding‬‭the‬‭query‬‭and‬‭figuring‬
‭out how to get the data from the database.‬
‭3.‬‭**Database‬‭Engine:**‬‭The‬‭database‬‭engine‬‭is‬‭the‬‭core‬‭of‬‭the‬‭DBMS.‬‭It‬‭manages‬‭the‬‭storage,‬‭retrieval,‬‭and‬‭manipulation‬‭of‬‭data.‬‭It‬‭includes‬
‭components for data storage, indexing, and transactions.‬
‭4.‬‭**Data‬‭Storage:**‬‭This‬‭is‬‭where‬‭the‬‭actual‬‭data‬‭is‬‭stored.‬‭It‬‭can‬‭be‬‭on‬‭disk‬‭drives,‬‭in-memory,‬‭or‬‭a‬‭combination‬‭of‬‭both,‬‭depending‬‭on‬‭the‬
‭DBMS. The data is organized into tables and files.‬
‭5.‬‭**Security‬‭and‬‭Authorization:**‬‭DBMS‬‭systems‬‭have‬‭security‬‭mechanisms‬‭to‬‭control‬‭who‬‭can‬‭access‬‭and‬‭modify‬‭data.‬‭Authorization‬‭rules‬
‭define what each user or role is allowed to do.‬
‭6.‬ ‭**Concurrency‬ ‭Control:**‬ ‭This‬ ‭component‬ ‭ensures‬ ‭that‬ ‭multiple‬ ‭users‬ ‭can‬ ‭access‬ ‭and‬ ‭modify‬ ‭data‬ ‭simultaneously‬ ‭without‬ ‭causing‬
‭conflicts or data corruption.‬
‭7.‬‭**Backup‬‭and‬‭Recovery:**‬‭DBMS‬‭systems‬‭include‬‭tools‬‭for‬‭making‬‭backups‬‭of‬‭the‬‭data‬‭and‬‭recovering‬‭it‬‭in‬‭case‬‭of‬‭system‬‭failures‬‭or‬‭data‬
‭loss.‬
‭8.‬‭**Query‬‭Optimizer:**‬‭This‬‭is‬‭a‬‭crucial‬‭part‬‭of‬‭the‬‭DBMS‬‭that‬‭decides‬‭how‬‭to‬‭execute‬‭queries‬‭most‬‭efficiently.‬‭It‬‭determines‬‭the‬‭best‬‭way‬‭to‬
‭access and retrieve data to ensure fast query response times.‬
‭9.‬ ‭**Data‬ ‭Dictionary:**‬ ‭The‬ ‭data‬ ‭dictionary‬ ‭is‬ ‭like‬ ‭a‬ ‭catalog‬ ‭that‬ ‭stores‬ ‭metadata‬ ‭about‬ ‭the‬ ‭database,‬‭including‬‭information‬‭about‬‭tables,‬
‭columns, constraints, and more. It helps the DBMS manage and organize the data.‬
‭10.‬‭**Data‬‭Abstraction‬‭Layers:**‬‭The‬‭DBMS‬‭typically‬‭has‬‭multiple‬‭layers‬‭of‬‭data‬‭abstraction,‬‭including‬‭external‬‭schemas‬‭(how‬‭users‬‭see‬‭the‬
‭data),‬ ‭a‬ ‭conceptual‬ ‭schema‬ ‭(the‬ ‭overall‬ ‭database‬ ‭design),‬ ‭and‬ ‭an‬ ‭internal‬ ‭schema‬‭(how‬‭the‬‭data‬‭is‬‭physically‬‭stored).‬‭These‬‭layers‬‭help‬
‭separate the concerns of different user groups.‬

‭ ‬ ‭DBMS‬ ‭architecture‬ ‭is‬ ‭a‬ ‭layered‬ ‭system‬ ‭that‬ ‭provides‬ ‭a‬ ‭structured‬ ‭approach‬ ‭to‬ ‭storing,‬ ‭managing,‬ ‭and‬ ‭accessing‬ ‭data,‬ ‭while‬ ‭offering‬
a
‭security, performance, and flexibility for different user needs.‬

You might also like