Types of Database Users in Dbms
Types of Database Users in Dbms
SCHEMA IN DBMS
Represents the logical configuration of all part of a relational database
Types of schema
Logical
Physical
View
Physical
Course Student
Course_id Student_id
Course_name Student_name
Department Course_id
Section
Student_id
Section_id
Course_id
DATA REPLICATION
Data Replication is the process of storing data in more than one site or node. It is
useful in improving the availability of data. It is simply copying data from
a database from one server to another server so that all the users can share the
same data without any inconsistency.
DISTINGUISH BETWEEN UNION AND RENAME OPERATOR IN RELATIONAL
ALGEBRA
table_name1 ∪ table_name2
States of Transactions
A transaction in a database can be in one of the following states −
The UNIQUE constraint ensures that all values in a column are different. Both
the UNIQUE and PRIMARY KEY constraints provide a guarantee for uniqueness for a
column or set of columns.
The CHECK constraint is used to limit the value range that can be placed in a column. If
you define a CHECK constraint on a table it can limit the values in certain columns based on
values in other columns in the row. ...
The DEFAULT constraint is used to set a default value for a column. The default value
will be added to all new records, if no other value is specified.
1) Usability
Consider how user-friendly the system will be for all those members of
staff required to use it. In some organisations those may include
Marketing professionals, the IT department, Database Developers and
others. Look at the suitability from everyone’s perspective, and
consider if you can set different levels of permission for different
teams or personnel.
Many systems offer drag-and-drop execution, which makes for an
intuitive working methodology. Importantly, however the system
works, make sure it is usable for your whole team.
You should look for visual displays that will help you show selections
and results to colleagues (likely other teams or managers/directors) in
a way that they will be able to understand quickly and easily.
3) Security
Security of your data is an essential aspect of any database
implementation. Business-sensitive data and any personal information
you hold must be stored securely to adhere to regulations and to
protect it from loss or theft.
It is important to consider both the physical risk to data (e.g. the risk
from fire, theft, etc.) and the risks from hacking, or from unintentional
corruption of data through human error. Any system you implement
must address the issue of keeping your data secure.
4) Functionality
Confirm that the modules available in the data analysis software meet
your business requirements. The functionality or modules you should
be looking for include:
7) Scalability
Ensure that the system has the capacity to grow with your data and
your business. Remember you are likely to be adding to the data all
the time, so even though your requirement may not be huge right now,
this can grow very quickly if you are gathering and updating your data
regularly as planned. Essentially…can it easily manage millions of
rows of data?
9) Hosting
Where is your system going to be located (physically)? Will you take
the system in-house or engage the services of a company to host the
data and the software system for you. This could have implications for
support, cost (including any additional hardware you would require),
security, and possibly speed.
10) Updates
The two most important factors regarding updates to the database are
frequency and automation.
Do you need data to be live and constantly in sync with your other
systems, or would daily or even weekly updates to the database be
sufficient? Consider that in order to automate the update process, you
will typically need a consistent data source, i.e. the field types, and the
files supplied each time must be the same. You should consider how
often source data is likely to change, if you are ever going to import
additional data and if so how your chosen software will deal with this.
Examples of DML:
INSERT – is used to insert data into a table.
UPDATE – is used to update existing data within a table.
DELETE – is used to delete records from a database table.
4.DCL(Data Control Language): DCL includes commands such as
GRANT and REVOKE which mainly deal with the rights, permissions and
other controls of the database system.
Examples of DCL commands:
GRANT-gives users access privileges to the database.
REVOKE-withdraw user’s access privileges given by using the
GRANT command.
TCL(transaction Control Language): TCL commands deal with
the transaction within the database.
Examples of TCL commands:
COMMIT– commits a Transaction.
ROLLBACK– rollbacks a transaction in case of any error occurs.
SAVEPOINT–sets a savepoint within a transaction.
SET TRANSACTION–specify characteristics for the transaction.
Key Terms
application programmer: user who implements specific application programs to access the
stored data
application user: accesses an existing application program to perform daily tasks.
database administrator (DBA): responsible for authorizing access to the database, monitoring
its use and managing all the resources to support the use of the entire database system
end user: people whose jobs require access to a database for querying, updating and generating
reports
sophisticated user: those who use other methods, other than the application program, to access
the database