DataBase Lec 01 Notes
DataBase Lec 01 Notes
1. File-Based System
A file-based system is an early approach to data management where data is stored in
separate files and managed by different application programs. It was used before the
development of Database Management Systems (DBMS).
Example:
A university maintaining student records may store student details in one file and
course enrollments in another. A separate application is required to process each file.
Database Approach
Key Concept
✅ A database is a shared collection of logically related data, along with its description
(metadata), designed to meet the information needs of an organization.
3.1 Database
● A centralized collection of data that multiple users and applications can access.
● Data is logically related and stored in a structured format.
● Example: A university database stores student records, courses, and faculty details in
one system instead of separate files.
● A software system that allows users to define, create, maintain, and control access
to the database.
● It acts as an interface between users and the database.
● Examples: MySQL, Oracle, SQL Server, PostgreSQL.
● Database Administrator (DBA) – Manages the database, ensures security and backups.
● Database Designers – Design the structure and schema of the database.
● Application Developers – Build applications that interact with the database.
● End-Users – People who access the database through applications.
4.4 Views
● Different users can see customized versions of the database using views, while actual
data remains unchanged.
6.1 Complexity
🚨 Example: A small company using simple Excel spreadsheets may struggle to migrate to a
full-fledged database system like Oracle.
● DBMS software can be expensive, especially for commercial solutions (e.g., Oracle,
SQL Server).
● Even open-source DBMS (e.g., MySQL, PostgreSQL) require setup, maintenance, and
skilled staff, which adds to costs.
🚨 Example: A startup may find it costly to purchase hardware, software, and hire database
experts for managing a DBMS.
● Since a single database stores all organizational data, it becomes a prime target for
hackers.
● If security is not properly managed, data leaks or unauthorized access can occur.
● Strict access control policies, encryption, and backups are required.
🚨 Example: If an online banking database is hacked, customer data and financial records can
be exposed.
7. Conclusion
The database approach revolutionized data management by centralizing data storage,
ensuring consistency, enhancing security, and enabling efficient data access. However, it
also introduces challenges such as high costs, complexity, security risks, and performance
overhead. Organizations must carefully plan their database infrastructure, security, and
maintenance to maximize benefits while minimizing risks.