Name : Jawad ali
One of the main advantages of using a database
system is that the organization can exert, via the
DBA, centralized management and control over
the data. The database administrator is the focus
of the centralized control. Any application
requiring a change in the structure of a data
record requires an arrangement with the DBA,
who makes the necessary modifications. Such
modifications do not affect other applications or
users of the record in question.
Reduction of Redundancies: Centralized control
of data by the DBA avoids unnecessary
duplication of data and effectively reduces the
total amount of data storage required. It also
eliminates the extra processing necessary to
trace the required data in a large mass of data.
Elimination of Inconsistencies: The main
advantage of avoiding duplication is the
elimination of inconsistencies that tend to be
present in redundant data files. Any
redundancies that exist in the DBMS are
controlled and the system ensures that these
multiple copies are consistent.
Shared Data: A database allows the sharing of
data under its control by any number of
application programs or users. For example, the
applications for the public relations and payroll
departments can share the same data.
Integrity: Centralized control can also ensure that
adequate checks are incorporated in the DBMS to
provide data integrity. Data integrity means that
the data contained in the database is both
accurate and consistent.
Therefore, data values being entered for the
storage could be checked to ensure that they
fall within a specified range and are of the
correct format.
Security: Data is of vital importance to an
organization and may be confidential. Such
confidential data must not be accessed by
unauthorized persons. The DBA who has the
ultimate responsibility for the data in the DBMS
can ensure that proper access procedures are
followed, including proper authentication
schemes for access to the DBMS and additional
checks before permitting access to sensitive
data. Different levels of security could be
implemented for various types of data and
operations.
Data Security: Data Security is vital concept in a
database. Only authorised users should be
allowed to access the database and their identity
should be authenticated using a username and
password. Unauthorised users should not be
allowed to access the database under any
circumstances as it violates the integrity
constraints.
Sharing of Data : In a database, the users of the database
can share the data among themselves. There are various
levels of authorisation to access the data, and consequently
the data can only be shared based on the correct
authorisation protocols being followed.
Many remote users can also access the database
simultaneously and share the data between themselves.
Sharing of Data : In a database, the users of the database
can share the data among themselves. There are various
levels of authorisation to access the data, and consequently
the data can only be shared based on the correct
authorisation protocols being followed.
Many remote users can also access the database
simultaneously and share the data between themselves.