0% found this document useful (0 votes)
26 views20 pages

Vaishu DBMS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views20 pages

Vaishu DBMS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

UNLOCKING THE POWER

OF DATA BASE
MANAGEMENT SYSTEM
DATA BASE MANAGEMENT SYSTEM

A Database Management
System (DBMS) is an essential computerized
data keeping system for efficiently storing,
manipulating, and managing burgeoning data
volumes. Tailored to support data analysis
and augment data-driven processes, these
systems address the escalating pace of data
generation, ensuring businesses can efficiently
manage vast amounts of information while
optimizing system resources.

• Let us Dive into the concepts more to explore


how leveraging the power of a DBMS can
transform your data management strategy
and catalyze your organization’s growth.
What is a database management
12/10/2024

system (DBMS)?

A DBMS is a sophisticated software mechanism that controls and manages databases. This system
empowers users to store, modify, and delete data effectively, facilitating data management across
diverse scales.
3
12/10/2024

Key features of a DBMS


• 1. Data modeling: It uses either a relational model or object-oriented programming to mirror the
complex relationships and structures of data, enabling more intuitive information organization.
• 2. Storage and retrieval: Surpassing traditional file system limitations, it offers sophisticated
methods to store and fetch data, enhancing efficiency and accessibility.
• 3. Concurrency control: Such a system implements mechanisms that allow simultaneous data
access via multiple independent processes. This way, data integrity is not compromised, and
system performance remains optimal.
• 4. Data integrity and security: Employs rigorous protocols to protect financial and other types
of data from unauthorized access and corruption, which is crucial for maintaining the sanctity
of delete and store data operations.
• 5. Backup and recovery: Essential for mitigating data loss, these systems enable organizations
to recover to a stable state post-disruption.

4
TYPES OF DATA BASES
12/10/2024

There are two main types of DBMS: Relational DBMS (RDBMS) and Non-Relational
DBMS (NoSQL).

• RDBMS uses a structured


approach with a federated
schema to organize and
interconnect data, which
is ideal for traditional business
applications.

• NoSQL provides a versatile


framework for varied data
types and storage models (e.g.,
key-value, document, and
graph databases), supporting
scalability and flexibility for
modern, large-scale
applications.

5
12/10/2024

DBMS data models


• A hierarchical database structures data in a tree-like format, allowing for straightforward
parent-child relationships.
• A relational model organizes data into tables, making data access efficient through database
schemas.
• An object-oriented model combines data and processing methods, encapsulating both in objects.
• An object-relational model integrates features from both the object-oriented and relational
models, facilitating the storage and management of more complex data types.
• A network model offers a flexible graph structure for representing complex relationships.
• A flat data model presents data in a simple, tabular form, which is ideal for straightforward data
storage.
• A semi-structured model adapts to unstructured data and does not require a rigid schema.

6
12/10/2024

7
12/10/2024

8
12/10/2024

Database languages
• Data Definition Language (DDL)

• DDL stands for Data Definition Language. It is used to define database structure or pattern.

• It is used to create schema, tables, indexes, constraints, etc. in the database.

• Using the DDL statements, you can create the skeleton of the database.

• Data definition language is used to store the information of metadata like the number of tables and
schemas, their names, indexes, columns in each table, constraints, etc.

• Here are some tasks that come under DDL:

• Create: It is used to create objects in the database.

• Alter: It is used to alter the structure of the database.

• Drop: It is used to delete objects from the database.

• Truncate: It is used to remove all records from a table.

• Rename: It is used to rename an object.

• Comment: It is used to comment on the data dictionary.

• These commands are used to update the database schema that's why they come under Data definition
language.
9
12/10/2024

2. Data Manipulation Language (DML)

DML stands for Data Manipulation Language. It is used for accessing and
manipulating data in a database. It handles user requests.
Here are some tasks that come under DML:

• Select: It is used to retrieve data from a database.


• Insert: It is used to insert data into a table.
• Update: It is used to update existing data within a table.
• Delete: It is used to delete all records from a table.
• Merge: It performs UPSERT operation, i.e., insert or update operations.
• Call: It is used to call a structured query language or a Java subprogram.
• Explain Plan: It has the parameter of explaining data.
• Lock Table: It controls concurrency.

10
12/10/2024

• 3. Data Control Language (DCL)


• DCL stands for Data Control Language. It is used to retrieve the stored or saved
data.
• The DCL execution is transactional. It also has rollback parameters.
• (But in Oracle database, the execution of data control language does not have the
feature of rolling back.)
• Here are some tasks that come under DCL:
• Grant: It is used to give user access privileges to a database.
• Revoke: It is used to take back permissions from the user.
• There are the following operations which have the authorization of Revoke:
• CONNECT, INSERT, USAGE, EXECUTE, DELETE, UPDATE and SELECT.

11
12/10/2024

• 4. Transaction Control Language (TCL)


• TCL is used to run the changes made by the DML statement. TCL can be
grouped into a logical transaction.
• Here are some tasks that come under TCL:
• Commit: It is used to save the transaction on the database.
• Rollback: It is used to restore the database to original since the last
Commit

12
12/10/2024

ACID properties in a DBMS

13
12/10/2024

• 1. Atomicity

• This emphasizes an all-or-nothing approach to transactions within a database environment,


ensuring that a transaction is either fully completed, or not executed at all, in order to avoid
partial updates and maintain data uniformity.
• For example, when executing financial transactions, atomicity allows for the complete success
or rollback of fund transfers between accounts. In this part, there are only two actions:
• Commit: When a transaction is successfully completed, any modifications become visible,
embodying the principle of atomicity.
• Abort: When a transaction is unsuccessful, any changes it attempts to make in the database
remain invisible.

• 2. Consistency
• According to this principle, transactions must transform the database from one correct state
to another, observing all established rules and constraints. This guarantees the database’s
accuracy and dependability, safeguarding data integrity throughout all transactional changes.

14
12/10/2024

• 3. Isolation
• This principle deals with the complexity of concurrent transactions, ensuring they do not
interfere with each other. It enables simultaneous data transactions while ensuring they
remain independent, thus preventing anomalies and preserving data integrity.

• 4. Durability
• This principle ensures that systems can withstand failures, power outages, or any other
disruptions once a transaction is confirmed. It affirms that completed transactions are
indelibly recorded in the database, ensuring data permanence. In the event of data loss,
a recovery manager will ensure the database’s durability.
• Adhering to the ACID properties enables DBMS to effectively oversee data handling, which
is essential for intricate data management tasks and expansive integration efforts

15
12/10/2024

DBMS EXAMPLES
• 1. Microsoft Access
• Geared towards small and medium-sized initiatives, Microsoft Access provides
a relational DBMS with an intuitive graphical interface, simplifying the creation and
management of databases without requiring extensive technical knowledge.
• .2. MySQL
• Renowned for its open-source, relational structure and client-server architecture,
MySQL is a favorite for web-based applications, offering efficient management
of extensive business data.
• 3. ClickHouse
• ClickHouse is an open-source column-oriented DBMS optimized for online
analytical processing (OLAP). It offers rapid query execution and efficient data
compression and, therefore, is widely utilized in big data ecosystems.

16
12/10/2024

• 4. Oracle Database

• Targeted at larger enterprises, Oracle Database delivers a robust relational DBMS capable
of handling complex, sensitive, and hierarchical data structures. It emphasizes security and
comprehensive data management.
• 5. MongoDB

• As a leader in the NoSQL category, MongoDB is celebrated for its document-oriented storage,
providing flexibility in schema design, which is particularly beneficial for projects with rapidly
evolving data requirements.
• 6. IBM Db2 DBMS

• IBM Db2 is a hybrid DBMS optimized for real-time analytics and transactions requiring minimal
latency. It serves businesses that prioritize quick data processing and insights.
• 7.PostgreSQL

• PostgreSQL, an open-source object-relational database management system, stands out for its
robustness, comprehensive adherence to SQL standards, and capability to handle complex data
types. This makes it ideally suited for applications demanding rigorous data integrity verification.

17
12/10/2024

• Paradigm shift from file systems


to DBMSs
• The transition from traditional file systems
to Database Management Systems (DBMS)
represents a significant evolution in managing and
storing data. File systems often come with
challenges; for example:

• Managing data redundancy and consistency leads


to errors and lack of clarity across teams.

• Accessing data is difficult, especially with rapid data


growth.

• Systems are vulnerable to unauthorized access,


compromising data security.

• There’s no concurrency control, resulting in conflicts


during simultaneous access.

• There are no robust backup or recovery


mechanisms, risking data loss.

18
12/10/2024 Sector Application
Universities Student information,
courses, grades, etc.
Sales Customer information,
sales, etc.
Finance Stock information,
sales, bonds, etc.
Banking Customer information,
account, activities,
deposits, loans, etc.
Manufacturing Production
information, suppliers,
inventories, etc.
Airlines Customer information,
schedules,
reservations, etc.
HR Management Employee information,
payroll, deduction,
paychecks, etc.
Telecommunication Call records, bills,
usage, etc. 19
12/10/2024

20

You might also like