Chapter 1 Introduction To DBMS PDF
Chapter 1 Introduction To DBMS PDF
Introduction
In modern society Databases and database systems plays a vital role. Most of our day to day
activity involves the use of databases. For example, bank application, ticket reservations for any
sort of applications, computerized library etc make use of databases.
Data: Known facts that can be recorded that have implicit meaning.
Information: When data is processed, organized, structured or presented in a given context it
becomes information.
Database: collection of data.
DBMS: DBMS is a collection of interrelated data and a set of program to access those data. The
primary goal of a DBMS is to provide a way to store and retrieve database information that is
both convenient and efficient.
The DBMS manages incoming data, organizes it, and provides ways for the data to be modified or
extracted by users or other programs.
Database System: Database and DBMS collectively known as database system. Database system
is a computerized record keeping system. It is a repository or container for a collection of
computerixed data files. Users of the system can perform or request the system to perform a
variety of operations such as adding new files to the database, inserting data into a existing files,
retrieving or deleting data from existing files, modifying data in existing file or removing existing
files from the database.
An overview of the structure of database management system is shown in Fig. 1.1. A DBMS is a
software package, which translates data from its logical representation to its physical
representation and vice versa.
1.2 Database Management System
The DBMS uses an application specific database description to define this translation. The
database description is generated by a database designer from his or her conceptual view of the
database, which is called the Conceptual Schema. The translation from the conceptual schema to
the database description is performed using a data definition language (DDL) or a graphical or
textual design interface.
• Banking: for all sorts of bank transactions like withdraw, deposit etc
• Airlines: for reserving tickets and to prepare schedules
• Universities: for student information, registration, grades
• Sales: customers, products, purchases
• Online retailers: order tracking, customized recommendations
• Manufacturing: production, inventory, orders, supply chain
• Human resources: employee records, salaries, tax deductions
Databases touch all aspects of our lives
Fig. 1.1 Structure of database management system
A file processing system is a collection of files and programs that access or modify these files.
New files and programs are added by the programmers when there is a need for
• storing new information and
• new ways to access information
File processing system is supported by a conventional operating system. The system stores
permanent records in various files. The system needs different application programs to extract
records from and add records to the appropriate files. Each program defines and manages its own
data.
Fig. 1.2 File based system
1.4 Database Management System
1.2.1 Drawbacks of Conventional File Processing System
Data base is a way to consolidate and control the operational data centrally. The DBMS has a
number of advantages as compared to traditional computer file processing approach. The DBA
must keep in mind these benefits or capabilities during designing databases, coordinating and
monitoring the DBMS. The major advantages of having a centralized database are as follows:
(i) Controlling Data Redundancy
• In traditional computer file processing, each application program has its own files. In
this case, the duplicated copies of the same data are created at many places. In DBMS,
all the data of an organization is integrated into a single database. The data is recorded
at only one place in the database and it is not duplicated.
• When they are converted into database, the data is integrated into a single database so
that multiple copies of the same data are reduced to-single copy.
• In DBMS, the data redundancy can be controlled or reduced but is not removed
completely. Sometimes, it is necessary to create duplicate copies of the same data items
in order to relate tables with each other.
1.6 Database Management System
• By controlling the data redundancy, you can save storage space. Similarly, it is useful
for retrieving data from database using queries.
(ii) Data Consistency
• By controlling the data redundancy, the data consistency is obtained. If a data item
appears only once, any update to its value has to be performed only once and the
updated value is immediately available to all users.
(iii) Data Sharing
• In DBMS, data can be shared by authorized users of the organization. The DBA
manages the data and gives rights to users to access the data. Many users can be
authorized to access the same set of information simultaneously.
• The remote users can also share same data. Similarly, the data of same database can be
shared between different application programs.
(iv) Data Integration
• Data in database is stored in tables. A single database contains multiple tables and
relationships can be created between tables. This makes easy to retrieve and update
data.
(v) Integrity Constraints
• Integrity constraints or consistency rules can be applied to database so that the correct
data can be entered into database.
• The constraints may be applied to data item within a single record or they may be
applied to relationships between records.
(vi) Data Security
• Data security is the protection of the database from unauthorized users. Only the
authorized persons are allowed to access the database. Some of the users may be
allowed to access only a part of database i.e., the data that is related to them or related
to their department.
• Mostly, the DBA or head of a department can access all the data in the database. Some
users may be permitted only to retrieve data, whereas others are allowed to retrieve as
well as to update data. The database access is controlled by the DBA. He creates the
accounts of users and gives rights to access the database. Typically, users or group of
users are given usernames protected by passwords.
• The user enters his/her account number or username and password to access the data
from database.
• For example, if you have an account of e-mail in the "gmail.com", then you have to
give your correct username and password to access your account of e-mail. Similarly,
when you insert your ATM card into the Auto Teller Machine (ATM) in a bank, the
machine reads your ID number printed on the card and then asks you to enter your pin
code to access your account.