0% found this document useful (0 votes)
31 views

Database Theory 1

Uploaded by

Tendai Chigondo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Database Theory 1

Uploaded by

Tendai Chigondo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Describe the problems associated with the traditional file system which led to the
development of databases [10]

Data redundancy - The file system’s structure makes it difficult to combine data from
multiple sources, and its lack of security renders the file system vulnerable to security
breaches

Data inconsistency: Data inconsistency exists when different and conflicting versions
of the same data appear in different places. For example, suppose you change an
agent’s phone number or address in the AGENT file. If you forget to make
Corresponding changes in the CUSTOMER file, the files contain different data for the
same agent. Reports will yield inconsistent results that depend on which version of the
data is used.

Difficulty in accessing data: In the old traditional file-based system, system


administration becomes more difficult as the number of files increases. Even a simple
file system with a few files requires creating and maintaining several file management
programs because each file must have its own file management programs that allow
the user to add, modify, and delete records.

Integrity problems: Problems with data integrity is another disadvantage of using a


file-based system. It refers to the maintenance and assurance that the data in a
database are correct and consistent. Data values must satisfy certain consistency
constraints that are specified in the application programs.

Unauthorized access is not restricted: Data sharing and security are closely related.
Sharing data among multiple geographically dispersed users introduces a lot of
security risks. In terms of spreadsheet data, while many spreadsheet programs provide
basic security options, they are not always used, and even when they are used, they
are insufficient for robust data sharing among users. In terms of the creation of data
management and reporting programs, security and data-sharing features are difficult
to program so they are normally omitted in a file system environment. Such features
include effective password protection, the ability to lock out parts of files or parts of
the system itself, and other measures designed to safeguard data confidentiality. Even
when an attempt is made to improve system and data security, the security devices
tend to be limited in scope and effectiveness.

2. Elaborate on any 3 problems associated with the physical data level of the 3-level
schema [6]

Routines are hardcoded to deal with physical representation.


Changes to data structures are difficult to make.
Application code becomes complex since it must deal with details.
Rapid implementation of new features very difficult.

3. Diff between logical data and physical data independence [4]

PHYSICAL DATA LOGICAL DATA


INDEPENDENCE INDEPENDENCE
It mainly concerns about how the It mainly concerned about the
data is stored into the system. structure or the changing data
definition.
It is easy to retrieve. It is difficult to retrieve because the
data is mainly dependent on the
logical structure of data.
As compared to the logical As compared to the physical
independence it is easy to achieve independence it is easy to achieve
physical data independence. logical data independence.
Any change at the physical level, The change in the logical level
does not require to change at the requires a change at the application
application level. level.
The modifications made at the The modifications made at the
internal level may or may not be logical level is significant whenever
needed to improve the the logical structure of the database
performance of the structure. is to be changed.
It is concerned with the internal It is concerned with the conceptual
schema. schema.
Example: Change in compression Example: Add/Modify or Delete a
techniques, Hashing algorithms new attribute.
and storage devices etc.

4. With the aid of a diagram discuss any 1 database model [5]

Hierarchical model

The hierarchical model organizes data into a tree-like structure, where each record has
a single parent or root. Sibling records are sorted in a particular order. That order is
used as the physical order for storing the database. This model is good for describing
many real-world relationships.

This model was primarily used by IBM’s Information Management Systems in the
60s and 70s, but they are rarely seen today due to certain operational inefficiencies.

You might also like