Database Theory 1
Database Theory 1
Describe the problems associated with the traditional file system which led to the
development of databases [10]
Data redundancy - The file system’s structure makes it difficult to combine data from
multiple sources, and its lack of security renders the file system vulnerable to security
breaches
Data inconsistency: Data inconsistency exists when different and conflicting versions
of the same data appear in different places. For example, suppose you change an
agent’s phone number or address in the AGENT file. If you forget to make
Corresponding changes in the CUSTOMER file, the files contain different data for the
same agent. Reports will yield inconsistent results that depend on which version of the
data is used.
Unauthorized access is not restricted: Data sharing and security are closely related.
Sharing data among multiple geographically dispersed users introduces a lot of
security risks. In terms of spreadsheet data, while many spreadsheet programs provide
basic security options, they are not always used, and even when they are used, they
are insufficient for robust data sharing among users. In terms of the creation of data
management and reporting programs, security and data-sharing features are difficult
to program so they are normally omitted in a file system environment. Such features
include effective password protection, the ability to lock out parts of files or parts of
the system itself, and other measures designed to safeguard data confidentiality. Even
when an attempt is made to improve system and data security, the security devices
tend to be limited in scope and effectiveness.
2. Elaborate on any 3 problems associated with the physical data level of the 3-level
schema [6]
Hierarchical model
The hierarchical model organizes data into a tree-like structure, where each record has
a single parent or root. Sibling records are sorted in a particular order. That order is
used as the physical order for storing the database. This model is good for describing
many real-world relationships.
This model was primarily used by IBM’s Information Management Systems in the
60s and 70s, but they are rarely seen today due to certain operational inefficiencies.