Database Administration and Data Mining
Database Administration and Data Mining
A-1 Introduction: Database Management System (DBMS) Data is one of the most important
business assets. In any organization data is the basic resource needed to run the organization.
It is only useful when it is suitably managed. When data is properly managed, it transforms into
information which can be utilized in making business decisions.
Organizations can only survive when it takes optimized decisions in the highly competitive
market. The optimal business decisions can be made only if organization is able to affectively
collect, organize, analyze and interpret data and get proper information.
Now we can understand the importance of data management in all business operations. The data
is effectively managed in a data base by using a database management system.
The database management system is a software package which effectively manages the database.
The database is created and maintained by an integrated set of programs termed as the Database
Management System (DBMS).
Conveniently and effectively defining, storing, retrieving and manipulating the data contained in
the database, is the major aim of the DBMS.
A Database Management System (DBMS) is a software tool used to perform various types of
operations on data in a database and creates a convenient and effective environment which helps
the users to access data easily.
Data- Is a collection of information or real facts which can be recorded and have implicit
meaning. Customer_name, item_price, balance etc. can be considered as data.
A Database-Is a shared collection of related data, by date we mean known fact that can be
recorded and that have implicit meaning.
For example, couldn't consider the names, telephone numbers and addresses of the people that
you know. This data is recorded in an indexed address book or stored on a diskette or using a
personal computer this is a collection of related data with an implicit meaning and hence it is a
database.
A Database Management System (DBMS) is software that helps in effective and convenient use of
database by utilizing and maintaining huge collections of data. OR Is a computer based system or
program to record and maintain information or data. Your database can be viewed as a
respiratory of data that is defined once and then accessed by various users as shown.
Characteristics of a DBMS
The DBMS has been designed in such a way that it can cater to the needs of huge
business organizations and can store large data with efficient operations on them.
Database can store things like cost of vegetables or cost of different brands of breads or
milk etc. The entities in the database look like the real-world entities (please have a look
at the table for student database shown below).
For example, we can have a Database Management System for a School or a big MNC,
and the data is stored in the form of real-world entities. Any student that is stored in a
student database is like a real-world student (object/entity) and has properties (commonly
known as attributes in DBMS terms) like his/her name, gender, age, roll number, etc.
2. Self-Explaining Nature: A DBMS contains one database and along with that it also
contains metadata about that one database.
Metadata is the data about data. For example: In a DBMS for a particular School, the
total Number of rows in the database and what is the name of each column of the
database table, and all such information about the data is metadata.
So, the combination of this database and metadata leaves no questions in anyone’s mind
as the DBMS becomes self-explanatory. This is because the database has all the
information in a structured format and if anyone has any doubts or questions regarding
how the database is designed, they may investigate the metadata.
● 3-Integrity: Integrity means that the data which comes into the Database should be correct
as well as consistent. Let us see an example to understand the meaning of correct and
consistent data with respect to DBMS.
For instance: Let us say that there is an XYZ bank, and it has its own database of all the
customers of the bank. If we are entering the details of XYZ Bank’s account and the
account number is not specific to that bank, the data is incorrect. However, if a person
has changed his/her address in the savings account of the same Bank and the current
account still has the old address of the person in the current account’s details, this is data
inconsistency.
In DBMS, the data that is entered into the database is both correct as well as consistent.
Apart from that, integrating changes is very easy in a database.
For instance, if the bank earlier had a constraint of having a minimum account balance of
0 and now it has changed it to 2000 Rupees, the DBMS will be able to integrate this
change very easily and all the accounts that do not have a minimum balance of 5000 will
be detected and notified accordingly.
The access to make changes to a database by the user should be limited and the users
must not be given complete access to the entire database.
Authentication: The DBMS has authentication for various users that directly refers to the
limit to which the user can access the Database. Authentication means the process of
laughing in of the user only with the rights that he/she has been authorized to. For
instance, in any organization, admin has the access to make changes to the database of
the organization as some new employee might have joined the organization or someone
might have left it. However, the employees have access only to their personal profile and
can make changes to it only. They cannot access the database of any other employee or
the organization.
These kinds of security measures are available and built very strongly in a DBMS.
4. Relational databases: Relational databases were first introduced in the 1970s. In this type
of database, each record contains fields called attributes. Each attribute represents one
piece of information about a particular object. For example: If you want to keep track of
your personal details then you will need three different attributes namely name, address,
phone number. All of these attributes together form a single row in a table.
This means that every time we add new information into our database, we must insert
multiple rows into the same table. If we do not follow this rule, then we may end up
having duplicate entries in our database. So relational databases allow us to organize data
using relations between objects.
5. Supports Multiple Views of Data: A view can be said to be a subset of a database which
gets defined by specific users of the systems with each view containing data which is of
interest to a specific user or group of users. This means that there can be multiple views
on the system.
6. Sharing of Data and Multiple User System: A multiple user database system allows
multiple user access. In order to achieve this community d my user DBMS should have
concurrency control strategies implemented.
7. Control Data Redundancy: Ideally each data item should be stored in only one location in
the database under the database approach. Nevertheless, redundancy occurs which is
controlled for keeping it at a minimum for improved system performance.
8. Data Sharing: as data is integrated in an organization, it leads to better capability for
producing more information from a specific amount of data.
9. Enforcing integrity constraints: For defining and enforcing the limitations like data type,
data uniqueness, ETC., DBMS must provide the capability.
10. Restricting Unauthorized Access: All users of the system do not have the same access
rights. This is achieved by DBMS providing the security subsystems for creating and
controlling user’s account.
11. Transaction Processing: The DBMS should have concurrency control subsystems to
ensure that simultaneous updating by several users is done in a controlled manner.
Consistency and validity must be maintained in the updates.
A-2 The objective of DBMS is to provide convenient and effective methods of defining, storing
and retrieving the information contained in the database.
In addition, the DBMS must provide for the safety of the information stored it should protect the
data from system crash or attempts at unauthorized access. If the data are to be shared among
several users, the system must have like possible anomalous results.
1. Availability: Data burst be available for applications and queries. Data availability refers to
the fact that the data are made available: to wide variety of users, in a meaningful format,
at reasonable cost, with ease of access, when and where required.
2. Shareability: Data items prepared by one application must be available to all other
applications on queries. No data items are exclusive to an application.
3. Data Integrity: Integrity is a critical aspect to the design, implementation and uses of any
system which stores, processes, or retrieves data. Data integrity refers to the correctness of
the data in the database. In other words, how reliable is the data available in the database.
Integrity also means your data is authentic, accurate and consistent.
4. Data Security: Refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, websites, databases or parts thereof. Data security
refers to the fact that only authorized users can access the data. Data security can be
enforced by passwords. if two separate users are accessing a particular data at the same
time, the DBMS must not allow them to make conflicting changes. Data security protects
data from corruption. It also refers to the collective measures used to protect and secure a
database and its management software from illegal use and malicious threat and attacks.
Database security professionals employ a number of practices to assure data integrity,
including data encryption, which locks data by encryption, data backup which stores a
copy of data in an alternative location, access controls, including assignment of read/ write
privileges. Input validation that prevents incorrect data entry. Data validation next certifies
uncorrupted transmissions.
6. Evolvability: Golden the database must evolve as application usage and query needs
evolve.
A-3 A database can be viewed in the three level of abstraction, and it is known as three level
architecture. So, there are three independent levels by which database is organized.
1. External View: The highest level of the abstraction is external view. This view contains
the users or application program concerns. For a conceptual or global view, various
users’ view scan exists.
‘External or subschema’ is used to describe the external views. these schemas have:
● Logical records definition,
● methods of deriving the objects in the external view from the objects in the
conceptual view.
The object comprises of:
● Entities,
● Attributes, and
● Relationships.
2. Conceptual view: The database entities and relationships among them are considered at
the abstraction level. Conceptual views are described using conceptual schemas.
It explains all the relationships and records comprised in the conceptual view. So, based
on this every database has only one conceptual schema.
The method of deriving the objects in the conceptual view from the objects in the internal
view is also considered by the conceptual view.
● It is described using internal schema. The definition of the stored records is also
included by internal schema and following does that also used.
● Methods of representing the data fields,
Components include:
o File manager manages allocation of disk space and data structures used to
represent information on disk.
o Database manager: The interface between low-level data and application
programs and queries.
o Query processor translates statements in a query language into low-level
instructions the database manager understands. (May also attempt to find an
equivalent but more efficient form.)
o DML precompiler converts DML statements embedded in an application program
to normal procedure calls in a host language. The precompiler interacts with the
query processor.
o DDL compiler converts DDL statements to a set of tables containing metadata
stored in a data dictionary.
▪ data isolation,
▪ atomicity of updates,
▪ concurrent access,
▪ security problems, and
If there are multiple copies of the same data, it just avoids it. It just maintains data in a single
repository. Also, the purpose of database systems is to make the database consistent.
A database system can easily manage to access data. Through different queries, it can access data
from the database.
Data isolation:
Atomicity of updates:
In case of power failure, the database might lose data. So, this feature will automatically prevent
data loss.
Concurrent access:
Users can have multiple access to the database at the same time.
Security problems:
Database systems will make the restricted access. So, the data will not be vulnerable.
It can support multiple views of data to give the required view as their needs. Only database
admins can have a complete view of the database. We cannot allow the end-users to have a view
of developers.
Advantages of Database System
1. Data Abstraction: Data abstraction means, to hide the complexity of data from the basic
users. DBMS abstracts the data from the users, which is not useful for the users it shows
only those data which are useful for the users.
2. Controlling Data Redundancy: Data redundancy means having multiple copies of the
same data. DPMS controls the data redundancy and integrates all data into a single
database file. Controlling the data redundancy also helps to save us towards space and
increase retrieval and update speed.
3. Minimized data inconsistency: Data inconsistency means that different files may
contain different information about a particular object or person. If the VMS has reduced
the data redundancy, then the database system leads to better data consistency full our
data items appears only once (no redundancy) so the updated values are immediately
available to all users.
4. Data Manipulation Easily: in DBMS, data can be manipulated easily, because data is
centralized so once the data structure is defined, we can easily change in the data like-
insertion, modification, or deletion.
5. Data Sharing: Data can be shared data can be shared easily by multiple applications in
centralized DBMS. The application can be developed without having to create any newly
stored files. The DBMS helps to develop a friendly environment where end users can
access and manage data.
6. Data Security: Data is very important for any business organization. The more users
access the data, the higher risk of data security breaches. If someone stole business data,
then it would be very bad for business. So, a company will never want any outsider to
come and access the company's data. The business organization invest plenty amount of
time, effort, and money to ensure that its data are used by only authorized users first
DBMS provides data security means protecting your precious data from unauthorized
access data can be accessed only by authorized users of the organization. A database can
be accessed only by proper authentication usually by verifying login and password.
7. Support Multiuser Views: Multi users can view the data at the same time. Using the
database, many users can access the data at the same time which increases our working
speed. DBMS gives the ability for its multiple authorized users to access the same
database from different locations, in different ways, to complete its different works.
8. Concurrent Access: several users can access the database concurrently.
9. Helps for Decision Making: Better organize data and improve data across gives us a
better-quality information which helps for making better decisions.
1. Cost of Hardware and Software: In order to run the DBMS software, we need a
high-speed processor, and a large memory size is required which causes expensive
hardware is needed.
2. Cost of Data Conversion: When a computer file-based system is replaced with a
database system, then the data stored in the data files must be converted into database
files close it is difficult and time-consuming method to convert the data of data files
into database.
3. Cost of Staff Training: DBMS are often complex systems, so training is required for
the users to use the DBMS. The organization has to be paid plenty of amount for the
training of workers to run the database management system.
4. Problem Associated with the Centralization: There is less security when data is
accessed in centralized (data is accessed by every user) manners. So, data can be lost
and damaged.
5. Complexity of Backup and Recovery: In a multiuser database system when backup
is loading, it may lead to delicacy of data. If one takes the database backup, then it
may affect the multiuser database system (which is in operation).
6. Confidentiality, Privacy and Security: When data is accessible from the remote
location (it is, database system is centralized) then the possibilities of misuse of data
increases compared to conventional database.
7. Data Quality: Suitable and sufficient controls are required to control the users who
are updating their data and control the data quality. Direct access of data by various
users leads to massive opportunities for user to damage their data. So, if not suitable
controls are available then it may have that data is comprised.
Unit-2 Database Administration
Introduction
Purpose of Database Administration
Concept of Database Administration
Transaction Management, Properties of Transaction (ACID properties)
Q-1 What is database administration. And what is the purpose of database administration.
A-1 Database administration consist of everything required to manage your database and make it
available as needed.
The database administrator (DBA) is the person who manages, backs up and ensures the
availability of the data produced and consumed by today's organizations via their IT systems.
For example, no he is the person who ensures that the banker tellers have easy, fast access to
your information, and can quickly access your bank balance and transaction history. In this
example, the DBA is a system or application database administrator-a general DBA role
responsible for most aspects of the organization's databases.
Data administrator (DA) is a person who is responsible for processing data into a convenient data
model. The person is in charge of figuring out which data is relevant to be stored in the database.
Data administrator is less of a technical role and more of a business role with some technical
knowledge.
In small organizations, the database administrator or the DBA is responsible for undertaking data
administration tasks.
The core responsibility of DBA includes administration of the database, administration of the
database management system or DBMS and the administration of the database environment.
● Physical design: The DBA is concerned with the physical design and
implementation of the database and not the conceptual and logical design of
the database systems.
● Data standards and documentation: The DBA ensures that the physical data
is documented in a standard manner so that multiple applications and users
can easily and effectively access it.
● Monitoring data usage and tuning database structures: The DBA also
performs the task of monitoring the live running against a database and
modifying schemas and structures to increase the performance of the database
systems.
● Data archiving: The DB has to put into implementation a strategy to achieve
the “dead” data.
● Data Backup and Recovery: In the event of hardware or software failure, it
is the DBA who established and implements the procedures to backup and
recovery of data fully
● Installation: the DBA is responsible for installing the DBMS and its components.
● Configuration control: the DBA enforces policies and procedures for managing
updates and changes to the software of database system
● Monitoring DBMS usage and tuning DBMS: the DBA monitored life running
against DBMS and dealer the element of the DBMS is to enhance the
performance of the system.
● Data control: DB must establish user groups, assign passwords, grant access to
DBMS facilities and grant access to databases to the users and application
systems.
● Impact assessment: DBA assesses the impact of any changes in the use of the
database systems.
● Privacy, Security, and Integrity: the DBA must ensure that strategies laid down
for the data integrity, security, and privacy is adhered to at the physical level.
● Training: DB must manage education and training of users with respect to
principles and policies of the database use.
A-3 Introduction: Transactions are collections of operation that forms a single logic unit of
work put stop in case of system failure, a transaction makes sure that after recovery the data will
be in a consistent state.
The transaction represents any real-world event of an organization where concurrency control is
required.
Transaction processing system execute database transactions using large number of databases
and hundreds of concurrent users.
Every transaction is delimited by statements or function calls of the form begin transaction and
end transaction.
The reliability of DBMS is linked to the reliability of computer system and some solution must
be there to deal with such computer system failures.
Recovery system, the main component of transaction management/ processing unit, deals with
such failures. It makes the database fault tolerant.
Number of transactions can be executed at the same time and be accessing the same database.
Search for current access to the database may result in some inconsistent state of database.
Go currency control/ management unit of transaction management preserves the consistency of
database in case of concurrent accesses.
Operations in Transaction
1. Read Operation: Read operation treat the data from the database and then stores it in the
buffer in main memory.
For example, Read(A) instruction will read the value of A from the database and will
store it in the buffer in main memory
Write Operation: Write operation writes the updated data value back to the database
from the buffer.
For example, Write (A) we'll write the updated value of A from the buffer to the
Database.
In DBMS, we write the above 6 steps transaction like this: let's say your account is A and your
friend's account is B, you are transferring 10,000 from A to B, the steps of the transactions are:
1. R(A);
2. A= A - 10000;
3. W(A);
4. R(B);
5. B= B + 10000;
6. W(B);
In the above transaction, R refers to the read operation and W refers to the right operation.
Transaction States
There are different states that the transactions can have. These includes:
1. Active: This is the initial state of a transaction that a transaction enters when it begins and
remains in this state when it is running.
2. Abort: A transaction that is not inactive or running state is aborted. When a transaction is
aborted, the system must return to the state it was in when the transaction began, and any
changes caused by the aborted transaction must be rolled back. Next time commit when a
transaction is permanently completed, it is said to be in the commit state. Once the
transaction has been committed, any changes caused by the transactions cannot be
undone.
3. Partially Committed: A transaction is partially committed when all statements in the
transactions are completed.
4. Failed: When a transaction encounters some abnormal or errant conditions and cannot
continue, it is said to be in a failed state.
Q-4 Describe ACID properties in detail.
A-4 To ensure the integrity of data, database system maintains following properties of
transactions.
1. Atomicity: This, we mean that either the entire transaction takes place at once or doesn't
happen at all. There's no midway it is transaction do not occur partially. Each transaction
is considered as one unit and either runs to completion or it is not executed at all. It
involves the following two operations:
A. Abort: If transaction aborts, changes made to database are not visible.
B. Commit: If a transaction commits, changes made are visible. Atomicity is also
known as the’ all or Nothing Rule’
1. Active State –
When the instructions of the transaction are running then the transaction is in active
state. If all the ‘read and write’ operations are performed without any error then it
goes to the “partially committed state”; if any instruction fails, it goes to the “failed
state”.
2. Partially Committed –
After completion of all the read and write operation the changes are made in main
memory or local buffer. If the changes are made permanent on the Database, then the
state will change to “committed state” and in case of failure it will go to the “failed
state”.
3. Failed State –
When any instruction of the transaction fails, it goes to the “failed state” or if failure
occurs in making a permanent change of data-on-Data Base.
4. Aborted State –
After having any type of failure the transaction goes from “failed state” to “aborted
state” and since in previous states, the changes are only made to local buffer or main
memory and hence these changes are deleted or rolled-back.
5. Committed State –
It is the state when the changes are made permanent on the Data Base and the
transaction is complete and therefore terminated in the “terminated state”.
6. Terminated State –
If there isn’t any roll-back or the transaction comes from the “committed state”, then
the system is consistent and ready for new transaction and the old transaction is
terminated.
Q-1 What is Data Warehousing? And explain the purpose of Data Warehousing.
A-1 Introduction: Database contains information organized in columns and rows commas and
tables that is periodically indexed to make accessing relevant information more accessible.
Many enterprises in organizations create and manage databases using a database management
system. special DBMS software can be used to create and store your product inventory and
customer information.
Organizations most often used a data basis for online transaction processing (OLTP).
A database was built to store current transactions and enable fast access to specific transactions
for ongoing business processes, known as Online Transaction Processing (OLTP)
The term “Data Warehouse” (DW) Was first coined by bill Inman in 1990. According to Inman,
a data warehouse is subject oriented, integrated, time variant and non-volatile collection of data.
This data helps analysts to take informed decision in an organization.
According to Raj Kimball, Data Warehouse is a copy of transaction data specifically structured
for queries and analysis.
Therefore, data warehouse can be thought of as a collection of prepacked or summarized data
which is developed as per particular business rules. It is also designed in such a way that it helps
in taking management decisions.
The following types of information are stored in a data warehouse:
1. Business Information: It stores business information which has been sourced from
throughout the organization and encompassing all aspects of the company's product
processes and customers.
2. Standard Reports and Queries: Most of the users of the data warehouse require a set of
standard reports and queries. Thus, it becomes very useful when these standard reports
are periodically, automatically produced. In such a case, the user just views the report
whether required instead of taking the time to run the report every time. This saves time
as well as increases manpower productivity.
Purpose of Data Warehousing
The main purpose of data warehouses is to provide the companies with accessibility. It also
provides the analysis of data to derive accurate business visions and forecasting models.
Data warehouses is an important business intelligence tool that allows organizations to:
1. Ensure Consistency: Data warehouses are used to apply a uniform format to all data to
make it easier for the business decision maker to analyze the data and share insights on
the data. This also reduces the risk of error in interpretations and improves overall data
accuracy full
2. Make Better Business Decisions: Popular businesses leaders develop data-driven
strategies and make decisions without consulting facts. Data warehousing improves the
accessibility and efficiency of data and is helpful in making better company decisions.
3. Improve Bottom Line: Platforms allow business to access the historical activity of an
organization to know of the initiatives that have been successful or unsuccessful in the
past. This enables the executives to attach their strategies, decrease cost and maximize
efficiency of the organization.
Q-2 Explain Data Warehousing Concepts
a-2 The basic concept of data warehouse is to enable a company to make better decisions and
forecast business outcomes.
Data warehouse is an information system that involves historical and commutative data from a
single or multiple sources as it helps to simplify the reporting and analysis process of an
organization.
The different concepts of Data Warehousing are:
1. Dimensional Data Model: It is commonly used in the data warehouse systems and is
designed to read, summarize, analyze numeric information. This model helps to arrange
data in a manner that makes it easy to retrieve the information.
The two schemas are:
i. Star Schema: This is easy to design with the center of the star consisting of a fact
table and the points of the star as dimension tables. The fact tables are in third
normal form and dimensional tables are denormalized.
ii. Snowflake Schema: this is an extension of star schema where each dimension is
normalized and connected to more dimension tables.
2. Conceptual Data Model: This model identifies the highest-level relationships between
the several entities. This describes the database at a very high level and is useful to
understand the requirements of the database.
This model is used in the requirement gathering process before the database designer
starts making a specific database.
3. Logical Data Model: This model describes the data in as much detail as possible
irrespective of how it is physically implemented in their database.
4. Data Model: This model represents how the model will be built in the database. This
model shows all table structures consist of column name, column date type, column
constraints called maki and relationships between tables.
The different services such as servers, storage systems, networking equipment, data
center space and so on are combined for managing the workloads.
On this infrastructure, the personalized software can be developed by the users. For
example, Amazon, GoGrid, 3 Tera and so on.
IAS can be seen as a physical server space which can be rented, and it can be maintained
in the data warehouse of the vendor.
Any sort of legal software can be uploaded to this server by the customer and then his
staff and clients can be provided the access as per the choice.
Different computer resources and storage are provided by IAAS which can be utilized by
the developers and IT firms for facilitating the business solution.
2. PaaS (Platform as a Service): In this type of services the software layer or development
environment is combined and offered in the form of a service, and it can be used as the
foundation of other higher level of services.
The customers are provided with the options of creating their own applications which can
be run on the infrastructure of this service provider.
The typical example of these is Google's app engine, force.com ETC platform as a
service is the place where different operating systems for example windows, Android,
BST, iOS, Linux, Mac, IBM on the cloud are installed in place of installing them on a
physical hardware.
The standard remote services are facilitated by PaaS which can be used by the developers
to create the applications on the computer infrastructure.
It can consist of different developer tools which can be provided as service and it can be
utilized to create services, data access and data services or billing services.
3. SaaS (Software as a Service): This is the model where the entire application is provided
to the customers in the form of service on demand.
On the cloud a single service instance is executed, and different users can be served
for customers, there is no requirement of any type of initial investment in server or
software licenses. On the other hand, the cost is reduced for the provider as there is only
one application which has to be hosted and maintained.
Companies such as Google, Salesforce, Microsoft, Zuho, ETC are SaaS providers.
In the case of sense, hosting of the software is managed by the service provider and thus
there is no requirement of installing it managing or buying the hardware the customer can
directly connect and start using it
There are three main models it is possible to deploy in the cloud environment.
1. Public Cloud: Third parties have the ownership and authority of management of
these clouds.
A greater economy of scale at a lower price is facilitated to the users as different users
are charged the infrastructure costs for facilitating the low cost to every individual
client with the help of pay as you go model.
The similar infrastructure pool having limited configuration security protections and
availability variances are shared to every client. Cloud providers management support
these.
The main benefit of the public cloud is that the size of these clouds may be greater
than that of enterprise clouds and thus the facility of seamless scaling is provided as
per demand.
2. Private Cloud: They are mainly created only for the single organization. The main
focus remains on the data safety and improving control which are not provided in the
public clouds. The private clouds are mainly of two types
i. On Premises Private Cloud: This is also termed as internal clouds and the hosting is
done within the data center owned by the enterprise. A greater standardization and
protections are facilitated by this model but in case of size and scalability, it has some
limitations.
For the physical resources, there will be some capital and operational cost incurred in
the IT department.
ii. External Hosted Private Cloud: The hosting in this sort of private cloud is done
with the help of an external cloud provider in which an exclusive cloud environment
ensures the full privacies provided. This kind of cloud is mainly preferred by those
organizations which do not refer to public clouds due to physical resource sharing.
3. Hybrid Cloud: This is mainly the combination of both public and private cloud
models. Third party cloud providers can be used by hybrid cloud service providers
fully or partially and therefore offering greater flexibility.
This kind of environment can facilitate the on demand, externally provided scale. Any
sort of increase in the workload can be managed effectively by combining a private
cloud with public cloud resources.