0% found this document useful (0 votes)
22 views7 pages

CH 1,2,3 Helf DM

The document outlines various types of database users, including Database Administrators, naive users, system analysts, and application programmers, each with distinct roles and responsibilities. It also describes different database system architectures, such as 1-Tier, 2-Tier, and 3-Tier, as well as the ANSI-SPARC 3-Tier Database Architecture. Additionally, it covers Data Manipulation Language (DML), Data Control Language (DCL), Transaction Control Language (TCL), numeric functions, generalization, and specialization in database design.

Uploaded by

aryantailor076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views7 pages

CH 1,2,3 Helf DM

The document outlines various types of database users, including Database Administrators, naive users, system analysts, and application programmers, each with distinct roles and responsibilities. It also describes different database system architectures, such as 1-Tier, 2-Tier, and 3-Tier, as well as the ANSI-SPARC 3-Tier Database Architecture. Additionally, it covers Data Manipulation Language (DML), Data Control Language (DCL), Transaction Control Language (TCL), numeric functions, generalization, and specialization in database design.

Uploaded by

aryantailor076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1. Differencetypes of Database user.

Database users are categorized based up on their interaction with the database.
These are seven types of database users in DBMS.
1. Database Administrator (DBA) : Database Administrator (DBA) is a person/team
who defines the schema and also controls the 3 levels of database. The DBA will then
create a new account id and password for the user if he/she need to access the
database. DBA is also responsible for providing security to the database and he allows
only the authorized users to access/modify the data base. DBA is responsible for the
problems such as security breaches and poor system response time.
DBA also monitors the recovery and backup and provide technical support.
The DBA has a DBA account in the DBMS which called a system or super user
account.
DBA repairs damage caused due to hardware and/or software failures.
DBA is the one having privileges to perform DCL (Data Control Language)
operations such as GRANT and REVOKE, to allow/restrict a particular user from
accessing the database.
2. Naive / Parametric End Users : Parametric End Users are the unsophisticated who
don’t have any DBMS knowledge but they frequently use the database applications in
their daily life to get the desired results. For examples, Railway’s ticket booking
users are naive users. Clerks in any bank is a naive user because they don’t have
any DBMS knowledge but they still use the database and perform their given task.
3. System Analyst :System Analyst is a user who analyzes the requirements of
parametric end users. They check whether all the requirements of end users are
satisfied.
4. Sophisticated Users : Sophisticated users can be engineers, scientists, business
analyst, who are familiar with the database. They can develop their own database
applications according to their requirement. They don’t write the program code but
they interact the database by writing SQL queries directly through the query
processor.
5. Database Designers : Data Base Designers are the users who design the structure of
database which includes tables, indexes, views, triggers, stored procedures and
constraints which are usually enforced before the database is created or populated with
data. He/she controls what data must be stored and how the data items to be related. It
is responsibility of Database Designers to understand the requirements of different
user groups and then create a design which satisfies the need of all the user groups.
6. Application Programmers: Application Programmers also referred as System
Analysts or simply Software Engineers, are the back-end programmers who writes the
code for the application programs. They are the computer professionals. These
programs could be written in Programming languages such as Visual Basic,
Developer, C, FORTRAN, COBOL etc. Application programmers design, debug, test,
and maintain set of programs called “canned transactions” for the Naive (parametric)
users in order to interact with database.
7. Casual Users / Temporary Users : Casual Users are the users who occasionally
use/access the database but each time when they access the database they require the
new information, for example, Middle or higher level manager.
8. Specialized users : Specialized users are sophisticated users who write
specialized database application that does not fit into the traditional data-
processing framework. Among these applications are computer aided-design
systems, knowledge-base and expert systems etc.

2. Database system Architecture.


The DBMS design depends upon its architecture. The basic client/server
architecture is used to deal with a large number of PCs, web servers, database
servers and other components that are connected with networks.
The client/server architecture consists of many PCs and a workstation which are
connected via the network.
DBMS architecture depends upon how users are connected to the database to get
their request done.

1-Tier Architecture:- In this architecture, the database is directly available to the user. It
means the user can directly sit on the DBMS and uses it.
2-Tier Architecture:- The 2-Tier architecture is same as basic client-server. In the two-tier
architecture, applications on the client end can directly communicate with the database at
the server side. For this interaction, API's like: ODBC, JDBC are used.
3-Tier Architecture:- The 3-Tier architecture contains another layer between the client and
server. In this architecture, client can't directly communicate with the server.
3. Explain ANSI – SPARC 3 TIER Database Architecture.
1.Internal Level:
The internal level has an internal schema which describes the physical storage
structure of the database.
The internal schema is also known as a physical schema.

2.Conceptual Level:
The conceptual schema describes the design of a database at the conceptual
level. Conceptual level is also known as logical level.
The conceptual schema describes the structure of the whole database.

3.External Level:
At the external level, a database contains several schemas that sometimes called as
subschema. The subschema is used to describe the different view of the database.
An external schema is also known as view schema.

4. Explain Difference between DA & DBA.


5. Explain the responsibility of a DBA.

A Database Administrator (DBA) is responsible for managing and maintaining a database


system. Their duties typically include:

• Designing and implementing database structures


• Ensuring data security and integrity
• Backing up and recovering data
• Optimizing database performance
• Providing technical support to users
• Managing database access and privileges

1. Explain DML with example.


Data Manipulation Language (DML)
DML is used to manipulate data within a database. It includes operations like inserting,
updating, and
deleting data.
Example:
• INSERT: To insert a new record into the students table:
SQL
INSERT INTO students (id, name, age) VALUES (101, 'Alice', 20);
• UPDATE: To update the age of a student:
SQL
UPDATE students SET age = 21 WHERE id = 101;
• DELETE: To delete a student record:
SQL
DELETE FROM students WHERE id = 101;
2. DCL commend with Example.
Data Control Language (DCL) commands are used to control access to database objects.
The primary
DCL commands are:
• GRANT: Grants privileges to users or roles.
• REVOKE: Revokes privileges from users or roles.
Example:
To grant the SELECT privilege on the students table to the user user1:
SQL
GRANT SELECT ON students TO user1;
To revoke the INSERT privilege from user1:
SQL
REVOKE INSERT ON students FROM user1;

3. TCL commend with example.


Transaction Control Language (TCL) commands are used to manage transactions in a
database. Key
TCL commands are:
• COMMIT: Commits a transaction, making changes permanent.
• ROLLBACK: Rolls back a transaction, undoing all changes made within it.
• SAVEPOINT: Sets a savepoint within a transaction.
• RELEASE SAVEPOINT: Releases a savepoint.
Example:
SQL
BEGIN TRANSACTION;
INSERT INTO students VALUES (101, 'Alice', 20);
UPDATE students SET age = 21 WHERE id = 101;
COMMIT; -- Commits both changes
4. Explain Numeric functions with Example.
Numeric functions are used to perform mathematical operations on numbers. Some
common
numeric functions include:
• ABS: Returns the absolute value of a number.
SQL
SELECT ABS(-10);
• ROUND: Rounds a number to a specified decimal place.
SQL
SELECT ROUND(123.456, 2);
• SQRT: Returns the square root of a number.
SQL
SELECT SQRT(64);
• MOD: Returns the remainder of a division operation.
SQL
SELECT MOD(10, 3);

5. E R diagram
6. Explain Generalization & Explain Specialization.
Generalization:-
Generalization is like a bottom-up approach in which two or more entities of lower
level combine toform a higher level entity if they have some attributes in common.
In generalization, an entity of a higher level can also combine with the entities of
the lower level toform a further higher level entity.

Specialization:-
Specialization is a top-down approach, and it is opposite to Generalization. In
specialization, onehigher level entity can be broken down into two lower level
entities.
Specialization is used to identify the subset of an entity set that shares some
distinguishingcharacteristics.

You might also like