Preview

Dbms (Obms & Oracle 91)

Better Essays
Open Document
Open Document
4599 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dbms (Obms & Oracle 91)
MC0067 - 01
Marks - 40 DBMS (OBMS & ORACLE 91)

1. Write a note on File based system/ Data base system

Solution:

File-Based Systems:
Conventionally, Before the database Systems evolved , data in the software’s Systems was stored in and represented using flats files.

Drawbacks of File-Based Systems:

File - Based Systems

[pic]

As shown in the figure, in a file-based system, different programs in the same application may be interacting with different private data files. There is no system enforcing any standardized control on the organization and structure of these data files.
• Data Redundancy and Inconsistency
Since data resides in different private data files, there are chances of redundancy and resulting inconsistency. For example, in the above example shown, the same customer can have a savings account as well as a mortgage loan. Here the customer details may be duplicated since the programs for the two functions store their corresponding data in two different data files. This gives rr.>e to redundancy in the customer's data. Since the same data is stored in two files, inconsistency arises if a change made in the data in one file is not reflected in the other.
• Unanticipated Queries
In a file-based system, handling sudden/ad-hoc queries can be difficult, since it requires changes in the existing programs.
• Data Isolation
Though data used by different programs in the application may be related, they reside in isolated data files.
• Concurrent Access Anomalies
In large multi-user systems the same file or record may need to be accessed by multiple users simultaneously. Handling this in file-based systems is difficult.
• Security Problems
In data-intensive applications, security of data is a major concern. Users should be given access only to required data and not the whole database. In a file-based system, this can be handled only by additional programming in each application.

2. What are the Roles and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The data access object (DAO) software program design pattern encapsulates use of data by concealing its difficulty from end users (University of Phoenix, 2005). This design pattern is a concept offering an abstract interface to a database or perseverance method, which it only provides a few specified functions excluding the visibility of the database particulars. The DAO includes a mapping from the software calls to its perseverance layer that isolates the general public interface of the DAO.…

    • 579 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    A Database is generally used for storing data in a structured way in an efficient manner for insert, update and retrieval of data in well defined formats. On the other hand, in file system the data stored in unstructured manner with an unrelated data.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    It occurs when we can change the file structure without affecting the accessibility of the data.…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Computers store data ondisks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    11 What determines which areas of the program a particular user can access, and whether that user can only view data or has rights to enter or edit data?…

    • 484 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The founding fathers, or as the book calls them the founding brothers, are an assorted group of men from wildly different backgrounds. In political terms, they were divided. Yet, they came to together to help shape this country into the place it is today. Now on their journey towards the making of this country they did encounter some trouble. They encountered heated debates among themselves though for getting through these debates they show just why they deserve to be called, founding brothers.…

    • 1425 Words
    • 6 Pages
    Better Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. For the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file, UNIX was used. Each user would have a masked entry that will specified if the user is allow to do anything to the…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Crime Analysis

    • 939 Words
    • 4 Pages

    In addition, the manner in which data are stored and the amount of data stored…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ladies, gentlemen and members of the jury: today we have viewed the heinous actions of a man who stands trial as a murderer, usurper and tyrant. Driven by his lust for power, this man, Macbeth, has not only broken the sixth commandment "thou shall not murder" he has also committed the highest form of crime: Regicide.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Many nonindustrial cultures may be influenced or forced to adapt their ways of life because of changes around them or in their environment (H351). When nonindustrial cultures adopt the characteristics of more industrial societies this is known as modernization. The conformity of modernization is encouraged by industrial capitalist societies and the societies who choose to follow their own traditional roots are looked down upon as they are viewed to be more primitive. Modernization consists of four sub processes: technological development, agricultural development, industrialization, and urbanization (360). The outcome of modernization can be positive, but it can also produce negative results.…

    • 953 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Protection Scheme in UNIX

    • 354 Words
    • 2 Pages

    The next three positions (2-4) will determine the owner permissions with r = read, w = write, and x = execute.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mostofa Group

    • 5304 Words
    • 22 Pages

    Mostafa Group has a filing system that is quite conventional & does not provide a proper systematic approach. It maintains mostly hardcopies for filing and for inter departmental communication. The current filing system has several limitations & the officials have to take a lot of pain for finding the files and in accessing it. From this it was inferred that developing a new system that is based on software can be a good remedy that will ensure a symmetric arrangement of files in a central server that makes it accessible maintaining sufficient privacy. The new…

    • 5304 Words
    • 22 Pages
    Good Essays
  • Satisfactory Essays

    Database design Chapter 1

    • 347 Words
    • 2 Pages

    6. Bits – the smallest representation of data, it is either 1 (on voltage) or 0 (off voltage)…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Korth Solutions

    • 41579 Words
    • 167 Pages

    the exercises at the end of each chapter of the book. Before providing answers to the…

    • 41579 Words
    • 167 Pages
    Powerful Essays
  • Powerful Essays

    C++ and Lt

    • 2169 Words
    • 9 Pages

    | This file declares services for user-controlled file processing. We will discuss about it in detail in File and Stream related chapter.…

    • 2169 Words
    • 9 Pages
    Powerful Essays