Professional Documents
Culture Documents
Database Assignment No 1
Database Assignment No 1
2. Problem 22:
In this chapter, we described four important data models and their properties: enterprise, conceptual,
logical, and physical. In the given table, summarize the important properties of these data models
by entering a Y (for Yes) or an N (for No) in each cell of the table.ANS
ANS:
All Entities? All Technology DBMS Record
Attributes? Independent? Layouts?
Independent?
Enterprise Y N Y Y N
Conceptual Y Y Y Y N
Logical Y Y N Y Y
Physical Y Y N N Y
3. Exercise 4:
Consider a major database in this organization, such as one supporting customer interactions,
accounting, or manufacturing. What is the architecture for this database? Is the organization using
some form of client/server architecture? Interview information systems managers in this organization
to find out why they chose the architecture for this database.
ANS:
Again, as in the previous field exercise, this exercise will help students to integrate their new
textbook knowledge with the realities that organizations must face. Some students will find
organizations that are struggling to achieve client/server architecture and also deal with their
legacy systems, for example.
4. The database has either two tier or three tier architecture in client/server environment.
For your university database which architecture is implementable and suitable? Justify your answer
properly.
ANS:
Sir we should use three tier architecture because if some teacher want to access database from
home so they need help of application which is made for that database so they can easy access the
database
5. Differentiate the following in your own simple words.
a. Security and Integrity
Security Integrity
Data security defines the prevention of data Data integrity defines the quality of
corruption through the use of controlled data, which guarantees the data is
access mechanisms. complete and has a whole structure.
Data security deals with the protection of Data integrity deals with the validity of
data data
Data security is making sure only the people Data integrity is making sure the data
who should have access to the data are the is correct and not corrupt.
only ones who can access the data.
Data security refers to making sure that data Data integrity refers to the structure of
is accessed by its intended users, thus the data and how it matches the
ensuring the privacy and protection of data. schema of the
database.
Logical schema is like the "definition" of a data structure or the definition of the ADT (Abstract
Data Type). Eg., a stack is defined by its pop and push operations.
In RDBMS, a relation or a table is logical.
Physical scheme is like the implementation of a data structure. Ex.- A stack can be implemented
using a array, a linked list or even as a table in a database.
In RDBMS, different RDBMS packages will implement a table differently ranging from a flat file,
to a balanced tree and all the way to a distributed architecture.
The files such as inventory and payroll generate separate files and do not
communicate with each other. The organization was simple to generate and had
better local control but the data of an organization is dispersed throughout the
functional subsystem.
e. Three tier and Two tier Database Application
Two-Tier Architecture: The two-tier is based on Client Server architecture. The two-tier architecture
is like client server application. The direct communication takes place between client and server. There
is no intermediate between client and server. Because of tight coupling a 2 tiered application will run
faster.
1. Client layer
2. Business layer
3. Data layer
1. Client layer: Represents Web browser, a Java or other application, Applet, WAP phone etc.
The client tier makes requests to the Web server who will be serving the request by either
returning static content if it is present in the Web server or forwards the request to either Servlet
or JSP in the application server for either static or dynamic content.
2. Business layer: This layer provides the business services. This tier contains the business
logic and the business data. All the business logic like validation of data, calculations, data
insertion etc. Are centralized into this tier as opposed to 2-tier systems where the business
logic is scattered between the front end and the backend. The benefit of having a centralized
business tier is that same business logic can support different types of clients like browser,
WAP (Wireless Application Protocol) client, other standalone applications written in Java, C++,
C# etc. This acts as an interface between Client layer and Data Access Layer. This layer is
also called the intermediary layer helps to make communication faster between client and data
layer.
3. Data layer: This layer is the external resource such as a database, ERP system, Mainframe
system etc. responsible for storing the data. This tier is also known as Data Tier. Data Access
Layer contains methods to connect with database or other data source and to perform insert,
update, delete, get data from data source based on our input data. Following diagram
representing the 3-tier architecture.
Though there are not many differences between data and metadata, but in
this article I have discussed the basic ones in the comparison chart shown
below.
1. Comparison Chart
2. Definition
3. Key Differences
4. Conclusion
Comparison Chart
BASIS FOR
DATA METADATA
COMPARISON
Basic Data is a set of facts and statistics can that Metadata describes relevant
Processing Data may or may not have been processed. Metadata is always a processed
data.
For example:
Customer and Product are two entities. Customer number and name
are attributes of the Customer entity
Product name and price are attributes of product entity
Sale is the relationship between the customer and product
The advantage of the Logical data model is to provide a foundation to form the
base for the Physical model. However, the modeling structure remains
generic.
Describes data needs for a single project but could integrate with other
logical data models based on the scope of the project.
Designed and developed independently from the DBMS.
Data attributes will have datatypes with exact precisions and length.
Normalization processes to the model is applied typically till 3NF.