Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

DATA MANAGEMENT APPROACHES KEY ELEMENTS OF THE DATABASE

ENVIRONMENT
Flat-File Approach - Flat files are data files that contain
❖ Database Management System
records with no structured relationships to other files.
● Program development - to create applications
The flat-file approach is most often associated with
to access the database.
so-called legacy systems.
● Backup and recovery - DBMS can recover to an
The flat-file environment promotes a single-user view earlier version that is known to be correct
approach to data management whereby end users own ● Database usage reporting - captures statistics
their data files rather than share them with other users on what data are being used, when they are
used, and who uses them
Data redundancy - replication of essentially the same ● Database access - The most important feature
data in multiple files. It contributes to three significant of a DBMS is to permit authorized user access,
problems in the flat-file environment: data storage, data both formal and informal, to the database
updating, and currency of information
Data definition language (DDL) is a
Task-data dependency - user’s inability to obtain
programming language used to define the
additional information as his or her needs change
database to the DBMS. The DDL identifies the
Database Approach - This approach centralizes the names and the relationship of all data elements,
organization’s data into a common database that is records, and files that constitute the database.
shared by other users. With the enterprise’s data in a This definition has three levels, called views: the
central location, all users have access to the data they physical internal view, the conceptual view
need to achieve their respective objectives. Through (schema), and the user view (subschema).
data sharing, the traditional problems associated with
the flat-file approach may be overcome. Database Views
Internal View/Physical View. This is the lowest
● Elimination of Data Storage Problem - Each level of representation, which is one step
data element is stored only once, thereby removed from the physical database. This
eliminating data redundancy and reducing data internal view describes the structures of data
collection and storage costs records, the linkages between files, and the
● Elimination of Data Update Problem - Because physical arrangement and sequence of records
each data element exists in only one place, it in a file. There is only one internal view for the
requires only a single update procedure. This database.
reduces the time and cost of keeping the Database Views Internal View/Physical View.
database current. The physical arrangement of records in the
● Elimination of Currency Problem - A single database is presented through the internal view.
change to a database attribute is automatically This is the lowest level of representation, which
made available to all users of the attribute is one step removed from the physical database.
● Elimination of Task-Data Dependency Problem This internal view describes the structures of
- The most striking difference between the data records, the linkages between files, and the
database model and the flat-file model is the physical arrangement and sequence of records
pooling of data into a common database that is in a file. There is only one internal view or the
shared by all organizational users. With access database.
to the full domain of entity data, changes in External View/User View (Subschema). The
user information needs can be satisfied without subschema or user view, defines the user’s
obtaining additional private data sets. section of the database—the portion that an
individual user is authorized to access
Data Attribute/Field - is a single item of data,
such as customer’s name, account balance, or
❖ Users
address.
Data manipulation Language (DML) is the Entity - is a database representation of an
proprietary programming language that a individual resource, event, or agent about which
particular DBMS uses to retrieve, process, and we choose to collect data.
store data. Entire user programs may be written Record Type (Table or File) - When we group
in the DML or, alternatively, selected DML together the data attributes that logically define
commands can be inserted into programs that an entity, they form a record type.
are written in universal languages, such as JAVA, Navigational Databases - The hierarchical data
C++, and even older languages such as COBOL model is called a navigational database because
and FORTRAN. traversing the files requires following a
predefined path.
A query is an ad hoc access methodology for The Network Model - Like the hierarchical
extracting information from a database. Users model, the network model is a navigational
can access data via direct query, which requires database with explicit linkages between records
no formal user programs using the DBMS’s and files. The distinction is that the network
built-in query facility. model permits a child record to have multiple
parents.
IBM’s Structured Query Language (SQL) - The Relational Model - The relational model
(often pronounced sequel or S-Q-L), has portrays data in the form of two-dimensional
emerged as the standard query language for tables
both mainframe and microcomputer DBMSs. Partitioned database approach - splits the
SQL is a fourth-generation, nonprocedural central database into segments or partitions
language (English-like commands) with many that are distributed to their primary user.
commands that allow users to input, retrieve, Deadlock - is a permanent condition that must
and modify data easily. be resolved by special software that analyzes
each deadlock condition to determine the best
Database administrator (DBA) - is responsible solution, can result in transactions being
for managing the database resource. The incompletely processed and the database being
sharing of a common database by multiple users corrupted.
requires organization, coordination, rules, and Resolving a deadlock - usually involves
guidelines to protect the integrity of the terminating one or more transactions to
database. complete processing of the other transactions in
the deadlock.
Data structures - are the bricks and mortar of Replicated databases - are effective in
the database. companies where there exists a high degree of
data sharing but no primary user.
Data Organization - of a file refers to the way Database concurrency - is the presence of
records are physically arranged on the complete and accurate data at all user sites.
secondary storage device, this may be either
sequential or random.
Data Access Methods - is the technique used to
CONTROLLING AND AUDITING DATA
locate records and to navigate through the
MANAGEMENT SYSTEMS
database.
Access controls are designed to prevent
unauthorized individuals from viewing,
retrieving, corrupting, or destroying the entity’s and the database change log against the
data. database.
Backup controls ensure that in the event of data Recovery module uses the logs and backup files
loss due to unauthorized access, equipment to restart the system after a failure.
failure, or physical disaster the organization can
recover its database.
The user view or subschema is a subset of the
total database that defines the user’s data
domain and provides access to the database
Data base authorization table contains rules
that limit the actions a user can take
User-defined procedure allows the user to
create a personal security program or routine to
provide more positive user identification than a
single password

Audit Procedures for Testing Database Access


Controls
● Responsibility for Authority Tables and
Subschemas.
● Appropriate Access Authority
● Biometric Controls.
● Inference Controls.
● Encryption Controls.
● Backup Controls

Audit Procedures for Testing Flat-File Backup


Controls
● Sequential File (GPC) Backup - select a sample
of systems and determine from the system
documentation that the number of GPC backup
files specified for each system is adequate.
● Backup Transaction Files - verify through
physical observation that transaction files used
to reconstruct the master files are also retained
● Direct Access File Backup - should select a
sample of applications and identify the direct
access files being updated in each system
● Off-Site Storage - verify the existence and
adequacy of off-site storage.

Transaction log feature provides an audit trail


of all processed transactions.
Checkpoint facility suspends all data processing
while the system reconciles the transaction log

You might also like