Professional Documents
Culture Documents
dbms module 1
dbms module 1
UNIT 1
or
or
or
or
or
or
1. **Data Organization:**
- File Processing System: Data is organized in
separate files based on the requirements of
individual applications or programs. Each program
typically has its own files, leading to data
redundancy and inconsistency.
- DBMS: Data is organized in a centralized
database with tables, relationships, and
constraints defined according to a data model (e.g.,
relational model). This reduces redundancy,
ensures data integrity, and promotes data
consistency across applications.
2. **Data Access:**
- File Processing System: Each application has its
own data files and manages data access
independently, leading to data duplication and
potential inconsistency.
- DBMS: The DBMS provides a centralized
platform for data access, allowing multiple
applications to access and manipulate data
simultaneously while maintaining data integrity
and consistency through transactions and
concurrency control mechanisms.
3. **Data Security:**
- File Processing System: Data security measures
are usually limited to file-level permissions, making
it challenging to implement robust security controls
across different files and applications.
- DBMS: The DBMS offers advanced security
features such as access control, authentication,
encryption, and auditing, ensuring data
confidentiality, integrity, and availability at the
database level.
4. **Data Redundancy:**
- File Processing System: Data redundancy is
common due to the duplication of data across
multiple files and applications, leading to potential
inconsistencies and data update anomalies.
- DBMS: Data redundancy is minimized through
normalization techniques, data modeling, and the
use of relationships between tables, reducing the
risk of data anomalies and improving data
accuracy.
5. **Data Consistency:**
- File Processing System: Ensuring data
consistency across multiple files and applications
is challenging, as each program manages data
independently without centralized control.
- DBMS: The DBMS enforces data consistency
through referential integrity constraints,
transactions, and ACID properties (Atomicity,
Consistency, Isolation, Durability), ensuring that
data remains accurate and valid across all
operations.
or
or
or
1. **Strong Entity:**
- Can stand alone and has its own unique
identifier (like a student ID).
- Doesn't rely on another entity for identification.
2. **Weak Entity:**
- Depends on another entity (called a strong
entity) for identification.
- Doesn't have its own unique identifier; needs a
combination of its attributes and the related strong
entity's identifier to be uniquely identified.
or
or
12. ER model
or
or
or
or
or
or