Monday, May 27, 2019
MBA Database Management Essay
A1.Differentiate in the midst of Traditional File administration & Modern Database System File Base system were the traditional systems which has been replaced right away by modern selective informationbase systems. All entropybase use ar using the Modern day database management systems now a days . The difference between the these dickens technologies given below.File-based SystemFile-based systems were an early attempt to computerize the manual filing system. File-based system is a sight of application programs that perform services for the end-users. Each program defines and manages its data. n angiotensin-converting enzymethe slight, five types of problem atomic number 18 occurred in using the file-based approachSeparation and isolation of dataWhen data is isolated in separate files, it is more difficult for us to access data that should be available. The application programmer is required to synchronize the processing of two or more files to ensure the correct data i s extracted.Duplication of dataWhen employing the decentralized file-based approach, the uncontrolled duplication of data is occurred. Uncontrolled duplication of data is unenviable becausei.Duplication is wastefulii.Duplication fundament lead to injury of data integrityData dependenceUsing file-based system, the physical construction and storage of the data files and records are be in the application program code. This characteristic is known as program-data dependence. Making changes to an existing structure are rather difficult and will lead to a modification of program. Such maintenance activities are time-consuming and subject to error.Incompatible file formatsThe structures of the file are dependent on the application programming language. However file structure provided in one programming language such as direct file, indexed-sequential file which is available in COBOL programming, whitethorn be incompatible from the structure generated by early(a) programming language such as C. The direct incompatibility makes them difficult to process jointly.Fixed queries / proliferation of application programsFile-based systems are real dependent upon the application programmer. Any required queries or reports have to be written by the application programmer. Norm entirelyy, a fixed format query or report dejection only be entertained and no facility for ad-hoc queries if offered. File-based systems also give tremendous pressure on data processing staff, with users complaints on programs that are inadequate or inefficient in meeting their demands. Documentation may be limited and maintenance of the system is difficult. Provision for security, integrity and convalescence capability is very limited.Database SystemsIn order to overcome the limitations of the file-based approach, the concept of database and the Database Management System (DMS) was emerged in 60s. A database is an application that can store and retrieve data very rapidly. The relational bit re fers to how the data is stored in the database and how it is organized. When we talk about database, we mean a relational database, in fact an RDBMS Relational Database Management System. In a relational database, all data is stored in tables. These have the same structure repeated in each row (like a spreadsheet) and it is the relations between the tables that make it a relational tableAdvantagesA reduce of payoffs of applying database approach in application system are obtained including Control of data redundancy The database approach attempts to eliminate the redundancy by integrating the file. Although the database approach does not eliminate redundancy entirely, it controls the amount of redundancy inherent in the database.Data consistencyBy eliminating or controlling redundancy, the database approach reduces the risk of inconsistencies occurring. It ensures all copies of the idea are kept consistent. More information from the same amount of dataWith the integration of the operated data in the database approach, it may be possible to derive additional information for the same data.Sharing of dataDatabase belongs to the entire organization and can be shared out by all authorized users.better data integrityDatabase integrity provides the validity and consistency of stored data. Integrity is usually expressed in terms of constraints, which are consistency rules that the database is not permitted to violate.Improved securityDatabase approach provides a protection of the data from the unauthorized users. It may carry on the term of user names and passwords to get wind user type and their access right in the operation including retrieval, insertion, updating and deletion.Enforcement of standardsThe integration of the database enforces the necessary standards including data formats, naming conventions, documentation standards, update procedures and access rules.thriftiness of scaleCost savings can be obtained by combining all organizations operational dat a into one database with applications to work on one source of data.Balance of conflicting requirementsBy having a structural design in the database, the conflicts between users or departments can be resolved. Decisions will be based on the base use of resources for the organization as a whole rather that for an individual entity.Improved data accessibility and responsivenessBy having an integration in the database approach, data accessing can be crossed departmental boundaries. This feature provides more live onality and better services to the users.Increased productivityThe database approach provides all the low-level file-handling routines. The provision of these functions allows the programmer to concentrate more on the specific functionality required by the users. The fourth-generation environment provided by the database can simplify the database application development.Improved maintenanceDatabase approach provides a data independence. As a change of data structure in the da tabase will be affect the application program, it simplifies database application maintenance.Increased concurrencyDatabase can manage concurrent data access effectively. It ensures no interference between users that would not result any(prenominal) loss of information nor loss of integrity.Improved backing and recovery servicesModern database management system provides facilities to minimize the amount of processing that can be lost following a failure by using the transaction approach. prejudicesIn split of a large number of advantages can be found in the database approach, it is not without any challenge. The following disadvantages can be found includingComplexityDatabase management system is an extremely complex piece of software. All parties must be familiar with its functionality and take full advantage of it. Therefore, training for the administrators, designers and users is required.SizeThe database management system consumes a substantial amount of main memory as well as a large number amount of disk space in order to make it run expeditiously.Cost of DBMSA multi-user database management system may be very expensive. Even after the installation, there is a high recurrent annual maintenance cost on the software.Cost of conversionWhen pathetic from a file-base system to a database system, the company is required to have additional expenses on hardware acquisition and training cost.PerformanceAs the database approach is to give for many applications rather than exclusively for a particular one, some applications may not run as fast as before.Higher impact of a failureThe database approach increases the vulnerability of the system due to the centralization. As all users and applications reply on the database availability, the failure of any component can bring operations to a halt and affect the services to the customer seriouslyQ2. What is the disadvantage of sequential file organization? How do you overcome it? What are the advantages & disadvantage s of Dynamic Hashing?Disadvantage of Sequestial file organizationA file that contains records or other elements that are stored in a chronological order based on account number or some other identifying data. In order to locate the desired data, sequential files must be read starting at the beginning of the file. A sequential file may be stored on a sequential access device such as magnetic tape or on a direct access device such as magnetic disk. Contrast with haphazard file.Dynamic HashingAdvantagesThe main advantage of chop upish tables over other table data structures is speed. This advantage is more apparent when the number of entries is large (thousands or more). Hash tables are particularly efficient when the maximum number of entries can be predicted in advance, so that the hardened array can be allocated once with the optimum size and never resized.If the set of key-value pairs is fixed and known fore of time (so insertions and deletions are not allowed), one may redu ce the number lookup cost by a careful choice of the hash function, bucket table size, and internal data structures. In particular, one may be able to devise a hash function that is collision-free, or even meliorate (see below). In this case the keys need not be stored in the table .DisadvantagesHash tables can be more difficult to implement than self-balancing binary see trees. Choosing an effective hash function for a specific application is more an art than a science. In open-addressed hash tables it is fairly easy to create a unworthy hash function.Although operations on a hash table take constant time on average, the cost of a good hash function can be significantly higher than the inner loop of the lookup algorithm for a sequential list or search tree. indeed hash tables are not effective when the number of entries is very small. (However, in some cases the high cost of computing the hash function can be mitigated by saving the hash value together with the key.)For certai n string processing applications, such as spell-checking, hash tables may be less efficient than tries, finite automata, or Judy arrays. Also, if each key is represented by a small enough number of bits, then, instead of a hash table, one may use the key directly as the index into an array of values. Note that there are no collisions in this case.The entries stored in a hash table can be enumerated efficiently (at constant cost per entry), but only in some pseudo-random order. Therefore, there is no efficient way to efficiently locate an entry whose key is nearest to a given key. Listing all n entries in some specific order generally requires a separate sorting step, whose cost is proportional to log(n) per entry. In comparison, ordered search trees have lookup and insertion cost proportional to log(n), but allow purpose the nearest key at about the same cost, and ordered enumeration of all entries at constant cost per entry.If the keys are not stored (because the hash function is collision-free), there may be no easy way to enumerate the keys that are present in the table at any given moment.Although the average cost per operation is constant and fairly small, the cost of a single operation may be quite high. In particular, if the hash table uses slashing resizing, an insertion or deletion operation may occasionally take time proportional to the number of entries. This may be a serious drawback in real-time or interactive applications.Hash tables in general exhibit poor locality of referencethat is, the data to be accessed is distributed seemingly at random in memory. Because hash tables cause access patterns that jump around, this can trigger microprocessor cache misses that cause long delays. Compact data structures such as arrays, searched with running(a) search, may be faster if the table is relatively small and keys are integers or other short strings. According to Moores Law, cache sizes are suppuration exponentially and so what is considered small may be increasing. The optimal performance point varies from system to system.Hash tables become quite inefficient when there are many collisions. While extremely uneven hash distributions are extremely unlikely to arise by chance, a malicious adversary with knowledge of the hash function may be able to supply information to a hash which creates worst-case behavior by causing excessive collisions, resulting in very poor performance (i.e., a denial of service attack). In critical applications, either universal hashing can be used or a data structure with better worst-case guarantees may be preferableQ3. What is relationship type? Explain the difference among a relationship instance, relationship type & a relation set?A3.A relationship type R among n entity types E1, E2, , En is a set of associations among entities from these types. Actually, R is a set of relationship instances ri where each ri is an n-tuple of entities (e1, e2, , en), and each entity ej in ri is a member of entity t ype Ej, 1jn. Hence, a relationship type is a mathematical relation on E1, E2, , En, or alternatively it can be defined as a subset of the Cartesian product E1x E2x xEn . Here, entity types E1, E2, , En defines a set of relationship, called relationship sets.Q4. What is SQL? Discuss.Q5. What is Normalization? Discuss various types of Normal Forms? Q6. What do you mean by Shared Lock & Exclusive lock? Describe briefly two phase locking protocol? MI0034 Database Management System 4 CreditsAssignment Set- 2 (60 Marks)Answer all the QuestionsQ1. Define Data Model & discuss the categories of Data Models? What is the difference between logical data license & Physical Data Independence? Q2. What is a B+Trees? Describe the structure of both internal and leaf nodes of a B+Tree? Q3. Describe acoustic projection operation, Set theoretic operation & join operation? Q4. Discuss Multi Table Queries?Q5. Discuss Transaction Processing Concept? 10.2 Describe properties of Transactions? Q6. Desc ribe the advantage of Distributed database? What is Client/server Model? Discuss briefly the security and Internet violation? .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.