SlideShare a Scribd company logo
1 of 17
Introduction
īŽ Database integral part of our day to day life
īŽ Collection of related database
īŽ Database Management System : software
managing and controlling access to the
database.
īŽ Database system : collection of application
interracting with database
Example of use of database systems
A database is accessed when :
īą Purshasing in a supermarket ( item price)
īą Purchase using credit cards ( valid cards)
īą Inquiries about a holliday (flight details)
īą Make a loan (library)
īą Rent video ( detail info on each video)
īą Online bookstore( book details)
Sample data
Dtabase in the dev cycle
Project
Identifcation
and Selection
Project
Initiation
and Planning
Analysis
Logical
Design
Physical
Design
Implementation
Maintenance
Database
īą A repository of data simultaneously used by many
users (a shared ressource).
īą Collection of logically related data.
īą Description of this data (data dictionary)
īą BDMS
Software interracting with :
īą Users
īą Application programs
īą database
īą BDMS
Software interracting with :
īą Users
īą Application programs
īą Database
DBMS allows users (using a query language):
īą Insert
īą Update
īą Delete
īą Retrive data from DB
Database application programs
Computer program that allow
users to interact with the DB
through DBMS.
DBMS environment
īŽ
Hardware :Computer systems that DBMS and
application programs run on.
īŽ
Software: DBMS,application programs, operating
system, network software(if DBMS used over
network).
īŽ
Data ( operational data and meta-data)
īŽ
Procedures: instruction and rules that govern use of
database
īŽ
People: DB designer, administrators , programmers
and end users
Database environment
DBMS architecture
2 layer architecture Client-Server
īŽ The client that runs the application and the server that
handles the database back-end
īŽ Multiple users able to access the DB simultanousely.
īŽ Server is processing data while the client for business
logic and presentation.
2-Tier Architecture
DBMS architecture
3 layer architecture
īŽ User Interface layer ( runs on the user´s client)
īŽ Business logic (middle layer) and data processing
layer. Runs on a server called ”application server”.
īŽ DBMS ( store data ) , may run on a separate server
called ”database server”
3 layer architecture advantages
īŽ Thin client (less hardware) , client only handling
presentation logic.This means a little communication
needed between the client(browser) and the middle tier.
īŽ Separating the core business logic from the database
functions
īŽ Modularity : Easy to modify or replace one tier without
affecting the other tiers
īŽ Easier load balancing
īŽ Maps quite naturally to the web environment
īŽ Security : middle tier protecting the DB.
īŽ Scalabale : add as many middle tier as needed
Functions of a DBMS
īŽ Data storage , retrieval and update
īŽ A user-accessible Catalog
īŽ Hold data about the structure of database , users , applications and so on
īŽ Transaction support
īŽ Ensure that all the updates are made or that none of them are made
īŽ Concurrency control services
īŽ Enable many users to access shared data concurrently
īŽ Recovery services
īŽ When transaction fails, DB revovered to a consistent state
Functions of a DBMS
īŽ Autorization services
īŽ Only special part could have access to info
īŽ Support for data communication
īŽ Terminal at remote locations can communicate with host of DBMS through
network
īŽ Integrity Services
īŽ Stored data are consistent and correct
īŽ Services to promote Data Independence
īŽ Utility Services
īŽ Utility program help manage the DB effectively
Advantages of DBMS
īŽ Control of data redundancy (duplication)
īą Eliminate redundency where possible ,
īŽ Data consistency
īą Data stored in more than once , system can ensure that all copies
of the data are kept consistent
īŽ Sharing of data
īą By all authorized users
īŽ Improved data integrity
īą Rules that DB is not permitted to violate
īą User define data and DBMS enforce it
īŽ Improved maintenance through data independence
īŽ Make application immune to changes in data description

More Related Content

What's hot

Data Base Management
Data Base ManagementData Base Management
Data Base ManagementApex
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Ravinder Kamboj
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management SystemPapan Sarkar
 
A database management system
A database management systemA database management system
A database management systemghulam120
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management SystemGhanshyam Patel
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Adminguest8fdbdd
 
Database administrator
Database administratorDatabase administrator
Database administratorTech_MX
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbmsVisakh V
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Client server computing
Client server computingClient server computing
Client server computingStudent
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server ComputingCloudbells.com
 
05_system architecture
05_system architecture05_system architecture
05_system architectureJadavsejal
 
1. intro
1. intro1. intro
1. introkhoahuy82
 

What's hot (16)

Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
 
Users of dbms
Users of dbmsUsers of dbms
Users of dbms
 
A database management system
A database management systemA database management system
A database management system
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
Database
DatabaseDatabase
Database
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Client server computing
Client server computingClient server computing
Client server computing
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
 
05_system architecture
05_system architecture05_system architecture
05_system architecture
 
1. intro
1. intro1. intro
1. intro
 

Viewers also liked

How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching worksJames Wong
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby introJames Wong
 
Prolog programming
Prolog programmingProlog programming
Prolog programmingJames Wong
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysisJames Wong
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prologJames Wong
 
Hashfunction
HashfunctionHashfunction
HashfunctionJames Wong
 
Computer security
Computer securityComputer security
Computer securityJames Wong
 
Access data connection
Access data connectionAccess data connection
Access data connectionJames Wong
 
Data preparation
Data preparationData preparation
Data preparationJames Wong
 
Test driven development
Test driven developmentTest driven development
Test driven developmentJames Wong
 
Text categorization as a graph
Text categorization as a graphText categorization as a graph
Text categorization as a graphJames Wong
 
Game theory
Game theoryGame theory
Game theoryJames Wong
 
List and iterator
List and iteratorList and iterator
List and iteratorJames Wong
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programmingJames Wong
 
Cryptography
CryptographyCryptography
CryptographyJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 

Viewers also liked (18)

How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby intro
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Maven
MavenMaven
Maven
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Java
JavaJava
Java
 
Computer security
Computer securityComputer security
Computer security
 
Access data connection
Access data connectionAccess data connection
Access data connection
 
Data preparation
Data preparationData preparation
Data preparation
 
Test driven development
Test driven developmentTest driven development
Test driven development
 
Text categorization as a graph
Text categorization as a graphText categorization as a graph
Text categorization as a graph
 
Game theory
Game theoryGame theory
Game theory
 
List and iterator
List and iteratorList and iterator
List and iterator
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

Similar to Database introduction

DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTBhaskarPatil24
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersMustafa Kamel Mohammadi
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfhpndegreecollegesklm
 
Overview of databases
Overview of databasesOverview of databases
Overview of databasesshaik faroq
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDivyaKS12
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 
Lecture1
Lecture1Lecture1
Lecture1hassan340
 
En ch01
En ch01En ch01
En ch01anibapi
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbmssethu pm
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbmsDiana Diana
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxATIFAZEEZ1
 
DBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxDBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxAnusha sivakumar
 
Dbms
DbmsDbms
Dbmssevtap87
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)shahab3
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfarchanacomputers1
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfparveen204931475
 

Similar to Database introduction (20)

DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Assign 1
Assign 1Assign 1
Assign 1
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
Lecture1
Lecture1Lecture1
Lecture1
 
En ch01
En ch01En ch01
En ch01
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Chapter1
Chapter1Chapter1
Chapter1
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
 
DBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxDBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptx
 
Dbms
DbmsDbms
Dbms
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
 

More from James Wong

Data race
Data raceData race
Data raceJames Wong
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtosJames Wong
 
Recursion
RecursionRecursion
RecursionJames Wong
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data miningJames Wong
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discoveryJames Wong
 
Cache recap
Cache recapCache recap
Cache recapJames Wong
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data miningJames Wong
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsJames Wong
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherenceJames Wong
 
Abstract data types
Abstract data typesAbstract data types
Abstract data typesJames Wong
 
Abstraction file
Abstraction fileAbstraction file
Abstraction fileJames Wong
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cacheJames Wong
 
Object model
Object modelObject model
Object modelJames Wong
 
Abstract class
Abstract classAbstract class
Abstract classJames Wong
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with javaJames Wong
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithmsJames Wong
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and pythonJames Wong
 
Inheritance
InheritanceInheritance
InheritanceJames Wong
 
Api crash
Api crashApi crash
Api crashJames Wong
 
Learning python
Learning pythonLearning python
Learning pythonJames Wong
 

More from James Wong (20)

Data race
Data raceData race
Data race
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
 
Recursion
RecursionRecursion
Recursion
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
Cache recap
Cache recapCache recap
Cache recap
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
 
Object model
Object modelObject model
Object model
 
Abstract class
Abstract classAbstract class
Abstract class
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
 
Inheritance
InheritanceInheritance
Inheritance
 
Api crash
Api crashApi crash
Api crash
 
Learning python
Learning pythonLearning python
Learning python
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Database introduction

  • 1. Introduction īŽ Database integral part of our day to day life īŽ Collection of related database īŽ Database Management System : software managing and controlling access to the database. īŽ Database system : collection of application interracting with database
  • 2. Example of use of database systems A database is accessed when : īą Purshasing in a supermarket ( item price) īą Purchase using credit cards ( valid cards) īą Inquiries about a holliday (flight details) īą Make a loan (library) īą Rent video ( detail info on each video) īą Online bookstore( book details)
  • 4. Dtabase in the dev cycle Project Identifcation and Selection Project Initiation and Planning Analysis Logical Design Physical Design Implementation Maintenance
  • 5. Database īą A repository of data simultaneously used by many users (a shared ressource). īą Collection of logically related data. īą Description of this data (data dictionary) īą BDMS Software interracting with : īą Users īą Application programs īą database
  • 6. īą BDMS Software interracting with : īą Users īą Application programs īą Database DBMS allows users (using a query language): īą Insert īą Update īą Delete īą Retrive data from DB
  • 7. Database application programs Computer program that allow users to interact with the DB through DBMS.
  • 8. DBMS environment īŽ Hardware :Computer systems that DBMS and application programs run on. īŽ Software: DBMS,application programs, operating system, network software(if DBMS used over network). īŽ Data ( operational data and meta-data) īŽ Procedures: instruction and rules that govern use of database īŽ People: DB designer, administrators , programmers and end users
  • 10. DBMS architecture 2 layer architecture Client-Server īŽ The client that runs the application and the server that handles the database back-end īŽ Multiple users able to access the DB simultanousely. īŽ Server is processing data while the client for business logic and presentation.
  • 12. DBMS architecture 3 layer architecture īŽ User Interface layer ( runs on the user´s client) īŽ Business logic (middle layer) and data processing layer. Runs on a server called ”application server”. īŽ DBMS ( store data ) , may run on a separate server called ”database server”
  • 13.
  • 14. 3 layer architecture advantages īŽ Thin client (less hardware) , client only handling presentation logic.This means a little communication needed between the client(browser) and the middle tier. īŽ Separating the core business logic from the database functions īŽ Modularity : Easy to modify or replace one tier without affecting the other tiers īŽ Easier load balancing īŽ Maps quite naturally to the web environment īŽ Security : middle tier protecting the DB. īŽ Scalabale : add as many middle tier as needed
  • 15. Functions of a DBMS īŽ Data storage , retrieval and update īŽ A user-accessible Catalog īŽ Hold data about the structure of database , users , applications and so on īŽ Transaction support īŽ Ensure that all the updates are made or that none of them are made īŽ Concurrency control services īŽ Enable many users to access shared data concurrently īŽ Recovery services īŽ When transaction fails, DB revovered to a consistent state
  • 16. Functions of a DBMS īŽ Autorization services īŽ Only special part could have access to info īŽ Support for data communication īŽ Terminal at remote locations can communicate with host of DBMS through network īŽ Integrity Services īŽ Stored data are consistent and correct īŽ Services to promote Data Independence īŽ Utility Services īŽ Utility program help manage the DB effectively
  • 17. Advantages of DBMS īŽ Control of data redundancy (duplication) īą Eliminate redundency where possible , īŽ Data consistency īą Data stored in more than once , system can ensure that all copies of the data are kept consistent īŽ Sharing of data īą By all authorized users īŽ Improved data integrity īą Rules that DB is not permitted to violate īą User define data and DBMS enforce it īŽ Improved maintenance through data independence īŽ Make application immune to changes in data description