SlideShare a Scribd company logo
1 of 17
Introduction
 Database integral part of our day to day life
 Collection of related database
 Database Management System : software
managing and controlling access to the
database.
 Database system : collection of application
interracting with database
Example of use of database systems
A database is accessed when :
 Purshasing in a supermarket ( item price)
 Purchase using credit cards ( valid cards)
 Inquiries about a holliday (flight details)
 Make a loan (library)
 Rent video ( detail info on each video)
 Online bookstore( book details)
Sample data
Dtabase in the dev cycle
Project
Identifcation
and Selection
Project
Initiation
and Planning
Analysis
Logical
Design
Physical
Design
Implementation
Maintenance
Database
 A repository of data simultaneously used by many
users (a shared ressource).
 Collection of logically related data.
 Description of this data (data dictionary)
 BDMS
Software interracting with :
 Users
 Application programs
 database
 BDMS
Software interracting with :
 Users
 Application programs
 Database
DBMS allows users (using a query language):
 Insert
 Update
 Delete
 Retrive data from DB
Database application programs
Computer program that allow
users to interact with the DB
through DBMS.
DBMS environment

Hardware :Computer systems that DBMS and
application programs run on.

Software: DBMS,application programs, operating
system, network software(if DBMS used over
network).

Data ( operational data and meta-data)

Procedures: instruction and rules that govern use of
database

People: DB designer, administrators , programmers
and end users
Database environment
DBMS architecture
2 layer architecture Client-Server
 The client that runs the application and the server that
handles the database back-end
 Multiple users able to access the DB simultanousely.
 Server is processing data while the client for business
logic and presentation.
2-Tier Architecture
DBMS architecture
3 layer architecture
 User Interface layer ( runs on the user´s client)
 Business logic (middle layer) and data processing
layer. Runs on a server called ”application server”.
 DBMS ( store data ) , may run on a separate server
called ”database server”
3 layer architecture advantages
 Thin client (less hardware) , client only handling
presentation logic.This means a little communication
needed between the client(browser) and the middle tier.
 Separating the core business logic from the database
functions
 Modularity : Easy to modify or replace one tier without
affecting the other tiers
 Easier load balancing
 Maps quite naturally to the web environment
 Security : middle tier protecting the DB.
 Scalabale : add as many middle tier as needed
Functions of a DBMS
 Data storage , retrieval and update
 A user-accessible Catalog
 Hold data about the structure of database , users , applications and so on
 Transaction support
 Ensure that all the updates are made or that none of them are made
 Concurrency control services
 Enable many users to access shared data concurrently
 Recovery services
 When transaction fails, DB revovered to a consistent state
Functions of a DBMS
 Autorization services
 Only special part could have access to info
 Support for data communication
 Terminal at remote locations can communicate with host of DBMS through
network
 Integrity Services
 Stored data are consistent and correct
 Services to promote Data Independence
 Utility Services
 Utility program help manage the DB effectively
Advantages of DBMS
 Control of data redundancy (duplication)
 Eliminate redundency where possible ,
 Data consistency
 Data stored in more than once , system can ensure that all copies
of the data are kept consistent
 Sharing of data
 By all authorized users
 Improved data integrity
 Rules that DB is not permitted to violate
 User define data and DBMS enforce it
 Improved maintenance through data independence
 Make application immune to changes in data description

More Related Content

What's hot

Data Base Management
Data Base ManagementData Base Management
Data Base ManagementApex
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Ravinder Kamboj
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management SystemPapan Sarkar
 
A database management system
A database management systemA database management system
A database management systemghulam120
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management SystemGhanshyam Patel
 
Database administrator
Database administratorDatabase administrator
Database administratorTech_MX
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbmsVisakh V
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Client server computing
Client server computingClient server computing
Client server computingStudent
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server ComputingCloudbells.com
 
05_system architecture
05_system architecture05_system architecture
05_system architectureJadavsejal
 

What's hot (16)

Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
 
Users of dbms
Users of dbmsUsers of dbms
Users of dbms
 
A database management system
A database management systemA database management system
A database management system
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
Database
DatabaseDatabase
Database
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Client server computing
Client server computingClient server computing
Client server computing
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
 
05_system architecture
05_system architecture05_system architecture
05_system architecture
 
1. intro
1. intro1. intro
1. intro
 

Viewers also liked

Data visualization
Data visualizationData visualization
Data visualizationYoung Alista
 
Tecnologías de Información y Comunicación
Tecnologías de Información y ComunicaciónTecnologías de Información y Comunicación
Tecnologías de Información y Comunicaciónpolivirtual972
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsYoung Alista
 
Exception handling
Exception handlingException handling
Exception handlingYoung Alista
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data miningYoung Alista
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationYoung Alista
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in cryptoYoung Alista
 
Prolog programming
Prolog programmingProlog programming
Prolog programmingYoung Alista
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherenceYoung Alista
 
Programming for engineers in python
Programming for engineers in pythonProgramming for engineers in python
Programming for engineers in pythonYoung Alista
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practiceYoung Alista
 
Information retrieval
Information retrievalInformation retrieval
Information retrievalYoung Alista
 
Python your new best friend
Python your new best friendPython your new best friend
Python your new best friendYoung Alista
 

Viewers also liked (20)

Poo java
Poo javaPoo java
Poo java
 
Data visualization
Data visualizationData visualization
Data visualization
 
Prolog resume
Prolog resumeProlog resume
Prolog resume
 
Tecnologías de Información y Comunicación
Tecnologías de Información y ComunicaciónTecnologías de Información y Comunicación
Tecnologías de Información y Comunicación
 
Overview prolog
Overview prologOverview prolog
Overview prolog
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Exception handling
Exception handlingException handling
Exception handling
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
 
Xml and webdata
Xml and webdataXml and webdata
Xml and webdata
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in crypto
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
 
Programming for engineers in python
Programming for engineers in pythonProgramming for engineers in python
Programming for engineers in python
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Big data
Big dataBig data
Big data
 
Abstract class
Abstract classAbstract class
Abstract class
 
Information retrieval
Information retrievalInformation retrieval
Information retrieval
 
Python your new best friend
Python your new best friendPython your new best friend
Python your new best friend
 

Similar to Database Introduction: Collection, Management, Systems and Applications

Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersMustafa Kamel Mohammadi
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfhpndegreecollegesklm
 
Overview of databases
Overview of databasesOverview of databases
Overview of databasesshaik faroq
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDivyaKS12
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbmssethu pm
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxATIFAZEEZ1
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)shahab3
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfarchanacomputers1
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfparveen204931475
 

Similar to Database Introduction: Collection, Management, Systems and Applications (20)

DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Assign 1
Assign 1Assign 1
Assign 1
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
Lecture1
Lecture1Lecture1
Lecture1
 
En ch01
En ch01En ch01
En ch01
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Chapter1
Chapter1Chapter1
Chapter1
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
 
DBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxDBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptx
 
Dbms
DbmsDbms
Dbms
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
 

More from Young Alista

Google appenginejava.ppt
Google appenginejava.pptGoogle appenginejava.ppt
Google appenginejava.pptYoung Alista
 
Motivation for multithreaded architectures
Motivation for multithreaded architecturesMotivation for multithreaded architectures
Motivation for multithreaded architecturesYoung Alista
 
Serialization/deserialization
Serialization/deserializationSerialization/deserialization
Serialization/deserializationYoung Alista
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data miningYoung Alista
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discoveryYoung Alista
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cacheYoung Alista
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching worksYoung Alista
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsYoung Alista
 
Abstract data types
Abstract data typesAbstract data types
Abstract data typesYoung Alista
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with javaYoung Alista
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithmsYoung Alista
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and pythonYoung Alista
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysisYoung Alista
 
Extending burp with python
Extending burp with pythonExtending burp with python
Extending burp with pythonYoung Alista
 

More from Young Alista (20)

Google appenginejava.ppt
Google appenginejava.pptGoogle appenginejava.ppt
Google appenginejava.ppt
 
Motivation for multithreaded architectures
Motivation for multithreaded architecturesMotivation for multithreaded architectures
Motivation for multithreaded architectures
 
Serialization/deserialization
Serialization/deserializationSerialization/deserialization
Serialization/deserialization
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
Cache recap
Cache recapCache recap
Cache recap
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
 
Object model
Object modelObject model
Object model
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Inheritance
InheritanceInheritance
Inheritance
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Api crash
Api crashApi crash
Api crash
 
Learning python
Learning pythonLearning python
Learning python
 
Python basics
Python basicsPython basics
Python basics
 
Extending burp with python
Extending burp with pythonExtending burp with python
Extending burp with python
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Database Introduction: Collection, Management, Systems and Applications

  • 1. Introduction  Database integral part of our day to day life  Collection of related database  Database Management System : software managing and controlling access to the database.  Database system : collection of application interracting with database
  • 2. Example of use of database systems A database is accessed when :  Purshasing in a supermarket ( item price)  Purchase using credit cards ( valid cards)  Inquiries about a holliday (flight details)  Make a loan (library)  Rent video ( detail info on each video)  Online bookstore( book details)
  • 4. Dtabase in the dev cycle Project Identifcation and Selection Project Initiation and Planning Analysis Logical Design Physical Design Implementation Maintenance
  • 5. Database  A repository of data simultaneously used by many users (a shared ressource).  Collection of logically related data.  Description of this data (data dictionary)  BDMS Software interracting with :  Users  Application programs  database
  • 6.  BDMS Software interracting with :  Users  Application programs  Database DBMS allows users (using a query language):  Insert  Update  Delete  Retrive data from DB
  • 7. Database application programs Computer program that allow users to interact with the DB through DBMS.
  • 8. DBMS environment  Hardware :Computer systems that DBMS and application programs run on.  Software: DBMS,application programs, operating system, network software(if DBMS used over network).  Data ( operational data and meta-data)  Procedures: instruction and rules that govern use of database  People: DB designer, administrators , programmers and end users
  • 10. DBMS architecture 2 layer architecture Client-Server  The client that runs the application and the server that handles the database back-end  Multiple users able to access the DB simultanousely.  Server is processing data while the client for business logic and presentation.
  • 12. DBMS architecture 3 layer architecture  User Interface layer ( runs on the user´s client)  Business logic (middle layer) and data processing layer. Runs on a server called ”application server”.  DBMS ( store data ) , may run on a separate server called ”database server”
  • 13.
  • 14. 3 layer architecture advantages  Thin client (less hardware) , client only handling presentation logic.This means a little communication needed between the client(browser) and the middle tier.  Separating the core business logic from the database functions  Modularity : Easy to modify or replace one tier without affecting the other tiers  Easier load balancing  Maps quite naturally to the web environment  Security : middle tier protecting the DB.  Scalabale : add as many middle tier as needed
  • 15. Functions of a DBMS  Data storage , retrieval and update  A user-accessible Catalog  Hold data about the structure of database , users , applications and so on  Transaction support  Ensure that all the updates are made or that none of them are made  Concurrency control services  Enable many users to access shared data concurrently  Recovery services  When transaction fails, DB revovered to a consistent state
  • 16. Functions of a DBMS  Autorization services  Only special part could have access to info  Support for data communication  Terminal at remote locations can communicate with host of DBMS through network  Integrity Services  Stored data are consistent and correct  Services to promote Data Independence  Utility Services  Utility program help manage the DB effectively
  • 17. Advantages of DBMS  Control of data redundancy (duplication)  Eliminate redundency where possible ,  Data consistency  Data stored in more than once , system can ensure that all copies of the data are kept consistent  Sharing of data  By all authorized users  Improved data integrity  Rules that DB is not permitted to violate  User define data and DBMS enforce it  Improved maintenance through data independence  Make application immune to changes in data description