SlideShare a Scribd company logo
1 of 12
Introduction to Database
  Management System
The Traditional Approach To Data
          Management


                       – Create new
                         files for each
                         application
                       – Data
                         redundancy
                       – Data integrity
Disadvantages of File Processing

• Program-Data Dependence
   – All programs maintain metadata for each file they
     use
• Data Redundancy (Duplication of data)
   – Different systems/programs have separate copies of
     the same data
• Limited Data Sharing
   – No centralized control of data
• Lengthy Development Times
   – Programmers must design their own file formats
• Excessive Program Maintenance
   – 80% of of information systems budget
Components of the database environment
Components of the
               Database Environment
• CASE Tools – computer-aided software engineering
• Repository – centralized storehouse of metadata
• Database Management System (DBMS) – software
  for managing the database
• Database – storehouse of the data
• Application Programs – software using the data
• User Interface – text and graphical displays to users
• Data Administrators – personnel responsible for
  maintaining the database
• System Developers – personnel responsible for
  designing databases and software
• End Users – people who use the applications and
  databases
Disadvantages of DBMS


• Databases used in enterprises may involve additional
  risks as compared to a conventional data processing
  system in some areas

• Confidential, Privacy and Security : When
  information is centralized and is made available to
  users from remote locations, there is a possibility of
  unauthorized users accessing sensitive information.
• It is necessary to take technical, administrative and
  legal measures.
Disadvantages of DBMS

• Data Quality : Since database is accessible to users
  remotely, adequate controls are needed to control users
  updating data and to control data quality.
• With increased number of users accessing directly,
  there is an opportunity for users to damage data.Unless
  there are suitable controls, the data quality may be
  compromised.
• Data Integrity : Since a large number of users cloud
  be using a database concurrently, technical safeguards
  are necessary to ensure that data remain correct during
  operation.
Overall System Structure
Overall System Structure

• A database system is partitioned into
  modules       which      handles     different
  responsibilities of over all system.
  The functional components of a database
  system are
 Query processor Component
 Storage manager component
Query Processor Component

• DML Compiler : It translates DML statements
  into a lower level instructions that the query
  evaluation engine understands
• Embedded DML precompiler : It converts DML
  statements embedded in an application program
  into normal procedure calls in the host language.
• DDL Interpreter : It interprets DDL statements
  and records them in a set of tables
• Query evaluation engine : It executes lower level
  instructions generated by the DML compiler
Storage manager component
• It is an Interface between the data stored in the database and
  the application programs and queries submitted to the
  system.
• Authorization and Integrity manager : It tests for
  satisfaction of integrity constraints and checks the authority
  of users to access data.
• Transaction Manager : It ensures concurrent transaction
  executions processed without conflicting.
• File manager : It manages the allocation of space on disk
  and the data structures used to represent information.
• Buffer manager : Which is responsible for fetching data
  from disk storage into main memory.
Application Architectures




Two-tier architecture: E.g. client programs using ODBC/JDBC to
 communicate with a database
Three-tier architecture: E.g. web-based applications, and
 applications built using “middleware”

More Related Content

What's hot

Database application developer and end users
Database application developer and end usersDatabase application developer and end users
Database application developer and end usersAbdul Rehman
 
Database administrator
Database administratorDatabase administrator
Database administratorTech_MX
 
Single User v/s Multi User Databases
Single User v/s Multi User DatabasesSingle User v/s Multi User Databases
Single User v/s Multi User DatabasesRaminder Pal Singh
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.yhen06
 
Database Administrator - Job Scope
Database Administrator - Job ScopeDatabase Administrator - Job Scope
Database Administrator - Job ScopeCacheWorks©
 
Ch 1 D B Environment
Ch 1  D B  EnvironmentCh 1  D B  Environment
Ch 1 D B Environmentguest8fdbdd
 
Tasks of database administrator
Tasks of database administratorTasks of database administrator
Tasks of database administratorAttia Qamar
 
Data Base System Application - Unit 7
Data Base System Application - Unit 7Data Base System Application - Unit 7
Data Base System Application - Unit 7Amit Chandra
 
Slide 4 dbms users
Slide 4 dbms usersSlide 4 dbms users
Slide 4 dbms usersVisakh V
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)welcometofacebook
 
Dbms Notes Lecture 1 : Drawbacks of File processing system
Dbms Notes Lecture 1 : Drawbacks of File processing systemDbms Notes Lecture 1 : Drawbacks of File processing system
Dbms Notes Lecture 1 : Drawbacks of File processing systemBIT Durg
 
Database administrator types
Database administrator typesDatabase administrator types
Database administrator typesmichel9
 
DBMS-Database management system 2018
DBMS-Database management system 2018DBMS-Database management system 2018
DBMS-Database management system 2018Tonmoy zahid Rishad
 

What's hot (20)

Database application developer and end users
Database application developer and end usersDatabase application developer and end users
Database application developer and end users
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Single User v/s Multi User Databases
Single User v/s Multi User DatabasesSingle User v/s Multi User Databases
Single User v/s Multi User Databases
 
DBMS
DBMSDBMS
DBMS
 
Dbms
DbmsDbms
Dbms
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database Administrator - Job Scope
Database Administrator - Job ScopeDatabase Administrator - Job Scope
Database Administrator - Job Scope
 
Ch 1 D B Environment
Ch 1  D B  EnvironmentCh 1  D B  Environment
Ch 1 D B Environment
 
Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Tasks of database administrator
Tasks of database administratorTasks of database administrator
Tasks of database administrator
 
Data Base System Application - Unit 7
Data Base System Application - Unit 7Data Base System Application - Unit 7
Data Base System Application - Unit 7
 
Data administration
Data administrationData administration
Data administration
 
Slide 4 dbms users
Slide 4 dbms usersSlide 4 dbms users
Slide 4 dbms users
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)
 
DBA
DBADBA
DBA
 
Chapter2
Chapter2Chapter2
Chapter2
 
Dbms Notes Lecture 1 : Drawbacks of File processing system
Dbms Notes Lecture 1 : Drawbacks of File processing systemDbms Notes Lecture 1 : Drawbacks of File processing system
Dbms Notes Lecture 1 : Drawbacks of File processing system
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 
Database administrator types
Database administrator typesDatabase administrator types
Database administrator types
 
DBMS-Database management system 2018
DBMS-Database management system 2018DBMS-Database management system 2018
DBMS-Database management system 2018
 

Similar to Session1

Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.pptChSheraz3
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Surya Swaroop
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topichoseg78377
 
1-introduction to DB.pdf
1-introduction to DB.pdf1-introduction to DB.pdf
1-introduction to DB.pdfMuniraALmogren
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDivyaKS12
 
Database System Architecture
Database System ArchitectureDatabase System Architecture
Database System ArchitectureVignesh Saravanan
 
CS3270 - DATABASE SYSTEM - Lecture (1)
CS3270 - DATABASE SYSTEM -  Lecture (1)CS3270 - DATABASE SYSTEM -  Lecture (1)
CS3270 - DATABASE SYSTEM - Lecture (1)Dilawar Khan
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbmssethu pm
 
Difference between File system and DBMS.pptx
Difference between File system and DBMS.pptxDifference between File system and DBMS.pptx
Difference between File system and DBMS.pptxMuhammadHamzaKhan58
 
Chapter-1 Introduction to Database Management Systems
Chapter-1 Introduction to Database Management SystemsChapter-1 Introduction to Database Management Systems
Chapter-1 Introduction to Database Management SystemsKunal Anand
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptxChandanHegde13
 
Database Administration, Management & Security.pptx
Database Administration, Management & Security.pptxDatabase Administration, Management & Security.pptx
Database Administration, Management & Security.pptxSaqibKhan60365
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMSSarmad Ali
 

Similar to Session1 (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 
Unit1 dbms
Unit1 dbmsUnit1 dbms
Unit1 dbms
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 
ARCHITECTURE.pptx
ARCHITECTURE.pptxARCHITECTURE.pptx
ARCHITECTURE.pptx
 
Database system
Database systemDatabase system
Database system
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topic
 
1-introduction to DB.pdf
1-introduction to DB.pdf1-introduction to DB.pdf
1-introduction to DB.pdf
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Database System Architecture
Database System ArchitectureDatabase System Architecture
Database System Architecture
 
CS3270 - DATABASE SYSTEM - Lecture (1)
CS3270 - DATABASE SYSTEM -  Lecture (1)CS3270 - DATABASE SYSTEM -  Lecture (1)
CS3270 - DATABASE SYSTEM - Lecture (1)
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Difference between File system and DBMS.pptx
Difference between File system and DBMS.pptxDifference between File system and DBMS.pptx
Difference between File system and DBMS.pptx
 
Chapter-1 Introduction to Database Management Systems
Chapter-1 Introduction to Database Management SystemsChapter-1 Introduction to Database Management Systems
Chapter-1 Introduction to Database Management Systems
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptx
 
Database Administration, Management & Security.pptx
Database Administration, Management & Security.pptxDatabase Administration, Management & Security.pptx
Database Administration, Management & Security.pptx
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Session1

  • 1. Introduction to Database Management System
  • 2. The Traditional Approach To Data Management – Create new files for each application – Data redundancy – Data integrity
  • 3. Disadvantages of File Processing • Program-Data Dependence – All programs maintain metadata for each file they use • Data Redundancy (Duplication of data) – Different systems/programs have separate copies of the same data • Limited Data Sharing – No centralized control of data • Lengthy Development Times – Programmers must design their own file formats • Excessive Program Maintenance – 80% of of information systems budget
  • 4. Components of the database environment
  • 5. Components of the Database Environment • CASE Tools – computer-aided software engineering • Repository – centralized storehouse of metadata • Database Management System (DBMS) – software for managing the database • Database – storehouse of the data • Application Programs – software using the data • User Interface – text and graphical displays to users • Data Administrators – personnel responsible for maintaining the database • System Developers – personnel responsible for designing databases and software • End Users – people who use the applications and databases
  • 6. Disadvantages of DBMS • Databases used in enterprises may involve additional risks as compared to a conventional data processing system in some areas • Confidential, Privacy and Security : When information is centralized and is made available to users from remote locations, there is a possibility of unauthorized users accessing sensitive information. • It is necessary to take technical, administrative and legal measures.
  • 7. Disadvantages of DBMS • Data Quality : Since database is accessible to users remotely, adequate controls are needed to control users updating data and to control data quality. • With increased number of users accessing directly, there is an opportunity for users to damage data.Unless there are suitable controls, the data quality may be compromised. • Data Integrity : Since a large number of users cloud be using a database concurrently, technical safeguards are necessary to ensure that data remain correct during operation.
  • 9. Overall System Structure • A database system is partitioned into modules which handles different responsibilities of over all system. The functional components of a database system are  Query processor Component  Storage manager component
  • 10. Query Processor Component • DML Compiler : It translates DML statements into a lower level instructions that the query evaluation engine understands • Embedded DML precompiler : It converts DML statements embedded in an application program into normal procedure calls in the host language. • DDL Interpreter : It interprets DDL statements and records them in a set of tables • Query evaluation engine : It executes lower level instructions generated by the DML compiler
  • 11. Storage manager component • It is an Interface between the data stored in the database and the application programs and queries submitted to the system. • Authorization and Integrity manager : It tests for satisfaction of integrity constraints and checks the authority of users to access data. • Transaction Manager : It ensures concurrent transaction executions processed without conflicting. • File manager : It manages the allocation of space on disk and the data structures used to represent information. • Buffer manager : Which is responsible for fetching data from disk storage into main memory.
  • 12. Application Architectures Two-tier architecture: E.g. client programs using ODBC/JDBC to communicate with a database Three-tier architecture: E.g. web-based applications, and applications built using “middleware”