SlideShare a Scribd company logo
Introduction
 Database integral part of our day to day life
 Collection of related database
 Database Management System : software
managing and controlling access to the
database.
 Database system : collection of application
interracting with database
Example of use of database systems
A database is accessed when :
 Purshasing in a supermarket ( item price)
 Purchase using credit cards ( valid cards)
 Inquiries about a holliday (flight details)
 Make a loan (library)
 Rent video ( detail info on each video)
 Online bookstore( book details)
Sample data
Dtabase in the dev cycle
Project
Identifcation
and Selection
Project
Initiation
and Planning
Analysis
Logical
Design
Physical
Design
Implementation
Maintenance
Database
 A repository of data simultaneously used by many
users (a shared ressource).
 Collection of logically related data.
 Description of this data (data dictionary)
 BDMS
Software interracting with :
 Users
 Application programs
 database
 BDMS
Software interracting with :
 Users
 Application programs
 Database
DBMS allows users (using a query language):
 Insert
 Update
 Delete
 Retrive data from DB
Database application programs
Computer program that allow
users to interact with the DB
through DBMS.
DBMS environment

Hardware :Computer systems that DBMS and
application programs run on.

Software: DBMS,application programs, operating
system, network software(if DBMS used over
network).

Data ( operational data and meta-data)

Procedures: instruction and rules that govern use of
database

People: DB designer, administrators , programmers
and end users
Database environment
DBMS architecture
2 layer architecture Client-Server
 The client that runs the application and the server that
handles the database back-end
 Multiple users able to access the DB simultanousely.
 Server is processing data while the client for business
logic and presentation.
2-Tier Architecture
DBMS architecture
3 layer architecture
 User Interface layer ( runs on the user´s client)
 Business logic (middle layer) and data processing
layer. Runs on a server called ”application server”.
 DBMS ( store data ) , may run on a separate server
called ”database server”
3 layer architecture advantages
 Thin client (less hardware) , client only handling
presentation logic.This means a little communication
needed between the client(browser) and the middle tier.
 Separating the core business logic from the database
functions
 Modularity : Easy to modify or replace one tier without
affecting the other tiers
 Easier load balancing
 Maps quite naturally to the web environment
 Security : middle tier protecting the DB.
 Scalabale : add as many middle tier as needed
Functions of a DBMS
 Data storage , retrieval and update
 A user-accessible Catalog
 Hold data about the structure of database , users , applications and so on
 Transaction support
 Ensure that all the updates are made or that none of them are made
 Concurrency control services
 Enable many users to access shared data concurrently
 Recovery services
 When transaction fails, DB revovered to a consistent state
Functions of a DBMS
 Autorization services
 Only special part could have access to info
 Support for data communication
 Terminal at remote locations can communicate with host of DBMS through
network
 Integrity Services
 Stored data are consistent and correct
 Services to promote Data Independence
 Utility Services
 Utility program help manage the DB effectively
Advantages of DBMS
 Control of data redundancy (duplication)
 Eliminate redundency where possible ,
 Data consistency
 Data stored in more than once , system can ensure that all copies
of the data are kept consistent
 Sharing of data
 By all authorized users
 Improved data integrity
 Rules that DB is not permitted to violate
 User define data and DBMS enforce it
 Improved maintenance through data independence
 Make application immune to changes in data description

More Related Content

What's hot

Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
Bosch Software Innovations
 
Data Base Management
Data Base ManagementData Base Management
Data Base ManagementApex
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
Ravinder Kamboj
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
Papan Sarkar
 
Users of dbms
Users of dbmsUsers of dbms
Users of dbms
Preet Hanspal
 
A database management system
A database management systemA database management system
A database management system
ghulam120
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
Ghanshyam Patel
 
Database
DatabaseDatabase
Database
santoshsaini22
 
Database administrator
Database administratorDatabase administrator
Database administratorTech_MX
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
Visakh V
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
Raj vardhan
 
Client server computing
Client server computingClient server computing
Client server computing
Student
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
Cloudbells.com
 

What's hot (15)

Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
 
Users of dbms
Users of dbmsUsers of dbms
Users of dbms
 
A database management system
A database management systemA database management system
A database management system
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
Database
DatabaseDatabase
Database
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Client server computing
Client server computingClient server computing
Client server computing
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
 
1. intro
1. intro1. intro
1. intro
 

Viewers also liked

How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
James Wong
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby intro
James Wong
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
James Wong
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
James Wong
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
James Wong
 
Hashfunction
HashfunctionHashfunction
Hashfunction
James Wong
 
Computer security
Computer securityComputer security
Computer security
James Wong
 
Access data connection
Access data connectionAccess data connection
Access data connection
James Wong
 
Data preparation
Data preparationData preparation
Data preparation
James Wong
 
Test driven development
Test driven developmentTest driven development
Test driven development
James Wong
 
Text categorization as a graph
Text categorization as a graphText categorization as a graph
Text categorization as a graph
James Wong
 
Game theory
Game theoryGame theory
Game theory
James Wong
 
List and iterator
List and iteratorList and iterator
List and iterator
James Wong
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
James Wong
 
Cryptography
CryptographyCryptography
Cryptography
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 

Viewers also liked (18)

How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby intro
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Maven
MavenMaven
Maven
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Java
JavaJava
Java
 
Computer security
Computer securityComputer security
Computer security
 
Access data connection
Access data connectionAccess data connection
Access data connection
 
Data preparation
Data preparationData preparation
Data preparation
 
Test driven development
Test driven developmentTest driven development
Test driven development
 
Text categorization as a graph
Text categorization as a graphText categorization as a graph
Text categorization as a graph
 
Game theory
Game theoryGame theory
Game theory
 
List and iterator
List and iteratorList and iterator
List and iterator
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

Similar to Database introduction

DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
BhaskarPatil24
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
Mustafa Kamel Mohammadi
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
hpndegreecollegesklm
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
Surkhab Shelly
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
shaik faroq
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
DivyaKS12
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1ahfiki
 
Lecture1
Lecture1Lecture1
Lecture1
hassan340
 
En ch01
En ch01En ch01
En ch01
anibapi
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbmssethu pm
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
Diana Diana
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
ATIFAZEEZ1
 
DBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxDBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptx
Anusha sivakumar
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
shahab3
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
archanacomputers1
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
sonveer singh baghel
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
parveen204931475
 

Similar to Database introduction (20)

DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Assign 1
Assign 1Assign 1
Assign 1
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
Lecture1
Lecture1Lecture1
Lecture1
 
En ch01
En ch01En ch01
En ch01
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Chapter1
Chapter1Chapter1
Chapter1
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
 
DBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptxDBMS ARCHITECTURE.pptx
DBMS ARCHITECTURE.pptx
 
Dbms
DbmsDbms
Dbms
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
 

More from James Wong

Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
James Wong
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
James Wong
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
James Wong
 
Cache recap
Cache recapCache recap
Cache recap
James Wong
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
James Wong
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
James Wong
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
James Wong
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
James Wong
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
James Wong
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
James Wong
 
Object model
Object modelObject model
Object model
James Wong
 
Abstract class
Abstract classAbstract class
Abstract class
James Wong
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
James Wong
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
James Wong
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
James Wong
 
Inheritance
InheritanceInheritance
Inheritance
James Wong
 
Learning python
Learning pythonLearning python
Learning python
James Wong
 

More from James Wong (20)

Data race
Data raceData race
Data race
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
 
Recursion
RecursionRecursion
Recursion
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
Cache recap
Cache recapCache recap
Cache recap
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
 
Object model
Object modelObject model
Object model
 
Abstract class
Abstract classAbstract class
Abstract class
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
 
Inheritance
InheritanceInheritance
Inheritance
 
Api crash
Api crashApi crash
Api crash
 
Learning python
Learning pythonLearning python
Learning python
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Database introduction

  • 1. Introduction  Database integral part of our day to day life  Collection of related database  Database Management System : software managing and controlling access to the database.  Database system : collection of application interracting with database
  • 2. Example of use of database systems A database is accessed when :  Purshasing in a supermarket ( item price)  Purchase using credit cards ( valid cards)  Inquiries about a holliday (flight details)  Make a loan (library)  Rent video ( detail info on each video)  Online bookstore( book details)
  • 4. Dtabase in the dev cycle Project Identifcation and Selection Project Initiation and Planning Analysis Logical Design Physical Design Implementation Maintenance
  • 5. Database  A repository of data simultaneously used by many users (a shared ressource).  Collection of logically related data.  Description of this data (data dictionary)  BDMS Software interracting with :  Users  Application programs  database
  • 6.  BDMS Software interracting with :  Users  Application programs  Database DBMS allows users (using a query language):  Insert  Update  Delete  Retrive data from DB
  • 7. Database application programs Computer program that allow users to interact with the DB through DBMS.
  • 8. DBMS environment  Hardware :Computer systems that DBMS and application programs run on.  Software: DBMS,application programs, operating system, network software(if DBMS used over network).  Data ( operational data and meta-data)  Procedures: instruction and rules that govern use of database  People: DB designer, administrators , programmers and end users
  • 10. DBMS architecture 2 layer architecture Client-Server  The client that runs the application and the server that handles the database back-end  Multiple users able to access the DB simultanousely.  Server is processing data while the client for business logic and presentation.
  • 12. DBMS architecture 3 layer architecture  User Interface layer ( runs on the user´s client)  Business logic (middle layer) and data processing layer. Runs on a server called ”application server”.  DBMS ( store data ) , may run on a separate server called ”database server”
  • 13.
  • 14. 3 layer architecture advantages  Thin client (less hardware) , client only handling presentation logic.This means a little communication needed between the client(browser) and the middle tier.  Separating the core business logic from the database functions  Modularity : Easy to modify or replace one tier without affecting the other tiers  Easier load balancing  Maps quite naturally to the web environment  Security : middle tier protecting the DB.  Scalabale : add as many middle tier as needed
  • 15. Functions of a DBMS  Data storage , retrieval and update  A user-accessible Catalog  Hold data about the structure of database , users , applications and so on  Transaction support  Ensure that all the updates are made or that none of them are made  Concurrency control services  Enable many users to access shared data concurrently  Recovery services  When transaction fails, DB revovered to a consistent state
  • 16. Functions of a DBMS  Autorization services  Only special part could have access to info  Support for data communication  Terminal at remote locations can communicate with host of DBMS through network  Integrity Services  Stored data are consistent and correct  Services to promote Data Independence  Utility Services  Utility program help manage the DB effectively
  • 17. Advantages of DBMS  Control of data redundancy (duplication)  Eliminate redundency where possible ,  Data consistency  Data stored in more than once , system can ensure that all copies of the data are kept consistent  Sharing of data  By all authorized users  Improved data integrity  Rules that DB is not permitted to violate  User define data and DBMS enforce it  Improved maintenance through data independence  Make application immune to changes in data description