SlideShare a Scribd company logo
Database Technology
Database Technology
 Database is a computer based record keeping system
which is used to record maintain and retrieve the data.
It is an organized collection of interrelated data.
A database management system (DBMS) is a computer
software application that interacts with the user, other
applications, and the database itself to capture and
analyze data.
Database Security
 Database security deals with all various aspects of protecting
the database content, its owners, and its users. It ranges from
protection from intentional unauthorized database uses to
unintentional database accesses by unauthorized entities
(e.g., a person or a computer program). Database access
control deals with controlling who (a person or a certain
computer program) is allowed to access what information in
the database. The information may comprise specific database
objects (e.g., record types, specific records, data structures),
certain computations over certain objects (e.g., query types,
or specific queries), or utilizing specific access paths to the
former (e.g., using specific indexes or other data structures to
access information).
 Database access controls are set by special authorized (by
the database owner) personnel that uses dedicated
protected security DBMS interfaces.
 Data security in general deals with protecting specific
chunks of data, both physically (i.e., from corruption, or
destruction, or removal; e.g., see physical security), or
the interpretation of them, or parts of them to
meaningful information (e.g., by looking at the strings of
bits that they comprise, concluding specific valid credit-
card numbers; e.g., see data encryption).
Types of Database.
 Centralized Database
 In Centralized database system, all data is stored at a
single site. It offers a great control in accessing and
updating data. However failure chances are high because
the system depends on the availability of resources at the
central site
 Distributed Database
 In Distributed Database system, the database is stored on
several computers. Computers in a distributed system may
communicate with one another through
internet/intranet/telephone lines etc. Most of the
distributed systems will be geographically separated and
managed. Distributed databases can also separately be
administered
Database technology

More Related Content

What's hot

Lesson 2 network database system
Lesson 2 network database systemLesson 2 network database system
Lesson 2 network database system
GiO Friginal
 
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesTechniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Jill Emery
 
basis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival toolsbasis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival tools
Saroj Suwal
 
Integrated library management system
Integrated library management systemIntegrated library management system
Integrated library management system
drningappaarabagonda
 
Information retrieval (introduction)
Information  retrieval (introduction) Information  retrieval (introduction)
Information retrieval (introduction)
Primya Tamil
 
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data WranglingArtifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
Faisal Akbar
 
Database management system
Database management systemDatabase management system
Database management system
Govinda Neupane
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
raghu_designer
 
Data warehouse
Data warehouseData warehouse
Data warehouse
shachibattar
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
Nishant Munjal
 
Metadata ppt
Metadata pptMetadata ppt
Metadata ppt
Shashikant Kumar
 
DB security
 DB security DB security
DB security
ERSHUBHAM TIWARI
 
introduction to database
 introduction to database introduction to database
introduction to database
Akif shexi
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
Ajay Jha
 
Dspace software
Dspace softwareDspace software
Dspace software
Santosh Kumar Kori
 
Electronic Resource Management in the library
Electronic Resource Management in the libraryElectronic Resource Management in the library
Electronic Resource Management in the library
Dr. Nihar K. Patra
 
Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health Informatics
Zulfiquer Ahmed Amin
 
Introduction to Data Warehousing
Introduction to Data WarehousingIntroduction to Data Warehousing
Introduction to Data WarehousingEyad Manna
 

What's hot (20)

Lesson 2 network database system
Lesson 2 network database systemLesson 2 network database system
Lesson 2 network database system
 
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesTechniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
 
basis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival toolsbasis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival tools
 
Integrated library management system
Integrated library management systemIntegrated library management system
Integrated library management system
 
Information retrieval (introduction)
Information  retrieval (introduction) Information  retrieval (introduction)
Information retrieval (introduction)
 
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data WranglingArtifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
 
Database management system
Database management systemDatabase management system
Database management system
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Digital library
Digital libraryDigital library
Digital library
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Metadata ppt
Metadata pptMetadata ppt
Metadata ppt
 
DB security
 DB security DB security
DB security
 
introduction to database
 introduction to database introduction to database
introduction to database
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
 
Dspace software
Dspace softwareDspace software
Dspace software
 
Electronic Resource Management in the library
Electronic Resource Management in the libraryElectronic Resource Management in the library
Electronic Resource Management in the library
 
Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health Informatics
 
Introduction to Data Warehousing
Introduction to Data WarehousingIntroduction to Data Warehousing
Introduction to Data Warehousing
 
Importance of Database in Library
Importance of Database in LibraryImportance of Database in Library
Importance of Database in Library
 

Viewers also liked

Proinfo aula 1_07_05_2013
Proinfo aula 1_07_05_2013Proinfo aula 1_07_05_2013
Proinfo aula 1_07_05_2013
natanael_queiroz
 
Presentació Guifi.net Terrassa Barri SegleXX
Presentació Guifi.net Terrassa Barri SegleXX Presentació Guifi.net Terrassa Barri SegleXX
Presentació Guifi.net Terrassa Barri SegleXX
lliurealbir
 
Unidade 2 atividade 5 - painel das propostas do projeto
Unidade 2   atividade 5 - painel das propostas do projetoUnidade 2   atividade 5 - painel das propostas do projeto
Unidade 2 atividade 5 - painel das propostas do projetoDanimat
 
Proinfo segurança na_internet_04_06
Proinfo segurança na_internet_04_06Proinfo segurança na_internet_04_06
Proinfo segurança na_internet_04_06
natanael_queiroz
 
Presentacio Guifinet Sabadell 17/1/2008
Presentacio Guifinet Sabadell 17/1/2008Presentacio Guifinet Sabadell 17/1/2008
Presentacio Guifinet Sabadell 17/1/2008
lliurealbir
 
Proinfo informatica basica_14_05
Proinfo informatica basica_14_05Proinfo informatica basica_14_05
Proinfo informatica basica_14_05
natanael_queiroz
 
Rihanna digipak
Rihanna digipakRihanna digipak
Rihanna digipak
shanodell321
 
Shan associates pvt yin group products
Shan associates pvt yin group productsShan associates pvt yin group products
Shan associates pvt yin group products
Xulfiqar Ali
 
Viaje a tecnópolis
Viaje a tecnópolisViaje a tecnópolis
Viaje a tecnópolis
Nicolas Casas
 
Political Economy of Deforestation in the Tropics
Political Economy of Deforestation in the TropicsPolitical Economy of Deforestation in the Tropics
Political Economy of Deforestation in the Tropics
Christoph Schulze
 
Internet Trends031808meeker
Internet Trends031808meekerInternet Trends031808meeker
Internet Trends031808meekerTechcrunch
 
Task 6
Task 6Task 6
Task 6
shamimaali95
 

Viewers also liked (15)

Mohamed Fouad cv - 1 (1) (1)
Mohamed Fouad cv - 1 (1) (1)Mohamed Fouad cv - 1 (1) (1)
Mohamed Fouad cv - 1 (1) (1)
 
9 3
9 39 3
9 3
 
Proinfo aula 1_07_05_2013
Proinfo aula 1_07_05_2013Proinfo aula 1_07_05_2013
Proinfo aula 1_07_05_2013
 
Presentació Guifi.net Terrassa Barri SegleXX
Presentació Guifi.net Terrassa Barri SegleXX Presentació Guifi.net Terrassa Barri SegleXX
Presentació Guifi.net Terrassa Barri SegleXX
 
Unidade 2 atividade 5 - painel das propostas do projeto
Unidade 2   atividade 5 - painel das propostas do projetoUnidade 2   atividade 5 - painel das propostas do projeto
Unidade 2 atividade 5 - painel das propostas do projeto
 
Proinfo segurança na_internet_04_06
Proinfo segurança na_internet_04_06Proinfo segurança na_internet_04_06
Proinfo segurança na_internet_04_06
 
Presentacio Guifinet Sabadell 17/1/2008
Presentacio Guifinet Sabadell 17/1/2008Presentacio Guifinet Sabadell 17/1/2008
Presentacio Guifinet Sabadell 17/1/2008
 
Proinfo informatica basica_14_05
Proinfo informatica basica_14_05Proinfo informatica basica_14_05
Proinfo informatica basica_14_05
 
Rihanna digipak
Rihanna digipakRihanna digipak
Rihanna digipak
 
Presentacion Droneria_ES
Presentacion Droneria_ESPresentacion Droneria_ES
Presentacion Droneria_ES
 
Shan associates pvt yin group products
Shan associates pvt yin group productsShan associates pvt yin group products
Shan associates pvt yin group products
 
Viaje a tecnópolis
Viaje a tecnópolisViaje a tecnópolis
Viaje a tecnópolis
 
Political Economy of Deforestation in the Tropics
Political Economy of Deforestation in the TropicsPolitical Economy of Deforestation in the Tropics
Political Economy of Deforestation in the Tropics
 
Internet Trends031808meeker
Internet Trends031808meekerInternet Trends031808meeker
Internet Trends031808meeker
 
Task 6
Task 6Task 6
Task 6
 

Similar to Database technology

Encryption technology
Encryption technologyEncryption technology
Encryption technology
Sivakumarraju Gangaraju
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
Raj vardhan
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
Iasir Journals
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
todd921
 
NEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIONEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIOMartin Nemzow
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdf
HODCA1
 
Temporal database, Multimedia database, Access control, Flow control
Temporal database, Multimedia database, Access  control, Flow controlTemporal database, Multimedia database, Access  control, Flow control
Temporal database, Multimedia database, Access control, Flow control
Pooja Dixit
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
Green University of Bangladesh
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
Green University of Bangladesh
 
A critique on traditional file system vs databases
A critique on traditional file system vs databasesA critique on traditional file system vs databases
A critique on traditional file system vs databases
Shallote Dsouza
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
shaik faroq
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
Marisela Stone
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
Surkhab Shelly
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
Chinnu Shimna
 

Similar to Database technology (20)

Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
 
NEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIONEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIO
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdf
 
Temporal database, Multimedia database, Access control, Flow control
Temporal database, Multimedia database, Access  control, Flow controlTemporal database, Multimedia database, Access  control, Flow control
Temporal database, Multimedia database, Access control, Flow control
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
 
A critique on traditional file system vs databases
A critique on traditional file system vs databasesA critique on traditional file system vs databases
A critique on traditional file system vs databases
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
 
Database security
Database securityDatabase security
Database security
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
 

More from Fara Jumakhon

What is internet
What is internetWhat is internet
What is internet
Fara Jumakhon
 
Social networks
Social networksSocial networks
Social networks
Fara Jumakhon
 
Mobile techmology
Mobile techmologyMobile techmology
Mobile techmology
Fara Jumakhon
 
Internet of things
Internet of thingsInternet of things
Internet of things
Fara Jumakhon
 
Digital dash board
Digital dash boardDigital dash board
Digital dash board
Fara Jumakhon
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Fara Jumakhon
 

More from Fara Jumakhon (8)

What is internet
What is internetWhat is internet
What is internet
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Social networks
Social networksSocial networks
Social networks
 
O pen source
O pen sourceO pen source
O pen source
 
Mobile techmology
Mobile techmologyMobile techmology
Mobile techmology
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Digital dash board
Digital dash boardDigital dash board
Digital dash board
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

Database technology

  • 2. Database Technology  Database is a computer based record keeping system which is used to record maintain and retrieve the data. It is an organized collection of interrelated data. A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
  • 3. Database Security  Database security deals with all various aspects of protecting the database content, its owners, and its users. It ranges from protection from intentional unauthorized database uses to unintentional database accesses by unauthorized entities (e.g., a person or a computer program). Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information).
  • 4.  Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.  Data security in general deals with protecting specific chunks of data, both physically (i.e., from corruption, or destruction, or removal; e.g., see physical security), or the interpretation of them, or parts of them to meaningful information (e.g., by looking at the strings of bits that they comprise, concluding specific valid credit- card numbers; e.g., see data encryption).
  • 5. Types of Database.  Centralized Database  In Centralized database system, all data is stored at a single site. It offers a great control in accessing and updating data. However failure chances are high because the system depends on the availability of resources at the central site
  • 6.
  • 7.  Distributed Database  In Distributed Database system, the database is stored on several computers. Computers in a distributed system may communicate with one another through internet/intranet/telephone lines etc. Most of the distributed systems will be geographically separated and managed. Distributed databases can also separately be administered