SlideShare a Scribd company logo
Components of DBMS
Properties of DBMS
Version 1.1
Rushdi Shams, Dept of CSE, KUET 1
File Processing System
Rushdi Shams, Dept of CSE, KUET 2
Checking
Account
Programs
Auto
Loan
Programs
Savings
Account
Programs
Checking
Account
Data
Files
Savings
Account
Data
Files
Auto Loan
Data
Files
Database Processing System
Rushdi Shams, Dept of CSE, KUET 3
Database
Management
System
Checking
Account
Programs
Auto
Loan
Programs Savings
Account
Programs
Database
How DBMS Works
Rushdi Shams, Dept of CSE, KUET 4
SQL PLUS
Fetching Code
Code in HDD
ORACLE DBMS
Plan-> Runs-> Compiles ->Result set
Code
fetched
How DBMS Works
Rushdi Shams, Dept of CSE, KUET 5
JAVA Code
{
String( “select
…”);
}
Fetching Code
Code
fetched
ORACLE DBMS
Plan-> Runs-> Compiles ->Result set
JDBC
Components of DBMS
1. Models
 Hierarchical model
 Network model and
 Relational model
Rushdi Shams, Dept of CSE, KUET 6
Components of DBMS (continued)
2. Data structures
This defines the properties of several
aspects of rows/records and
columns/fields, etc
Rushdi Shams, Dept of CSE, KUET 7
Components of DBMS (continued)
3. A query language
allow users to interactively interrogate the
database, analyse its data and update it
according to the user privileges on data
so, you can say query language actually
provides
 Analysis on data
 Interrogation on data
 Security on data
Rushdi Shams, Dept of CSE, KUET 8
Components of DBMS (continued)
4. Transaction Mechanism
Transaction means data moving between two
or more databases. It provides ACID property.
In case of database systems, ACID stands for
 Atomicity
 Consistency
 Isolation and
 Durability
Rushdi Shams, Dept of CSE, KUET 9
Components of DBMS (continued)
 Atomicity
It is the ability of the DBMS that ensures
either all of the transactions take place or
none of them take place!
Kind of weird, huh? Well, let me give an
example. If a bank account is debited,
another bank account must be credited-
that is called atomicity!
Rushdi Shams, Dept of CSE, KUET 10
Components of DBMS (continued)
 Consistency
Every database has some rules according to
the organization to which it belongs. This
property ensures that the databases are in
legal state after a transaction takes place.
For example, if a bank says that its client’s
account balance can never be negative,
then no such transaction will take place that
makes a balance negative.
Rushdi Shams, Dept of CSE, KUET 11
Components of DBMS (continued)
 Isolation
This property ensures that no other operation
can intervene the transaction operation.
For example, a bank manager, during a
transaction should be able to see balance of
one account, not on both.
This is the most relaxed option in ACID
properties.
Rushdi Shams, Dept of CSE, KUET 12
Components of DBMS (continued)
 Durability
This property ensures that once a
transaction takes place, it cannot be
undone.
when an account to account transfer takes
place, after completion, it should notify the
user that transaction successfully done and
you cannot rewind that!
Rushdi Shams, Dept of CSE, KUET 13
Properties of Database
 Data Sharing
 Data Integration
 Data Security
 Data Abstraction
 Data Independence
Rushdi Shams, Dept of CSE, KUET 14
Data Sharing
 Do you think records are kept to be used by
only one person? Or, should it be shared, so
that we can use it?
Rushdi Shams, Dept of CSE, KUET 15
Data Integration
 This implies that a database should be a
collection of data which, at least ideally, has
no redundant data.
 Redundant data is unnecessarily duplicated
data.
 A data value is redundant when an attribute
has two or more identical values.
 A data value is redundant if you can delete
it without information being lost.
Rushdi Shams, Dept of CSE, KUET 16
Data Integrity
 The database should accurately reflect the
universe of discourse that it is attempting to
model.
 if relationships exist in the real world
between objects represented by data in a
database then changes made to one
partner in such a relationship should be
accurately reflected in changes made to
other partners in that relationship
Rushdi Shams, Dept of CSE, KUET 17
Data Security
 One of the major ways of ensuring the
integrity of a database is by restricting
access – in other words, securing the
database.
 Define a set of authorised users of the
whole, or more usually parts, of the
database.
Rushdi Shams, Dept of CSE, KUET 18
Data Abstraction
 An academic database is meant to record
relevant details of university activity. We
say relevant, because no database can store
all the properties of real-world objects. A
database is therefore an abstraction of the
real world
Rushdi Shams, Dept of CSE, KUET 19
Data Independence
 If a change is made to some part of the
underlying database, no application
programs using affected data should need
to be changed.
 Also, if a change is made to some part of an
application system then this should not
affect the structure of the underlying data
used by the application.
Rushdi Shams, Dept of CSE, KUET 20

More Related Content

What's hot

INTRODUCTION TO DATABASE
INTRODUCTION TO DATABASEINTRODUCTION TO DATABASE
INTRODUCTION TO DATABASE
Muhammad Bilal Tariq
 
The database applications
The database applicationsThe database applications
The database applications
Dolat Ram
 
Mis assignment (database)
Mis assignment (database)Mis assignment (database)
Mis assignment (database)
Muhammad Sultan Bhatti
 
Dbms and sqlpptx
Dbms and sqlpptxDbms and sqlpptx
Dbms and sqlpptx
thesupermanreturns
 
Database introduction
Database introductionDatabase introduction
Database introduction
Harry Potter
 
database
databasedatabase
Database Management Systems - Management Information System
Database Management Systems - Management Information SystemDatabase Management Systems - Management Information System
Database Management Systems - Management Information System
Nijaz N
 
Intro to Database Design
Intro to Database DesignIntro to Database Design
Intro to Database Design
Sondra Willhite
 
00137
0013700137
00137
prashnant
 
Assignment on dbms
Assignment on dbmsAssignment on dbms
Assignment on dbms
Mohd Arif
 
introduction to database
 introduction to database introduction to database
introduction to database
Akif shexi
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1
askme
 
Computer lecture (1) m.nasir
Computer lecture (1) m.nasirComputer lecture (1) m.nasir
Computer lecture (1) m.nasir
Muhammad Nasir
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
M.Zalmai Rahmani
 
Library management
Library managementLibrary management
Library management
farouq umar
 
File Processing System
File Processing SystemFile Processing System
File Processing System
DMMMSU-SLUC
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
Dr. C.V. Suresh Babu
 
ITI015En-The evolution of databases (I)
ITI015En-The evolution of databases (I)ITI015En-The evolution of databases (I)
ITI015En-The evolution of databases (I)
Huibert Aalbers
 
Chapter 1 - testing
Chapter 1 - testing Chapter 1 - testing
Chapter 1 - testing
jlope438
 

What's hot (19)

INTRODUCTION TO DATABASE
INTRODUCTION TO DATABASEINTRODUCTION TO DATABASE
INTRODUCTION TO DATABASE
 
The database applications
The database applicationsThe database applications
The database applications
 
Mis assignment (database)
Mis assignment (database)Mis assignment (database)
Mis assignment (database)
 
Dbms and sqlpptx
Dbms and sqlpptxDbms and sqlpptx
Dbms and sqlpptx
 
Database introduction
Database introductionDatabase introduction
Database introduction
 
database
databasedatabase
database
 
Database Management Systems - Management Information System
Database Management Systems - Management Information SystemDatabase Management Systems - Management Information System
Database Management Systems - Management Information System
 
Intro to Database Design
Intro to Database DesignIntro to Database Design
Intro to Database Design
 
00137
0013700137
00137
 
Assignment on dbms
Assignment on dbmsAssignment on dbms
Assignment on dbms
 
introduction to database
 introduction to database introduction to database
introduction to database
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1
 
Computer lecture (1) m.nasir
Computer lecture (1) m.nasirComputer lecture (1) m.nasir
Computer lecture (1) m.nasir
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 
Library management
Library managementLibrary management
Library management
 
File Processing System
File Processing SystemFile Processing System
File Processing System
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
 
ITI015En-The evolution of databases (I)
ITI015En-The evolution of databases (I)ITI015En-The evolution of databases (I)
ITI015En-The evolution of databases (I)
 
Chapter 1 - testing
Chapter 1 - testing Chapter 1 - testing
Chapter 1 - testing
 

Viewers also liked

Data base management system
Data base management systemData base management system
Data base management system
Navneet Jingar
 
Lect 21 components_of_database_management_system
Lect 21 components_of_database_management_systemLect 21 components_of_database_management_system
Lect 21 components_of_database_management_system
nadine016
 
Database management systems components
Database management systems componentsDatabase management systems components
Database management systems components
muhammad bilal
 
Data Base Management System
Data Base Management SystemData Base Management System
Data Base Management System
Dr. C.V. Suresh Babu
 
data resource management
 data resource management data resource management
data resource management
soodsurbhi123
 
Database management-system
Database management-systemDatabase management-system
Database management-system
kalasalingam
 
C fundamentals
C fundamentalsC fundamentals
C fundamentals
Vikash Dhal
 
Statistics And the Query Optimizer
Statistics And the Query OptimizerStatistics And the Query Optimizer
Statistics And the Query Optimizer
Grant Fritchey
 
Vnsispl dbms concepts_ch1
Vnsispl dbms concepts_ch1Vnsispl dbms concepts_ch1
Vnsispl dbms concepts_ch1
sriprasoon
 
Copper: A high performance workflow engine
Copper: A high performance workflow engineCopper: A high performance workflow engine
Copper: A high performance workflow engine
dmoebius
 
Overview of stinger interactive query for hive
Overview of stinger   interactive query for hiveOverview of stinger   interactive query for hive
Overview of stinger interactive query for hive
David Kaiser
 
Database component in mule
Database component in muleDatabase component in mule
Database component in mule
Rajkattamuri
 
Evloution in processors
Evloution in processorsEvloution in processors
Evloution in processors
muhammad bilal
 
Ooluk Data Dictionary Manager
Ooluk Data Dictionary ManagerOoluk Data Dictionary Manager
Ooluk Data Dictionary Manager
Siddhesh Prabhu
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
Apex
 
Buffer management --database buffering
Buffer management --database buffering Buffer management --database buffering
Buffer management --database buffering
julia121214
 
Indexing and Query Optimizer (Richard Kreuter)
Indexing and Query Optimizer (Richard Kreuter)Indexing and Query Optimizer (Richard Kreuter)
Indexing and Query Optimizer (Richard Kreuter)
MongoDB
 
C1 basic concepts of database
C1 basic concepts of databaseC1 basic concepts of database
C1 basic concepts of database
Wan Azni
 
Lecture 04 data resource management
Lecture 04 data resource managementLecture 04 data resource management
Lecture 04 data resource management
Dynamic Research Centre & institute
 
Database Management system
Database Management systemDatabase Management system
Database Management system
Vijay Thorat
 

Viewers also liked (20)

Data base management system
Data base management systemData base management system
Data base management system
 
Lect 21 components_of_database_management_system
Lect 21 components_of_database_management_systemLect 21 components_of_database_management_system
Lect 21 components_of_database_management_system
 
Database management systems components
Database management systems componentsDatabase management systems components
Database management systems components
 
Data Base Management System
Data Base Management SystemData Base Management System
Data Base Management System
 
data resource management
 data resource management data resource management
data resource management
 
Database management-system
Database management-systemDatabase management-system
Database management-system
 
C fundamentals
C fundamentalsC fundamentals
C fundamentals
 
Statistics And the Query Optimizer
Statistics And the Query OptimizerStatistics And the Query Optimizer
Statistics And the Query Optimizer
 
Vnsispl dbms concepts_ch1
Vnsispl dbms concepts_ch1Vnsispl dbms concepts_ch1
Vnsispl dbms concepts_ch1
 
Copper: A high performance workflow engine
Copper: A high performance workflow engineCopper: A high performance workflow engine
Copper: A high performance workflow engine
 
Overview of stinger interactive query for hive
Overview of stinger   interactive query for hiveOverview of stinger   interactive query for hive
Overview of stinger interactive query for hive
 
Database component in mule
Database component in muleDatabase component in mule
Database component in mule
 
Evloution in processors
Evloution in processorsEvloution in processors
Evloution in processors
 
Ooluk Data Dictionary Manager
Ooluk Data Dictionary ManagerOoluk Data Dictionary Manager
Ooluk Data Dictionary Manager
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
 
Buffer management --database buffering
Buffer management --database buffering Buffer management --database buffering
Buffer management --database buffering
 
Indexing and Query Optimizer (Richard Kreuter)
Indexing and Query Optimizer (Richard Kreuter)Indexing and Query Optimizer (Richard Kreuter)
Indexing and Query Optimizer (Richard Kreuter)
 
C1 basic concepts of database
C1 basic concepts of databaseC1 basic concepts of database
C1 basic concepts of database
 
Lecture 04 data resource management
Lecture 04 data resource managementLecture 04 data resource management
Lecture 04 data resource management
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 

Similar to L8 components and properties of dbms

Introduction To Database.ppt
Introduction To Database.pptIntroduction To Database.ppt
Introduction To Database.ppt
RithikRaj25
 
Advanced Database Systems CS352Unit 2 Individual Project.docx
Advanced Database Systems CS352Unit 2 Individual Project.docxAdvanced Database Systems CS352Unit 2 Individual Project.docx
Advanced Database Systems CS352Unit 2 Individual Project.docx
nettletondevon
 
Dbms unit i
Dbms unit iDbms unit i
Dbms unit i
Arnav Chowdhury
 
RDBMS-b2_geetanjali.pptx
RDBMS-b2_geetanjali.pptxRDBMS-b2_geetanjali.pptx
RDBMS-b2_geetanjali.pptx
GeetanjaliRajput6
 
11 Database Concepts
11 Database Concepts11 Database Concepts
11 Database Concepts
Praveen M Jigajinni
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
shaik faroq
 
Database management systems
Database management systemsDatabase management systems
Database management systems
Ravindra Singh Gohil
 
Database workshop - Encode | Bhuvan Gandhi | Vishwas Ganatra
Database workshop - Encode | Bhuvan Gandhi | Vishwas GanatraDatabase workshop - Encode | Bhuvan Gandhi | Vishwas Ganatra
Database workshop - Encode | Bhuvan Gandhi | Vishwas Ganatra
Bhuvan Gandhi
 
Transaction Management
Transaction ManagementTransaction Management
Transaction Management
A. S. M. Shafi
 
INTRODUCTION TO DATABASE
INTRODUCTION TO DATABASEINTRODUCTION TO DATABASE
INTRODUCTION TO DATABASE
CS_GDRCST
 
Unit iii dbms
Unit iii dbmsUnit iii dbms
Unit iii dbms
Arnav Chowdhury
 
PostgreSQL as Enterprise Solution v1.1.pdf
PostgreSQL as Enterprise Solution v1.1.pdfPostgreSQL as Enterprise Solution v1.1.pdf
PostgreSQL as Enterprise Solution v1.1.pdf
Equnix Business Solutions
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
Girish. N. Raghavan
 
Ch1
Ch1Ch1
Ch1
Ch1Ch1
L7 data model and dbms architecture
L7  data model and dbms architectureL7  data model and dbms architecture
L7 data model and dbms architecture
Rushdi Shams
 
27 fcs157al2
27 fcs157al227 fcs157al2
27 fcs157al2
CHANDRA BHUSHAN
 
Data base management systems ppt
Data base management systems pptData base management systems ppt
Data base management systems ppt
suthi
 
Assign 1
Assign 1Assign 1
Assign 1
guestffcfdd
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 

Similar to L8 components and properties of dbms (20)

Introduction To Database.ppt
Introduction To Database.pptIntroduction To Database.ppt
Introduction To Database.ppt
 
Advanced Database Systems CS352Unit 2 Individual Project.docx
Advanced Database Systems CS352Unit 2 Individual Project.docxAdvanced Database Systems CS352Unit 2 Individual Project.docx
Advanced Database Systems CS352Unit 2 Individual Project.docx
 
Dbms unit i
Dbms unit iDbms unit i
Dbms unit i
 
RDBMS-b2_geetanjali.pptx
RDBMS-b2_geetanjali.pptxRDBMS-b2_geetanjali.pptx
RDBMS-b2_geetanjali.pptx
 
11 Database Concepts
11 Database Concepts11 Database Concepts
11 Database Concepts
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
 
Database management systems
Database management systemsDatabase management systems
Database management systems
 
Database workshop - Encode | Bhuvan Gandhi | Vishwas Ganatra
Database workshop - Encode | Bhuvan Gandhi | Vishwas GanatraDatabase workshop - Encode | Bhuvan Gandhi | Vishwas Ganatra
Database workshop - Encode | Bhuvan Gandhi | Vishwas Ganatra
 
Transaction Management
Transaction ManagementTransaction Management
Transaction Management
 
INTRODUCTION TO DATABASE
INTRODUCTION TO DATABASEINTRODUCTION TO DATABASE
INTRODUCTION TO DATABASE
 
Unit iii dbms
Unit iii dbmsUnit iii dbms
Unit iii dbms
 
PostgreSQL as Enterprise Solution v1.1.pdf
PostgreSQL as Enterprise Solution v1.1.pdfPostgreSQL as Enterprise Solution v1.1.pdf
PostgreSQL as Enterprise Solution v1.1.pdf
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 
Ch1
Ch1Ch1
Ch1
 
Ch1
Ch1Ch1
Ch1
 
L7 data model and dbms architecture
L7  data model and dbms architectureL7  data model and dbms architecture
L7 data model and dbms architecture
 
27 fcs157al2
27 fcs157al227 fcs157al2
27 fcs157al2
 
Data base management systems ppt
Data base management systems pptData base management systems ppt
Data base management systems ppt
 
Assign 1
Assign 1Assign 1
Assign 1
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 

More from Rushdi Shams

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
Rushdi Shams
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
Rushdi Shams
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
Rushdi Shams
 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processing
Rushdi Shams
 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: Parsing
Rushdi Shams
 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translation
Rushdi Shams
 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translation
Rushdi Shams
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
Rushdi Shams
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
Rushdi Shams
 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logic
Rushdi Shams
 
L15 fuzzy logic
L15  fuzzy logicL15  fuzzy logic
L15 fuzzy logic
Rushdi Shams
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
Rushdi Shams
 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
Rushdi Shams
 
First order logic
First order logicFirst order logic
First order logic
Rushdi Shams
 
Belief function
Belief functionBelief function
Belief function
Rushdi Shams
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
Rushdi Shams
 
L4 vpn
L4  vpnL4  vpn
L4 vpn
Rushdi Shams
 
L3 defense
L3  defenseL3  defense
L3 defense
Rushdi Shams
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
Rushdi Shams
 
L1 phishing
L1  phishingL1  phishing
L1 phishing
Rushdi Shams
 

More from Rushdi Shams (20)

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processing
 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: Parsing
 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translation
 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translation
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logic
 
L15 fuzzy logic
L15  fuzzy logicL15  fuzzy logic
L15 fuzzy logic
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
 
First order logic
First order logicFirst order logic
First order logic
 
Belief function
Belief functionBelief function
Belief function
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
 
L4 vpn
L4  vpnL4  vpn
L4 vpn
 
L3 defense
L3  defenseL3  defense
L3 defense
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
 
L1 phishing
L1  phishingL1  phishing
L1 phishing
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

L8 components and properties of dbms

  • 1. Components of DBMS Properties of DBMS Version 1.1 Rushdi Shams, Dept of CSE, KUET 1
  • 2. File Processing System Rushdi Shams, Dept of CSE, KUET 2 Checking Account Programs Auto Loan Programs Savings Account Programs Checking Account Data Files Savings Account Data Files Auto Loan Data Files
  • 3. Database Processing System Rushdi Shams, Dept of CSE, KUET 3 Database Management System Checking Account Programs Auto Loan Programs Savings Account Programs Database
  • 4. How DBMS Works Rushdi Shams, Dept of CSE, KUET 4 SQL PLUS Fetching Code Code in HDD ORACLE DBMS Plan-> Runs-> Compiles ->Result set Code fetched
  • 5. How DBMS Works Rushdi Shams, Dept of CSE, KUET 5 JAVA Code { String( “select …”); } Fetching Code Code fetched ORACLE DBMS Plan-> Runs-> Compiles ->Result set JDBC
  • 6. Components of DBMS 1. Models  Hierarchical model  Network model and  Relational model Rushdi Shams, Dept of CSE, KUET 6
  • 7. Components of DBMS (continued) 2. Data structures This defines the properties of several aspects of rows/records and columns/fields, etc Rushdi Shams, Dept of CSE, KUET 7
  • 8. Components of DBMS (continued) 3. A query language allow users to interactively interrogate the database, analyse its data and update it according to the user privileges on data so, you can say query language actually provides  Analysis on data  Interrogation on data  Security on data Rushdi Shams, Dept of CSE, KUET 8
  • 9. Components of DBMS (continued) 4. Transaction Mechanism Transaction means data moving between two or more databases. It provides ACID property. In case of database systems, ACID stands for  Atomicity  Consistency  Isolation and  Durability Rushdi Shams, Dept of CSE, KUET 9
  • 10. Components of DBMS (continued)  Atomicity It is the ability of the DBMS that ensures either all of the transactions take place or none of them take place! Kind of weird, huh? Well, let me give an example. If a bank account is debited, another bank account must be credited- that is called atomicity! Rushdi Shams, Dept of CSE, KUET 10
  • 11. Components of DBMS (continued)  Consistency Every database has some rules according to the organization to which it belongs. This property ensures that the databases are in legal state after a transaction takes place. For example, if a bank says that its client’s account balance can never be negative, then no such transaction will take place that makes a balance negative. Rushdi Shams, Dept of CSE, KUET 11
  • 12. Components of DBMS (continued)  Isolation This property ensures that no other operation can intervene the transaction operation. For example, a bank manager, during a transaction should be able to see balance of one account, not on both. This is the most relaxed option in ACID properties. Rushdi Shams, Dept of CSE, KUET 12
  • 13. Components of DBMS (continued)  Durability This property ensures that once a transaction takes place, it cannot be undone. when an account to account transfer takes place, after completion, it should notify the user that transaction successfully done and you cannot rewind that! Rushdi Shams, Dept of CSE, KUET 13
  • 14. Properties of Database  Data Sharing  Data Integration  Data Security  Data Abstraction  Data Independence Rushdi Shams, Dept of CSE, KUET 14
  • 15. Data Sharing  Do you think records are kept to be used by only one person? Or, should it be shared, so that we can use it? Rushdi Shams, Dept of CSE, KUET 15
  • 16. Data Integration  This implies that a database should be a collection of data which, at least ideally, has no redundant data.  Redundant data is unnecessarily duplicated data.  A data value is redundant when an attribute has two or more identical values.  A data value is redundant if you can delete it without information being lost. Rushdi Shams, Dept of CSE, KUET 16
  • 17. Data Integrity  The database should accurately reflect the universe of discourse that it is attempting to model.  if relationships exist in the real world between objects represented by data in a database then changes made to one partner in such a relationship should be accurately reflected in changes made to other partners in that relationship Rushdi Shams, Dept of CSE, KUET 17
  • 18. Data Security  One of the major ways of ensuring the integrity of a database is by restricting access – in other words, securing the database.  Define a set of authorised users of the whole, or more usually parts, of the database. Rushdi Shams, Dept of CSE, KUET 18
  • 19. Data Abstraction  An academic database is meant to record relevant details of university activity. We say relevant, because no database can store all the properties of real-world objects. A database is therefore an abstraction of the real world Rushdi Shams, Dept of CSE, KUET 19
  • 20. Data Independence  If a change is made to some part of the underlying database, no application programs using affected data should need to be changed.  Also, if a change is made to some part of an application system then this should not affect the structure of the underlying data used by the application. Rushdi Shams, Dept of CSE, KUET 20