science fair research paper example, chicago style research paper example, free research paper example, research paper example format,
Monday, August 19, 2019
Database Management System vs Information Retrieval System :: IT Essays
1. Differentiate Between Database Management System And Information Retrieval System By Focusing On Their Functionalities. Database Management System According to Modern Database Management eight edition, by Jeffrey A. Hoffer, Mary B. Prescott and Fred R. McFadden database management system (DBMS) is define as a software system that is used to create, maintain, and provide controlled access to user databases. Support Concurrent Updates Concurrent updates occur when various users make updates to the database at the same time. Supporting concurrent updates is also critical to database management as this component ensures that updates are made appropriately and the end result is precise. Without DBMS interference important data could be lost and or imprecise data stored. DBMS uses features to bear concurrent updates such as batch processing, locking, two-phase locking, and time stamping to help make certain that updates are done correctly. Again, the user is not alert all this is incident as it is the database management systemââ¬â¢s liability to make sure all updates are stored appropriately Recovery of Data In the event a misfortune occurs, DBMS must offer ways to pull through a database so that data is not eternally lost. There are times computers may break down, a fire or other natural disaster may occur, or a user may enter inaccurate information invalidating or making records conflicting If the database is cracked or spoiled in any way, the DBMS must be able to recover the correct state of the database, and this process is called Recovery. The easiest way to do this is to make standard backups of information. This can be done at a set controlled time so in the event a catastrophe occurs, the database can be restored to the state that it was last at prior to backup. Security Security is the avoidance of illegal users accessing the database. DBMS uses features such as encryption, authentication, authorization and views to provide security to the database. Encryption is when DBMS converts the data in a database to an unreadable format. No illegal person trying to access this information will be able to read it. Authorized users will be able to see it in normal form. Authentication is a technique in which the database officer can identify the person accessing the database. Authorized users are given passwords and successful entry of a legitimate password will allow the user entry into the database, if a password is not effectively entered, the user will be denied access. Authorization is a set of rules that the database administrator (DBA) sets up to specify levels of practice that individuals or groups are allowed to have.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.