Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
OF
“DBMS”
Course Code: CAP301
SUBMITTED BY:
submitted to:
RAJIV RAJAN LECT: RITU RAI
RD3804B2
M.C.A 3sem
1.QNS Discuss the problems that are caused by data redundancies? Can
data redundancies be completely eliminated when the database approach is
used? Why or why not?
ANS: The same piece of information may be stored in two or more files. For example – the
particular of an individual who may be a customer or an employee may be stored in two or more
files. Some of these information may be changing., such as the address, the pay drawn, etc. it is
therefore quite possible that while the address in the master file for one application has been
updated the address in the master file for one application has been updated the address in the
master file for another application may have not been. It may not also be easy for the computer
based system to even find out as to in how many files the repeating items such as the address if
occurring.
The solution there for is to avoid this data redundancy and the keeping of multiple copies of the
same information and replace it by a system where the address is stored at just one place
physically, and is accessible to all applications from this itself. Reduction of Redundancies:
centralized control of data by the DBA avoids unnecessary duplication of data and effectively
reduce the total amount of data in a large mass of data. Another advantage of avoiding
duplication is the elimination of the inconsistencies that tend to be present in redundant data
files. Any redundancies that exist in the DBMS are controlled and system ensures that these
multiple copies are consistent.
ANS: There are several reasons for spending money, time, and effort on data protection. The
primary one is minimizing financial loss, followed by compliance with regulatory requirements,
maintaining high levels of productivity, and meeting customer expectations. As computers have
become more and more integral to business operations, data requirements from regulators such
as the U.S. Securities and Exchange Commission (SEC), as well as from customers, have been
imposed on businesses. There is a clear expectation that important data be available 24 hours a
day, 7 days a week, 365 days a year. Without a working data protection strategy, that isn't
possible.
The single most important reason to implement data protection strategies is fear of financial loss.
Data is recognized as an important corporate asset that needs to be safeguarded. Loss of
information can lead to direct financial losses, such as lost sales, fines, or monetary judgments. It
can also cause indirect losses from the effects of a drop in investor confidence or customers
fleeing to competitors. Worse yet, stolen or altered data can result in financial effects that are not
known to the company until much later. At that point, less can be done about it, magnifying the
negative resultsA third driver, which does not get the attention of the press but is important to
organizations nonetheless, is productivity. Loss of important data lowers overall productivity, as
employees have to deal with time-consuming customer issues without the aid of computer
databases. Data loss also results in application failures and similar system problems, making it
difficult for people to do their jobs. A poor data protection strategy may leave people waiting for
long periods of time for systems to be restored after a failure. During that time, employees may
be idle or able to work only in a reduced capacity, further diminishing productivity.
• Data is integrated: means all related data on different computers are linked in
such away that all data are linked with each other.
• Data duplication is reduced : As data is integrated ,present on different locations
so chances of data duplication are much reduced and date is updated form.
RESPONSIBILITIES
Designing & creating relational database objects such as tables, views & indexes; Supporting and
maintaining the environment a relational database requires to properly function (i.e., security,
recovery, backup & reorganizations) ; Ensuring that relational database access code performs
efficiently (i.e., SQL review, database monitoring).
Developing & maintaining naming standards for database objects such as tablespaces, tables,
indexes & views Participating in database migration reviews Assisting in product installation &
reviewing initial installation options; for Oracle, the Central DBA will assist in product
installation and specify initial installation options roviding functional guidance to the systems
programmer & the operator. For Oracle, the Central DBA will provide this functional guidance
to the Unix System Administrator. Evaluating & testing DBMS related software
Develop operational procedures Supporting, monitoring & tuning the database subsystems &
instances; for Oracle this includes starting and stopping the instances, listeners, and intelligent
agents Participate in selecting database management support tools
Developing & implementing database administration policies & procedures including subsystem
or instance security guidelines
execute to help ensure that an errant managed program will not unduly affect the execution of
another managed program.
However, despite the many resources provided by the .NET Framework that act to develop and
manage executable code, third parties that receive applications may be unfamiliar with certain
functions of the environment, and may spend much time and effort in customizing applications.
For example, they may be unfamiliar with the methodology or structure of the underlying code
Additionally, the third party may be a customer of the application provider, and may wish to
In some embodiments, the system may customize applications to be used in ATM machines. For
example, the applications may display information to users of ATMs, may receive input from the
users, may transmit and receive messages to and from host systems, may detect events that have
or have not occurred at the ATMs, and so on. The applications may interact with or support
various “translets.” A translet is a component that provides one or more types of services to a
user of an ATM. For example, a translet may provide account services, card or member services,
financial supplies services, device management services, key or security services, and other
services required or utilized during transactions or attempted transactions between a user and an
ATM. The system, therefore, may enable a customer to modify the functionality of a translet or
of selected translets, or may enable a customer to modify the functionality of an entire
application.
In some embodiments, the system provides a wizard to a user that guides the user through the
customization of applications. The user does not have to write any code, as some or all of the
code is generated by the wizard and implemented into the code of the application. The system
enables a user to quickly and easily adapt, modify and/or customize a generic base application to
meet the needs of the user, among other benefits.
5.QNS: Discuss the characteristics of relations that make them different from
ordinary tables and files.
Ans:Tables and files have some particular order but relations don’t. ordinary tables
and files are static while a relational database has data that
is dependent on the data that is entered in tuples that are related to that
attribute. in the ordinary tables and files, there are no constraints
related to the related data and a user could input whatever they wanted.
Entity Integrity
Domain Integrity
Referential integrity
User-Defined Integrity
PRIMARY KEY
UNIQUE
FOREIGN KEY
CHECK
NOT NULL