SlideShare a Scribd company logo
Introduction
 Database integral part of our day to day life
 Collection of related database
 Database Management System : software
managing and controlling access to the
database.
 Database system : collection of application
interracting with database
Example of use of database systems
A database is accessed when :
 Purshasing in a supermarket ( item price)
 Purchase using credit cards ( valid cards)
 Inquiries about a holliday (flight details)
 Make a loan (library)
 Rent video ( detail info on each video)
 Online bookstore( book details)
Sample data
Dtabase in the dev cycle
Project
Identifcation
and Selection
Project
Initiation
and Planning
Analysis
Logical
Design
Physical
Design
Implementation
Maintenance
Database
 A repository of data simultaneously used by many
users (a shared ressource).
 Collection of logically related data.
 Description of this data (data dictionary)
 BDMS
Software interracting with :
 Users
 Application programs
 database
 BDMS
Software interracting with :
 Users
 Application programs
 Database
DBMS allows users (using a query language):
 Insert
 Update
 Delete
 Retrive data from DB
Database application programs
Computer program that allow
users to interact with the DB
through DBMS.
DBMS environment

Hardware :Computer systems that DBMS and
application programs run on.

Software: DBMS,application programs, operating
system, network software(if DBMS used over
network).

Data ( operational data and meta-data)

Procedures: instruction and rules that govern use of
database

People: DB designer, administrators , programmers
and end users
Database environment
DBMS architecture
2 layer architecture Client-Server
 The client that runs the application and the server that
handles the database back-end
 Multiple users able to access the DB simultanousely.
 Server is processing data while the client for business
logic and presentation.
2-Tier Architecture
DBMS architecture
3 layer architecture
 User Interface layer ( runs on the user´s client)
 Business logic (middle layer) and data processing
layer. Runs on a server called ”application server”.
 DBMS ( store data ) , may run on a separate server
called ”database server”
Database introduction
3 layer architecture advantages
 Thin client (less hardware) , client only handling
presentation logic.This means a little communication
needed between the client(browser) and the middle tier.
 Separating the core business logic from the database
functions
 Modularity : Easy to modify or replace one tier without
affecting the other tiers
 Easier load balancing
 Maps quite naturally to the web environment
 Security : middle tier protecting the DB.
 Scalabale : add as many middle tier as needed
Functions of a DBMS
 Data storage , retrieval and update
 A user-accessible Catalog
 Hold data about the structure of database , users , applications and so on
 Transaction support
 Ensure that all the updates are made or that none of them are made
 Concurrency control services
 Enable many users to access shared data concurrently
 Recovery services
 When transaction fails, DB revovered to a consistent state
Functions of a DBMS
 Autorization services
 Only special part could have access to info
 Support for data communication
 Terminal at remote locations can communicate with host of DBMS through
network
 Integrity Services
 Stored data are consistent and correct
 Services to promote Data Independence
 Utility Services
 Utility program help manage the DB effectively
Advantages of DBMS
 Control of data redundancy (duplication)
 Eliminate redundency where possible ,
 Data consistency
 Data stored in more than once , system can ensure that all copies
of the data are kept consistent
 Sharing of data
 By all authorized users
 Improved data integrity
 Rules that DB is not permitted to violate
 User define data and DBMS enforce it
 Improved maintenance through data independence
 Make application immune to changes in data description
Ad

More Related Content

What's hot (15)

Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
Bosch Software Innovations
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
Apex
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
Ravinder Kamboj
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
Papan Sarkar
 
Users of dbms
Users of dbmsUsers of dbms
Users of dbms
Preet Hanspal
 
A database management system
A database management systemA database management system
A database management system
ghulam120
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
Ghanshyam Patel
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
guest8fdbdd
 
Database
DatabaseDatabase
Database
santoshsaini22
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
Visakh V
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
Raj vardhan
 
Client server computing
Client server computingClient server computing
Client server computing
Student
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
Cloudbells.com
 
1. intro
1. intro1. intro
1. intro
khoahuy82
 
Data Base Management
Data Base ManagementData Base Management
Data Base Management
Apex
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
Ravinder Kamboj
 
Client Server Architecture in Database Management System
Client Server Architecture in Database Management SystemClient Server Architecture in Database Management System
Client Server Architecture in Database Management System
Papan Sarkar
 
A database management system
A database management systemA database management system
A database management system
ghulam120
 
Databases And Database Management System
Databases And Database Management  SystemDatabases And Database Management  System
Databases And Database Management System
Ghanshyam Patel
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 
Slide 1 introduction to dbms
Slide 1 introduction to dbmsSlide 1 introduction to dbms
Slide 1 introduction to dbms
Visakh V
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
Raj vardhan
 
Client server computing
Client server computingClient server computing
Client server computing
Student
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
Cloudbells.com
 

Viewers also liked (18)

How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
James Wong
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby intro
James Wong
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
James Wong
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
James Wong
 
Maven
MavenMaven
Maven
James Wong
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
James Wong
 
Hashfunction
HashfunctionHashfunction
Hashfunction
James Wong
 
Java
JavaJava
Java
James Wong
 
Computer security
Computer securityComputer security
Computer security
James Wong
 
Access data connection
Access data connectionAccess data connection
Access data connection
James Wong
 
Data preparation
Data preparationData preparation
Data preparation
James Wong
 
Test driven development
Test driven developmentTest driven development
Test driven development
James Wong
 
Text categorization as a graph
Text categorization as a graphText categorization as a graph
Text categorization as a graph
James Wong
 
Game theory
Game theoryGame theory
Game theory
James Wong
 
List and iterator
List and iteratorList and iterator
List and iterator
James Wong
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
James Wong
 
Cryptography
CryptographyCryptography
Cryptography
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
James Wong
 
Learn ruby intro
Learn ruby introLearn ruby intro
Learn ruby intro
James Wong
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
James Wong
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
James Wong
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
James Wong
 
Computer security
Computer securityComputer security
Computer security
James Wong
 
Access data connection
Access data connectionAccess data connection
Access data connection
James Wong
 
Data preparation
Data preparationData preparation
Data preparation
James Wong
 
Test driven development
Test driven developmentTest driven development
Test driven development
James Wong
 
Text categorization as a graph
Text categorization as a graphText categorization as a graph
Text categorization as a graph
James Wong
 
List and iterator
List and iteratorList and iterator
List and iterator
James Wong
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
Ad

Similar to Database introduction (20)

Relational database management system and their application
Relational database management system and their applicationRelational database management system and their application
Relational database management system and their application
tpriyadharsiniit
 
DataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPTDataMgt - UNIT-I .PPT
DataMgt - UNIT-I .PPT
BhaskarPatil24
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
Mustafa Kamel Mohammadi
 
Assign 1
Assign 1Assign 1
Assign 1
guestffcfdd
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
hpndegreecollegesklm
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
Surkhab Shelly
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
shaik faroq
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
DivyaKS12
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
ahfiki
 
Introduction to Data Base Management System.pptx
Introduction to Data Base Management System.pptxIntroduction to Data Base Management System.pptx
Introduction to Data Base Management System.pptx
SandeepY10
 
Presentation AICT Improved version[1].pptx
Presentation AICT Improved version[1].pptxPresentation AICT Improved version[1].pptx
Presentation AICT Improved version[1].pptx
mohammadhussain96201
 
Lecture1
Lecture1Lecture1
Lecture1
hassan340
 
Role of Database susytem AICT (lec# 4).pptx
Role of Database susytem AICT (lec# 4).pptxRole of Database susytem AICT (lec# 4).pptx
Role of Database susytem AICT (lec# 4).pptx
hinasattar5
 
En ch01
En ch01En ch01
En ch01
anibapi
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
sethu pm
 
Chapter1
Chapter1Chapter1
Chapter1
Jafar Nesargi
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
Diana Diana
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
ATIFAZEEZ1
 
Unit-1-Introduction.ppt for the gigachad
Unit-1-Introduction.ppt for the gigachadUnit-1-Introduction.ppt for the gigachad
Unit-1-Introduction.ppt for the gigachad
sanketkashyap6
 
UNIT 1 dbdm ad3391 unit lecture notes ppt
UNIT 1 dbdm ad3391 unit lecture notes pptUNIT 1 dbdm ad3391 unit lecture notes ppt
UNIT 1 dbdm ad3391 unit lecture notes ppt
yuvaraniit
 
Relational database management system and their application
Relational database management system and their applicationRelational database management system and their application
Relational database management system and their application
tpriyadharsiniit
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
Mustafa Kamel Mohammadi
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
hpndegreecollegesklm
 
Overview of databases
Overview of databasesOverview of databases
Overview of databases
shaik faroq
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
DivyaKS12
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
ahfiki
 
Introduction to Data Base Management System.pptx
Introduction to Data Base Management System.pptxIntroduction to Data Base Management System.pptx
Introduction to Data Base Management System.pptx
SandeepY10
 
Presentation AICT Improved version[1].pptx
Presentation AICT Improved version[1].pptxPresentation AICT Improved version[1].pptx
Presentation AICT Improved version[1].pptx
mohammadhussain96201
 
Role of Database susytem AICT (lec# 4).pptx
Role of Database susytem AICT (lec# 4).pptxRole of Database susytem AICT (lec# 4).pptx
Role of Database susytem AICT (lec# 4).pptx
hinasattar5
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
sethu pm
 
Unit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptxUnit 1_intro_dbms.pptx
Unit 1_intro_dbms.pptx
ATIFAZEEZ1
 
Unit-1-Introduction.ppt for the gigachad
Unit-1-Introduction.ppt for the gigachadUnit-1-Introduction.ppt for the gigachad
Unit-1-Introduction.ppt for the gigachad
sanketkashyap6
 
UNIT 1 dbdm ad3391 unit lecture notes ppt
UNIT 1 dbdm ad3391 unit lecture notes pptUNIT 1 dbdm ad3391 unit lecture notes ppt
UNIT 1 dbdm ad3391 unit lecture notes ppt
yuvaraniit
 
Ad

More from James Wong (20)

Data race
Data raceData race
Data race
James Wong
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
James Wong
 
Recursion
RecursionRecursion
Recursion
James Wong
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
James Wong
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
James Wong
 
Cache recap
Cache recapCache recap
Cache recap
James Wong
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
James Wong
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
James Wong
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
James Wong
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
James Wong
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
James Wong
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
James Wong
 
Object model
Object modelObject model
Object model
James Wong
 
Abstract class
Abstract classAbstract class
Abstract class
James Wong
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
James Wong
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
James Wong
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
James Wong
 
Inheritance
InheritanceInheritance
Inheritance
James Wong
 
Api crash
Api crashApi crash
Api crash
James Wong
 
Learning python
Learning pythonLearning python
Learning python
James Wong
 
Multi threaded rtos
Multi threaded rtosMulti threaded rtos
Multi threaded rtos
James Wong
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
James Wong
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
James Wong
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
James Wong
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
James Wong
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
James Wong
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
James Wong
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
James Wong
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
James Wong
 
Abstract class
Abstract classAbstract class
Abstract class
James Wong
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
James Wong
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
James Wong
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
James Wong
 
Learning python
Learning pythonLearning python
Learning python
James Wong
 

Recently uploaded (20)

Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
Com fer un pla de gestió de dades amb l'eiNa DMP (en anglès)
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 

Database introduction

  • 1. Introduction  Database integral part of our day to day life  Collection of related database  Database Management System : software managing and controlling access to the database.  Database system : collection of application interracting with database
  • 2. Example of use of database systems A database is accessed when :  Purshasing in a supermarket ( item price)  Purchase using credit cards ( valid cards)  Inquiries about a holliday (flight details)  Make a loan (library)  Rent video ( detail info on each video)  Online bookstore( book details)
  • 4. Dtabase in the dev cycle Project Identifcation and Selection Project Initiation and Planning Analysis Logical Design Physical Design Implementation Maintenance
  • 5. Database  A repository of data simultaneously used by many users (a shared ressource).  Collection of logically related data.  Description of this data (data dictionary)  BDMS Software interracting with :  Users  Application programs  database
  • 6.  BDMS Software interracting with :  Users  Application programs  Database DBMS allows users (using a query language):  Insert  Update  Delete  Retrive data from DB
  • 7. Database application programs Computer program that allow users to interact with the DB through DBMS.
  • 8. DBMS environment  Hardware :Computer systems that DBMS and application programs run on.  Software: DBMS,application programs, operating system, network software(if DBMS used over network).  Data ( operational data and meta-data)  Procedures: instruction and rules that govern use of database  People: DB designer, administrators , programmers and end users
  • 10. DBMS architecture 2 layer architecture Client-Server  The client that runs the application and the server that handles the database back-end  Multiple users able to access the DB simultanousely.  Server is processing data while the client for business logic and presentation.
  • 12. DBMS architecture 3 layer architecture  User Interface layer ( runs on the user´s client)  Business logic (middle layer) and data processing layer. Runs on a server called ”application server”.  DBMS ( store data ) , may run on a separate server called ”database server”
  • 14. 3 layer architecture advantages  Thin client (less hardware) , client only handling presentation logic.This means a little communication needed between the client(browser) and the middle tier.  Separating the core business logic from the database functions  Modularity : Easy to modify or replace one tier without affecting the other tiers  Easier load balancing  Maps quite naturally to the web environment  Security : middle tier protecting the DB.  Scalabale : add as many middle tier as needed
  • 15. Functions of a DBMS  Data storage , retrieval and update  A user-accessible Catalog  Hold data about the structure of database , users , applications and so on  Transaction support  Ensure that all the updates are made or that none of them are made  Concurrency control services  Enable many users to access shared data concurrently  Recovery services  When transaction fails, DB revovered to a consistent state
  • 16. Functions of a DBMS  Autorization services  Only special part could have access to info  Support for data communication  Terminal at remote locations can communicate with host of DBMS through network  Integrity Services  Stored data are consistent and correct  Services to promote Data Independence  Utility Services  Utility program help manage the DB effectively
  • 17. Advantages of DBMS  Control of data redundancy (duplication)  Eliminate redundency where possible ,  Data consistency  Data stored in more than once , system can ensure that all copies of the data are kept consistent  Sharing of data  By all authorized users  Improved data integrity  Rules that DB is not permitted to violate  User define data and DBMS enforce it  Improved maintenance through data independence  Make application immune to changes in data description
  翻译: