SlideShare a Scribd company logo
ASSIGNMENT 1
JKUAT
Course: Database Systems
Date: 16th July 2016
1. Explain the following issues related to data storage and management and show how database
systems address them. Give examples. (15 Marks)
Data redundancy and inconsistency
Redundancy refers to unnecessarily duplicated data that is not needed or no longer needed. This
maybe a field repeated in one or more tables in a database. A good example is when customer
data are duplicated and attached with each product bought. Applying database normalization
prevents redundancy and makes the best possible usage of storage.
Inconsistency is a situation where copies of the same data exist and not all of them are updated. A
good example is a case where someone's address is on a system severaltimes, and then their
address changes,but it is only updated in some of those places, then the person will have both
their old and new address on the system. Data inconsistency is likely to occur when there is data
redundancy and therefore by normalization of a database we eliminate a possible occurrence of
inconsistent data.
Difficulty in accessing data
Difficulty in accessing data arises whenever there is no application program for a specific task. A
database management system allows access to the data in a database and consists of a set of
interrelated data together with a set of programs to access those data.
Data isolation
This problem arises due to the scattering of data in various files with various formats. Due to the
above disadvantages of the earlier data processing system, the necessity for an effective data
processing system arises. Only at that time the concept of DBMS emerges for the rescue of a
large number of organizations.
Data integrity
Data integrity means that the data values in the data base should be accurate in the sense that the
value must satisfy some rules. Relational database systems use constraints to achieve data
integrity. The three constraints are; Entity Integrity: This is concerned with the concept of
primary keys. The rule states that every table must have its own primary key and that each has to
be unique and not null, ReferentialIntegrity: This is the concept of foreign keys. The rule states
that the foreign key value can be in two states. The first state is that the foreign key value would
refer to a primary key value of another table, or it can be null. Being null could simply mean that
there are no relationships, or that the relationship is unknown, and the domain Integrity: This
states that all columns in a relational database are in a defined domain.
Atomicity
Atomicity is a feature of databases systems dictating where a transaction must be all-or-nothing.
That is, the transaction must either fully happen, or not happen at all. It must not complete
partially. Atomicity is usually achieved by complex mechanisms such as journaling or logging, or
via operating-system calls.
Concurrent access
Concurrent access means multiple users are allowed to update the data simultaneously in a
database. Database systems use concurrency controlconcept to address conflicts with the
simultaneous accessing or altering of data that can occur with a multi-user system. Concurrency
control, when applied to a DBMS, is meant to coordinate simultaneous transactions while
preserving data integrity. Concurrency control is achieved using database locks.
Data security
Data security means prevention of data accession by unauthorized users. Database systems
address this issue by providing roles which define what a particular database user is allowed to
access. An example, in a banking system, payroll personnel need to see only that part of the
database that has information about the various bank employees. They do not need access to
information about customer accounts.
2. What is the difference between Procedural DMLs and Declarative DMLs. Give examples (5
Marks)
The prime difference between these two data manipulation languages is that procedural languages
specify how the output of a DML statement is to be obtained, while declarative DMLs describe
only what output is to be obtained. Typically, procedural languages treat records individually,
where as declarative languages operate on sets of records.
References
Lecture Notes
Nick (2014). The Data Manipulation Language (DML). Retrieved from
http://www.winstudent.com/the-data-manipulation-language-dml/
Ambler, Scott (2006). Introduction to Concurrency Control. Retrived from
http://www.agiledata.org/essays/concurrencyControl.html
Ad

Recommended

PPTX
Comp107 chep6
Midhun chakkaravarthy
 
PPTX
Data abstraction in DBMS
Papan Sarkar
 
PPT
DBMS basics
PRAVEEN SRIVASTAVA
 
PDF
Data Abstraction
A. S. M. Shafi
 
PPTX
Degrees of data abstraction
Mary May Porto
 
PPTX
Slide 3 data abstraction & 3 schema
Visakh V
 
PPT
Codd's rules
Mohd Arif
 
PPTX
Schema
Pragya Srivastava
 
PPTX
Data Management
Ian Jasper Mangampo
 
PPT
Chapter 2 database architecture
Ura Euro
 
PPT
Basic DBMS ppt
dangwalrajendra888
 
PPTX
Architecture of dbms
Surkhab Shelly
 
PPTX
Database management Systems
Hira Sohaib
 
PDF
Introduction to Database Management System
Amiya9439793168
 
PDF
Computer Science Dissertation Literature Review Example
Literature Review Writing Service
 
PPT
Rdbms
tech4us
 
PPTX
Codds rule
Alvina Verghis
 
PPS
Architecture of-dbms-and-data-independence
Anuj Modi
 
DOCX
Codd rules
Jay Patel
 
PPT
Week 2 Characteristics & Benefits of a Database & Types of Data Models
oudesign
 
PPTX
1.4 data independence
BHARATH KUMAR
 
PDF
Dbms 3: 3 Schema Architecture
Amiya9439793168
 
PPTX
Dbms ppt
Chinnu Shimna
 
PPTX
3 Level Architecture
Adeel Rasheed
 
PPTX
Introduction to database
Pradnya Saval
 
PPTX
Architecture of dbms(lecture 3)
Ravinder Kamboj
 
DOCX
Characteristics_of_the_database_system
sushantbit04
 
PPTX
Lecture 1&2(rdbms-ii)
Ravinder Kamboj
 

More Related Content

What's hot (20)

PPTX
Schema
Pragya Srivastava
 
PPTX
Data Management
Ian Jasper Mangampo
 
PPT
Chapter 2 database architecture
Ura Euro
 
PPT
Basic DBMS ppt
dangwalrajendra888
 
PPTX
Architecture of dbms
Surkhab Shelly
 
PPTX
Database management Systems
Hira Sohaib
 
PDF
Introduction to Database Management System
Amiya9439793168
 
PDF
Computer Science Dissertation Literature Review Example
Literature Review Writing Service
 
PPT
Rdbms
tech4us
 
PPTX
Codds rule
Alvina Verghis
 
PPS
Architecture of-dbms-and-data-independence
Anuj Modi
 
DOCX
Codd rules
Jay Patel
 
PPT
Week 2 Characteristics & Benefits of a Database & Types of Data Models
oudesign
 
PPTX
1.4 data independence
BHARATH KUMAR
 
PDF
Dbms 3: 3 Schema Architecture
Amiya9439793168
 
PPTX
Dbms ppt
Chinnu Shimna
 
PPTX
3 Level Architecture
Adeel Rasheed
 
PPTX
Introduction to database
Pradnya Saval
 
PPTX
Architecture of dbms(lecture 3)
Ravinder Kamboj
 
Data Management
Ian Jasper Mangampo
 
Chapter 2 database architecture
Ura Euro
 
Basic DBMS ppt
dangwalrajendra888
 
Architecture of dbms
Surkhab Shelly
 
Database management Systems
Hira Sohaib
 
Introduction to Database Management System
Amiya9439793168
 
Computer Science Dissertation Literature Review Example
Literature Review Writing Service
 
Rdbms
tech4us
 
Codds rule
Alvina Verghis
 
Architecture of-dbms-and-data-independence
Anuj Modi
 
Codd rules
Jay Patel
 
Week 2 Characteristics & Benefits of a Database & Types of Data Models
oudesign
 
1.4 data independence
BHARATH KUMAR
 
Dbms 3: 3 Schema Architecture
Amiya9439793168
 
Dbms ppt
Chinnu Shimna
 
3 Level Architecture
Adeel Rasheed
 
Introduction to database
Pradnya Saval
 
Architecture of dbms(lecture 3)
Ravinder Kamboj
 

Similar to Database systems assignment 1 (20)

DOCX
Characteristics_of_the_database_system
sushantbit04
 
PPTX
Lecture 1&2(rdbms-ii)
Ravinder Kamboj
 
DOCX
Database Concepts
Upendra Reddy Vuyyuru
 
PPT
Database and Database Management (DBM): Health Informatics
Zulfiquer Ahmed Amin
 
PDF
Database Systems - introduction
Jananath Banuka
 
PDF
Asif nosql
Asif Ali
 
PPTX
DBMS characteristics in Information Management System.pptx
RajiRagukumar2
 
PPTX
object oriented analysis data.pptx
nibiganesh
 
PPT
introductiontodatabase-230307143929-a424d19b.ppt
LakshmiLucky52
 
PPTX
introductiontodatabase database management .pptx
LakshmiLucky52
 
PPT
Introduction To Database.ppt
RithikRaj25
 
PDF
Lecture#5
TolganayAnarbekova
 
DOCX
Database Management Systems (Mcom Ecommerce)
Rupen Parte
 
PPTX
Purpose of DBMS and users of DBMS
DharmamSavani
 
PDF
ppt_rdbms.pdfuvuguvuvugycycyctcucuvyvvuvuvy
vk5985399
 
PDF
Top DBMS Interview Questions and Answers.pdf
Julie Bowie
 
DOCX
mayank file tt 6 (1).do989loioli9lo9ioocx
neverinstall77
 
DOCX
mayank duehduiehdfeudfheufdhufujfufujdfujdfhuhdfuijdhuidfhuef
neverinstall77
 
DOCX
ansh24.docxdegevfeghvehydfyebgdfhbgdfhbgefhf
neverinstall77
 
PPT
Basics of Database Management System: Key Components
halima9709
 
Characteristics_of_the_database_system
sushantbit04
 
Lecture 1&2(rdbms-ii)
Ravinder Kamboj
 
Database Concepts
Upendra Reddy Vuyyuru
 
Database and Database Management (DBM): Health Informatics
Zulfiquer Ahmed Amin
 
Database Systems - introduction
Jananath Banuka
 
Asif nosql
Asif Ali
 
DBMS characteristics in Information Management System.pptx
RajiRagukumar2
 
object oriented analysis data.pptx
nibiganesh
 
introductiontodatabase-230307143929-a424d19b.ppt
LakshmiLucky52
 
introductiontodatabase database management .pptx
LakshmiLucky52
 
Introduction To Database.ppt
RithikRaj25
 
Database Management Systems (Mcom Ecommerce)
Rupen Parte
 
Purpose of DBMS and users of DBMS
DharmamSavani
 
ppt_rdbms.pdfuvuguvuvugycycyctcucuvyvvuvuvy
vk5985399
 
Top DBMS Interview Questions and Answers.pdf
Julie Bowie
 
mayank file tt 6 (1).do989loioli9lo9ioocx
neverinstall77
 
mayank duehduiehdfeudfheufdhufujfufujdfujdfhuhdfuijdhuidfhuef
neverinstall77
 
ansh24.docxdegevfeghvehydfyebgdfhbgdfhbgefhf
neverinstall77
 
Basics of Database Management System: Key Components
halima9709
 
Ad

Recently uploaded (20)

PPTX
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
PDF
Python Conference Singapore - 19 Jun 2025
ninefyi
 
PDF
The Growing Value and Application of FME & GenAI
Safe Software
 
PPTX
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
PPTX
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
PDF
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
PDF
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
PDF
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
PDF
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
PDF
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
PPTX
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
PDF
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
PDF
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
PDF
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
PDF
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
PDF
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
PPTX
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Python Conference Singapore - 19 Jun 2025
ninefyi
 
The Growing Value and Application of FME & GenAI
Safe Software
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
Ad

Database systems assignment 1

  • 1. ASSIGNMENT 1 JKUAT Course: Database Systems Date: 16th July 2016
  • 2. 1. Explain the following issues related to data storage and management and show how database systems address them. Give examples. (15 Marks) Data redundancy and inconsistency Redundancy refers to unnecessarily duplicated data that is not needed or no longer needed. This maybe a field repeated in one or more tables in a database. A good example is when customer data are duplicated and attached with each product bought. Applying database normalization prevents redundancy and makes the best possible usage of storage. Inconsistency is a situation where copies of the same data exist and not all of them are updated. A good example is a case where someone's address is on a system severaltimes, and then their address changes,but it is only updated in some of those places, then the person will have both their old and new address on the system. Data inconsistency is likely to occur when there is data redundancy and therefore by normalization of a database we eliminate a possible occurrence of inconsistent data. Difficulty in accessing data Difficulty in accessing data arises whenever there is no application program for a specific task. A database management system allows access to the data in a database and consists of a set of interrelated data together with a set of programs to access those data. Data isolation This problem arises due to the scattering of data in various files with various formats. Due to the above disadvantages of the earlier data processing system, the necessity for an effective data processing system arises. Only at that time the concept of DBMS emerges for the rescue of a large number of organizations. Data integrity Data integrity means that the data values in the data base should be accurate in the sense that the value must satisfy some rules. Relational database systems use constraints to achieve data integrity. The three constraints are; Entity Integrity: This is concerned with the concept of primary keys. The rule states that every table must have its own primary key and that each has to be unique and not null, ReferentialIntegrity: This is the concept of foreign keys. The rule states that the foreign key value can be in two states. The first state is that the foreign key value would refer to a primary key value of another table, or it can be null. Being null could simply mean that there are no relationships, or that the relationship is unknown, and the domain Integrity: This states that all columns in a relational database are in a defined domain. Atomicity Atomicity is a feature of databases systems dictating where a transaction must be all-or-nothing. That is, the transaction must either fully happen, or not happen at all. It must not complete partially. Atomicity is usually achieved by complex mechanisms such as journaling or logging, or via operating-system calls.
  • 3. Concurrent access Concurrent access means multiple users are allowed to update the data simultaneously in a database. Database systems use concurrency controlconcept to address conflicts with the simultaneous accessing or altering of data that can occur with a multi-user system. Concurrency control, when applied to a DBMS, is meant to coordinate simultaneous transactions while preserving data integrity. Concurrency control is achieved using database locks. Data security Data security means prevention of data accession by unauthorized users. Database systems address this issue by providing roles which define what a particular database user is allowed to access. An example, in a banking system, payroll personnel need to see only that part of the database that has information about the various bank employees. They do not need access to information about customer accounts. 2. What is the difference between Procedural DMLs and Declarative DMLs. Give examples (5 Marks) The prime difference between these two data manipulation languages is that procedural languages specify how the output of a DML statement is to be obtained, while declarative DMLs describe only what output is to be obtained. Typically, procedural languages treat records individually, where as declarative languages operate on sets of records. References Lecture Notes Nick (2014). The Data Manipulation Language (DML). Retrieved from http://www.winstudent.com/the-data-manipulation-language-dml/ Ambler, Scott (2006). Introduction to Concurrency Control. Retrived from http://www.agiledata.org/essays/concurrencyControl.html