Thursday, February 14, 2019
Database Management System vs Information Retrieval System :: IT Essays
1. tell apart Between Database oversight System And Information Retrieval System By Focusing On Their Functionalities. Database Management SystemAccording to Modern Database Management eight edition, by Jeffrey A. Hoffer, Mary B. Prescott and Fred R. McFadden database management dodging (database management system) is define as a software system that is used to create, maintain, and cater controlled access to exploiter databases. Support Concurrent UpdatesConcurrent updates occur when various drug drug users pull ahead updates to the database at the same time. Supporting concurrent updates is also critical to database management as this component ensures that updates are made befittingly and the end result is precise. Without database management system interference important data could be lost and or inexact data stored.DBMS uses features to bear concurrent updates such as flock processing, locking, two-phase locking, and time stamping to help make certain that updates are done correctly. Again, the user is not alert all this is incident as it is the database management systems liability to make sure all updates are stored appropriatelyRecovery of DataIn the event a misfortune occurs, DBMS must offer ways to pull through a database so that data is not eternally lost. There are times computers may break down, a fire or other natural accident may occur, or a user may enter incorrect information invalidating or making records conflictingIf the database is cracked or spoiled in any way, the DBMS must be qualified to recover the correct state of the database, and this process is called Recovery. The easiest way to do this is to make standard backups of information. This female genital organ be done at a desex controlled time so in the event a catastrophe occurs, the database can be restored to the state that it was last at prior to backup. securitySecurity is the avoidance of illegal users accessing the database. DBMS uses features such as encryptio n, authentication, authorization and views to provide security to the database. Encryption is when DBMS converts the data in a database to an ill-defined format. No illegal person trying to access this information result be qualified to read it. Authorized users will be able to see it in normal form.Authentication is a technique in which the database officer can identify the person accessing the database. Authorized users are give passwords and successful entry of a legitimate password will get the user entry into the database, if a password is not effectively entered, the user will be denied access. Authorization is a set of rules that the database administrator (DBA) sets up to specify levels of practice that individuals or groups are allowed to have.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment