Você está na página 1de 7

____________ occasionally access the dbase, but they need different information each time

____________ collection of application programs that perform services for the end-users such as the
production of reports
____________ an early attempt to computerize the manual filing system
____________ a shared collection of logically related data, and description of this data, designed to meet
____________ was developed in response to the needs of industry for more efficient data access
____________ manual file is set up to hold all external and internal correspondence relating to a project,
product, employee, or client, such files are labeled and stored in cabinets
the information needs of an organization
____________

characteristic that allows program-data independence and program operation

____________ a software system that enables users to define, create, maintain, and control access to
the database
____________ The database contains not only the dbase itself but also a complete definition or
description of the dbase structure and constraints. The definition is stored in the system catalog (also
called as meta-data).
____________ The structure of data files is stored in the DBMS catalog separately from the access
programs (program independence). In DBMS environment, in adding another piece of data, we just need
to change the description of data in meta-data, no programs are changed.
independence.
____________ accountable for problems such as breach of security or poor system response time
____________ A database typically has many users, each of whom may require different perspective or
view of the dbase.
____________ may be a subset of dbase
____________ Must allow multiple users to access the dbase at the same time
____________ the DBMS must include software to ensure that several users trying to update the same
data do so in a controlled manner so that the result of the updates is correct
time
____________ DBA is responsible for authorizing access to the dbase, for coordinating and monitoring its
use, and for acquiring software and hardware resources
____________ responsible for identifying the data to be stored in the dbase and for choosing appropriate
structures to represent and store this data
____________ DBMS should ensure that each subset or record can be accessed by only one user at a
____________ people whose jobs require access to the dbase for querying, updating, and generating
reports
____________ typically middle- or high-level managers or other occasional browsers
____________ make up a sizeable potion of dbase end user

____________ A prime selling feature of dbase approach is that developing a new application such as
____________ include engineers, scientists, business analysts, and others who thoroughly familiarize
themselves with the facilities of DBMS
____________ maintain personal dbases by using ready-made program packages that provide easy-touse menu- or graphics-based interfaces
____________ their main job function revolves around constantly querying and updating the dbase
____________ determine the requirements of end-users and develop specifications for canned
transactions (using standard types of queries and updates)
____________ This level describes how the data is stored in the dbase.____________ The community
view of the dbase.
____________ example: bank tellers, reservation clerks for airlines, hotels and car rentals
____________ implement these specifications as programs, then they test, debug, document and
maintain the canned transactions
____________ This level describes that part of the dbase that is relevant to each user.
____________ Dbase approach permits the DBA to define and enforce standards among dbase users in
a large organization. Standards can be define for names and formats of data elements, display formats,
report structures, terminologies
retrieval of certain data from the dbase for printing new application takes very little time.
____________ overall description of the dbase
____________ Modern DBMS allow certain type of changes

to the structure of the dbase without

affecting the stored data and the existing application programs.


____________ used to specify the database schema
____________ As soon as one users update is applied to the dbase, all other users can immediately see
this update.
____________ DBMS approach permits consolidation of data and applications, thus reducing the amount
of wasteful overlap between activities of data-processing personnel in different projects or departments.
____________ The users view of database.
____________ This level describes what data is stored in the dbase and the relationships among data.
____________ is used both read and update the database
____________ language that allows the DBA or user to describe and name entities, attributes, and
relationships required for the application, together with any associated integrity and security constraints
____________ the result of the compilation of statements of this language is a set of tables stored
specified file collectively called system catalog
____________ may be managed by operating system under the direction of the DBMS.
____________ The physical representation of the dbase on the computer.
____________ A DBMS must furnish users with the ability to store, retrieve, and update data in the
database.

____________ contains definitions of records , data items


____________ a languages that provides a set of operations to support the basic data manipulation
operations on the data held in the database
____________ A DBMS must furnish a mechanism for recovering the database in the event that the
database is damaged in any way.
____________ These languages are also called data sublanguages (e.g., COBOL, Fortran, Pascal, Ada,
C, C++, Java, or VB)
____________ data is represented as collection of records and relationships are represented by sets,
____________ use concepts such as entities, attributes and relationships
____________ distinct object (a person, place, thing, concept, event)
____________ a collection of concepts that can be used to describe a set of data, the operations to
manipulate the data, and a set of integrity rules for the data
____________ is an association between entities
____________ one common type of object-based data model
____________ process of constructing a model of the information use in an enterprise that is
independent of implementation details such as the target DBMS, application programs, programming
language
____________ A DBMS must furnish a mechanism which will ensure either that all the updates
corresponding to a given transaction are made or that none of them is made.
____________ the database is consists of a number of fixed-format records possibly of differing types
____________ data and relationships are represented as tables, each of which has a number of columns
with a unique name
____________ the records are organized as generalized graph structures with records appearing as
nodes and sets as edges in the graph.
however it allows a node (record) to have only one parent
____________ Files are arranged in a top-down structure that resembles a tree or genealogy chart. It is
a restricted type of network model.
____________ properly that describe some aspect of the object
____________ describe how data is stored in the computer representing information such as record
structure, record orderings, and access paths
____________A DBMS must furnish a catalog in which descriptions of data items are stored and which is
accessible to users.
____________ A DBMS must furnish mechanism to ensure that the database is updated correctly when
multiple users are updating the database concurrently.
____________ A DBMS must furnish a mechanism to ensure that only authorized users can access the
database.

____________ A DBMS must include facilities to support the independence of programs from the actual
structure of the database.
____________ Persons throughout the organization who add, delete, and modify data in the database
and who request or receive information from it.
____________ A DBMS should provide a set of utility services
____________ are data that describe the properties or characteristics of other data. Some of these
properties include data definitions, data structures, and rules or constraints..
____________ Automated tools used to design databases and application programs.
____________ Centralized storehouse for all data definitions, data relationships, screen and report
formats, and other system components. A repository contains an extended set of metadata important for
managing databases as well as other components of an information system.
____________ Commercial software (and occasionally, hardware and firmware) system used to define,
create, maintain, and provide controlled access to the database and also to the repository.
____________ DBMS must be capable of integrating with communication software.
____________ DBMS must furnish a means to ensure that both data in the database and changes to the
data follow certain rules.
____________ An organized collection of logically related data, usually designed to meet the information
needs of multiple users in an organization.
____________ Computer programs that are used to create and maintain the database and provide
information to users.
____________ Languages, menus, and other facilities by which users interact with various system
components, such as CASE tools, application programs, the DBMS, and the repository.
____________ Person who are responsible for the overall information resources of an organization. Data
administrators use CASE tools to improve the productivity of database planning and design.
____________ Persons such as systems analysts and programmers who design new application
programs. System developers often use CASE tools for system requirements analysis and program
design.

Enumerations

7.
8.

Limitations of File-Based Approach


1.

Disadvantages of DBMS

2.

1.

3.

2.

4.

3.

5.

4.
5.

Characteristics of Database Approach

6.

1.

7.

2.
3.

Implications of DBMS

4.

1.
2.

Actors on the scene

3.

1.

4.

2.

5.

3.
4.

Data Manipulation Operations


1.

Categories of End-Users

2.

1.

3.

2.

4.

3.
4.

3 broad categories of Data Model


1.

Intended Uses of DBMS

2.

1.

3.

2.
3.

Functions of DBMS

4.

1.

5.

2.

6.

3.

4.
5.
6.
7.

Components of DBMS

8.

1.

9.

2.

10.

3.
4.
5.
6.
7.
8.
9.

Você também pode gostar