Escolar Documentos
Profissional Documentos
Cultura Documentos
SYSTEM
File System
◦ File system was an early attempt to computerize the manual filing system.
◦ A file system is a method for storing and organizing computer files and
the data to make it easy to find and access.
◦ File Systems may use a storage device such as a hard disk or CD‐ROM.
Characteristics
• It is group of files storing data of an organization.
• Each file contained and processed information for one specific function
like accounting or inventory.
◦ Data Security
◦ Program-data dependence: changes in
program requires changes to data accessed
by program
Data Redundancy
• Often the same information is duplicated in two or more files. It may lead
to inconsistency
• Assume the same data is repeated in two or more files. If change is made
to data in one file, it is required that change be made to the data in the
other file as well.
• If this is not done, it will lead to multiple different values for same data
field.
Difficulty in Accessing Data
◦ Assume in a banking system there is need to find out the names of all
customers who live within a particular postal‐code area.
◦ Generally, the data is scattered in various files, and the files may be in
different formats, therefore writing new application programs to retrieve the
appropriate data is difficult.
Integrity Problem
• Integrity constraints refers to the rules that
ensures completeness and reliability of data.
• Integrity constraints (e.g. account balance > 0)
become part of program code
• Hard to add new constraints or change existing
ones
Concurrent Access Anomalies
• Accessing the same data from the same file is called concurrent access.
• In the file system, concurrent access leads to incorrect data. For example,
a student wants to borrow a book from the library.
• If multiple users are updating the same data simultaneously it will result in
inconsistent data state.
• In file system, Program on the behalf of each withdrawal read the old
balance, reduce amount and write result back.
Data Security
• The data as maintained in flat files is easily accessible and therefore not
secure.
• Thus enforcing security constraints for entire file or for certain data items
are difficult.
Database Approach
• The limitations of File based system is overcome by a
Database system
◦ In this model each entity has only one parent but can have several
children . At the top of hierarchy there is only one entity which is
called Root.
Network Model