What is Database Management System


                                                   Functions of DBMS?

                

Data Definition must be able to accept data definitions (external, internal and conceptual schemas, and all associated mappings) in source form and convert to the appropriate object form. Data Manipulation because the DBMS must be able to handle request from the user to retrieve and possibly update existing data in the database. Also, Data Security and Integrity because the DBMS must be able to monitor user requests and reject any attempts to violate the security and integrity checks defined by the database administrator. Another function are Data Recovery and Concurrency it must have the capability of recover from, or minimize the effects of a system crash. And lastly, data dictionary the DBMS must provide a system database called the database dictionary.


                                                    

                                                               Advantages of DBMS

  
The Advantages of Database Management System are the data redundancy is avoided by keeping a single copy of the data. Data integrity is another advantage because you can be sure that any changes to the data will be reflected in all upcoming uses of that data since just one copy of a specific piece of data is kept in the database. Another example is data independence which the data must be independent of both the software used to access the database and other data in the database due to the nature of the database system. Also, a data security can have additional security. The database environment maintains data consistency. It is easier to use in the database environment. Also, less storage due to data redundant is decreased if not gotten rid of, the database won't require as much storage space.

                                                       Disadvantages of DBMS

The Disadvantages of Database Management System are extremely complex, additional expenses because of the installation and the additional hardware needed. The vulnerability because the data in databases is in central location which makes it vulnerable. The size mainframe of the database is large. Additionally, the training costs and compatibility. Lastly, the lacking- in technology because there is a possibility that they will have to redesign their system from scratch.














Comments