SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Amrapali Institute




Submitted to:                Submitted by:
Monika Gupta                 SUNDEEP LOHANI
Lecturer                     MBA Sec B (2nd sem)
AIMCA
 Purpose of Database system
 Advantages of DBMS
 Data Manipulation Language
 SQL
 Data Models
 Database Administrator
 Database Users
 Database Management System
   Collection of interrelated data
   Set of programs to access the data
   DBMS contains information about a particular enterprise
   DBMS provides an environment that is both convenient
    and efficient to use.
   Database Applications:
       Banking: all transactions
       Airlines: reservations, schedules
       Universities: registration, grades
       Sales: customers, products, purchases
       Manufacturing: production, inventory, orders, supply chain
       Human resources: employee records, salaries, tax deductions
   Databases touch all aspects of our lives
 In the early days, database applications
  were built on top of file systems
 Drawbacks of using file systems to store
  data:
       Data redundancy and inconsistency
           Multiple file formats, duplication of information in different files
       Difficulty in accessing data
           Need to write a new program to carry out each new task
       Data isolation — multiple files and formats
 Data consistency and integrity
 Application program independence
 Data sharing
 Backup and recovery
 Security and privacy
 Multiple views of data
 Language for accessing and manipulating the
 data organized by the appropriate data model
     DML also known as query language


 Two   classes of languages

     Procedural.
     Nonprocedural.

     SQL is the most widely used query language
   SQL: widely used non-procedural language
       E.g. find the name of the customer with customer-id 192-83-
        7465
                   select customer.customer-name
                   from customer
                   where customer.customer-id = ‘192-83-7465’
       E.g. find the balances of all accounts held by the customer with
        customer-id 192-83-7465
                   select account.balance
                   from depositor, account
                   where depositor.customer-id = ‘192-83-7465’ and
                          depositor.account-number = account.account-
        number
   Application programs generally access databases
    through one of
       Language extensions to allow embedded SQL
       Application program interface (e.g. ODBC/JDBC) which allow
        SQL queries to be sent to a database
A    collection of tools for describing
     data
     data relationships
     data semantics
     data constraints
 Entity-Relationship      model
 Relational
           model
 Other models:
     object-oriented model
     semi-structured data models
     Older models: network model and hierarchical model
 Example  of schema in the entity-
 relationship model
 E-R    model of real world
   Entities   (objects)
        E.g. customers, accounts, bank branch
   Relationships      between entities
      E.g. Account A-101 is held by customer Johnson
      Relationship set depositor associates customers with
       accounts
 Widely     used for database design
   Database  design in E-R model usually
    converted to design in the relational model
    (coming up next) which is used for storage and
    processing
Customer-     customer-   customer-   customer-   account-
id            name        street      city        number


192-83-7465   SONU        North       Haldwani    A-101

019-28-3746   SURAJ       Main        Rudrapur    A-215

192-83-7465   PERVZ       North       Pauri       A-201

321-12-3123   PREM        East        Haridwar    A-217

019-28-3746   SHIVAM      Main        Rudrapur    A-201
 Coordinates  all the activities of the
  database system; the database
  administrator has a good understanding of
  the enterprise’s information resources and
  needs.
 Database administrator's duties include:
   Schema   definition
   Storage structure and access method definition
   Schema and physical organization modification
   Granting user authority to access the database
   Specifying integrity constraints
   Acting as liaison with users
   Monitoring performance and responding to
    changes in requirements
   Users are differentiated by the way they expect to
    interact with the system
   Application programmers – interact with system through
    DML calls
   Sophisticated users – form requests in a database query
    language
   Specialized users – write specialized database
    applications that do not fit into the traditional data
    processing framework
   Naïve users – invoke one of the permanent application
    programs that have been written previously
       E.g. people accessing database over the web, bank tellers,
        clerical staff
THANK’S

Weitere ähnliche Inhalte

Was ist angesagt?

Library management system
Library management systemLibrary management system
Library management system
ashu6
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
koolkampus
 
14. Query Optimization in DBMS
14. Query Optimization in DBMS14. Query Optimization in DBMS
14. Query Optimization in DBMS
koolkampus
 
Database Presentation
Database PresentationDatabase Presentation
Database Presentation
a9oolq8
 

Was ist angesagt? (20)

srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
 
Database : Relational Data Model
Database : Relational Data ModelDatabase : Relational Data Model
Database : Relational Data Model
 
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
FUNCTION DEPENDENCY  AND TYPES & EXAMPLEFUNCTION DEPENDENCY  AND TYPES & EXAMPLE
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
 
ER-Model-ER Diagram
ER-Model-ER DiagramER-Model-ER Diagram
ER-Model-ER Diagram
 
Dbms
DbmsDbms
Dbms
 
Library management system
Library management systemLibrary management system
Library management system
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbms
 
Data base management system and Architecture ppt.
Data base management system and Architecture ppt.Data base management system and Architecture ppt.
Data base management system and Architecture ppt.
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Lesson 1: Introduction to DBMS
Lesson 1: Introduction to DBMSLesson 1: Introduction to DBMS
Lesson 1: Introduction to DBMS
 
Lossless decomposition
Lossless decompositionLossless decomposition
Lossless decomposition
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
Database language
Database languageDatabase language
Database language
 
Dbms 14: Relational Calculus
Dbms 14: Relational CalculusDbms 14: Relational Calculus
Dbms 14: Relational Calculus
 
14. Query Optimization in DBMS
14. Query Optimization in DBMS14. Query Optimization in DBMS
14. Query Optimization in DBMS
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
 
Normalization in DBMS
Normalization in DBMSNormalization in DBMS
Normalization in DBMS
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
 
Database Presentation
Database PresentationDatabase Presentation
Database Presentation
 
DbMs
DbMsDbMs
DbMs
 

Ähnlich wie Assignment on dbms

Ch1
Ch1Ch1
Ch1
CAG
 

Ähnlich wie Assignment on dbms (20)

Ch1
Ch1Ch1
Ch1
 
Ch1 2
Ch1 2Ch1 2
Ch1 2
 
Ch1
Ch1Ch1
Ch1
 
Dbms
DbmsDbms
Dbms
 
DBMS
DBMSDBMS
DBMS
 
dbms intro
  dbms intro  dbms intro
dbms intro
 
INTRODUCTION OF DATA BASE
INTRODUCTION OF DATA BASEINTRODUCTION OF DATA BASE
INTRODUCTION OF DATA BASE
 
PANKAJ SINGH-061.pptx
PANKAJ SINGH-061.pptxPANKAJ SINGH-061.pptx
PANKAJ SINGH-061.pptx
 
DBMS introduction and functionality of of dbms
DBMS introduction and functionality of  of dbmsDBMS introduction and functionality of  of dbms
DBMS introduction and functionality of of dbms
 
21UCAC 41 Database Management System.ppt
21UCAC 41 Database Management System.ppt21UCAC 41 Database Management System.ppt
21UCAC 41 Database Management System.ppt
 
Unit01 dbms
Unit01 dbmsUnit01 dbms
Unit01 dbms
 
Lecture 1 to 3intro to normalization in database
Lecture 1 to 3intro to  normalization in databaseLecture 1 to 3intro to  normalization in database
Lecture 1 to 3intro to normalization in database
 
RDBMS-b2_geetanjali.pptx
RDBMS-b2_geetanjali.pptxRDBMS-b2_geetanjali.pptx
RDBMS-b2_geetanjali.pptx
 
dbms notes.ppt
dbms notes.pptdbms notes.ppt
dbms notes.ppt
 
Introduction to Database, Purpose of Data, Data models, Components of Database
Introduction to Database, Purpose of Data, Data models, Components of DatabaseIntroduction to Database, Purpose of Data, Data models, Components of Database
Introduction to Database, Purpose of Data, Data models, Components of Database
 
Lec01
Lec01Lec01
Lec01
 
Introduction to DBMS.pptx
Introduction to DBMS.pptxIntroduction to DBMS.pptx
Introduction to DBMS.pptx
 
Dbms 1
Dbms 1Dbms 1
Dbms 1
 
PPT demo
PPT demoPPT demo
PPT demo
 
Database Systems Concepts, 5th Ed
Database Systems Concepts, 5th EdDatabase Systems Concepts, 5th Ed
Database Systems Concepts, 5th Ed
 

Mehr von Mohd Arif

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
Mohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
Mohd Arif
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
Mohd Arif
 
Project identification
Project identificationProject identification
Project identification
Mohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
Mohd Arif
 
Presentation
PresentationPresentation
Presentation
Mohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in c
Mohd Arif
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
Mohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
Mohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
Mohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
Mohd Arif
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
Networing basics
Networing basicsNetworing basics
Networing basics
Mohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
Mohd Arif
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
Mohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
Mohd Arif
 

Mehr von Mohd Arif (20)

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Presentation
PresentationPresentation
Presentation
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network management
Network managementNetwork management
Network management
 
Networing basics
Networing basicsNetworing basics
Networing basics
 
Loaders
LoadersLoaders
Loaders
 
Lists
ListsLists
Lists
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
Heap sort
Heap sortHeap sort
Heap sort
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Assignment on dbms

  • 1. Amrapali Institute Submitted to: Submitted by: Monika Gupta SUNDEEP LOHANI Lecturer MBA Sec B (2nd sem) AIMCA
  • 2.  Purpose of Database system  Advantages of DBMS  Data Manipulation Language  SQL  Data Models  Database Administrator  Database Users  Database Management System
  • 3. Collection of interrelated data  Set of programs to access the data  DBMS contains information about a particular enterprise  DBMS provides an environment that is both convenient and efficient to use.  Database Applications:  Banking: all transactions  Airlines: reservations, schedules  Universities: registration, grades  Sales: customers, products, purchases  Manufacturing: production, inventory, orders, supply chain  Human resources: employee records, salaries, tax deductions  Databases touch all aspects of our lives
  • 4.  In the early days, database applications were built on top of file systems  Drawbacks of using file systems to store data:  Data redundancy and inconsistency  Multiple file formats, duplication of information in different files  Difficulty in accessing data  Need to write a new program to carry out each new task  Data isolation — multiple files and formats
  • 5.  Data consistency and integrity  Application program independence  Data sharing  Backup and recovery  Security and privacy  Multiple views of data
  • 6.  Language for accessing and manipulating the data organized by the appropriate data model  DML also known as query language  Two classes of languages  Procedural.  Nonprocedural.  SQL is the most widely used query language
  • 7. SQL: widely used non-procedural language  E.g. find the name of the customer with customer-id 192-83- 7465 select customer.customer-name from customer where customer.customer-id = ‘192-83-7465’  E.g. find the balances of all accounts held by the customer with customer-id 192-83-7465 select account.balance from depositor, account where depositor.customer-id = ‘192-83-7465’ and depositor.account-number = account.account- number  Application programs generally access databases through one of  Language extensions to allow embedded SQL  Application program interface (e.g. ODBC/JDBC) which allow SQL queries to be sent to a database
  • 8. A collection of tools for describing  data  data relationships  data semantics  data constraints  Entity-Relationship model  Relational model  Other models:  object-oriented model  semi-structured data models  Older models: network model and hierarchical model
  • 9.  Example of schema in the entity- relationship model
  • 10.  E-R model of real world  Entities (objects)  E.g. customers, accounts, bank branch  Relationships between entities  E.g. Account A-101 is held by customer Johnson  Relationship set depositor associates customers with accounts  Widely used for database design  Database design in E-R model usually converted to design in the relational model (coming up next) which is used for storage and processing
  • 11. Customer- customer- customer- customer- account- id name street city number 192-83-7465 SONU North Haldwani A-101 019-28-3746 SURAJ Main Rudrapur A-215 192-83-7465 PERVZ North Pauri A-201 321-12-3123 PREM East Haridwar A-217 019-28-3746 SHIVAM Main Rudrapur A-201
  • 12.
  • 13.  Coordinates all the activities of the database system; the database administrator has a good understanding of the enterprise’s information resources and needs.  Database administrator's duties include:  Schema definition  Storage structure and access method definition  Schema and physical organization modification  Granting user authority to access the database  Specifying integrity constraints  Acting as liaison with users  Monitoring performance and responding to changes in requirements
  • 14. Users are differentiated by the way they expect to interact with the system  Application programmers – interact with system through DML calls  Sophisticated users – form requests in a database query language  Specialized users – write specialized database applications that do not fit into the traditional data processing framework  Naïve users – invoke one of the permanent application programs that have been written previously  E.g. people accessing database over the web, bank tellers, clerical staff