Saturday, June 1, 2019

Database Management System vs Information Retrieval System :: IT Essays

1. Differentiate Between Database Management System And Information Retrieval System By Focusing On Their Functionalities. Database Management SystemAccording to newfangled Database Management eight edition, by Jeffrey A. Hoffer, Mary B. Prescott and Fred R. McFadden database management system (database management system) is define as a softw atomic number 18 system that is used to create, maintain, and provide controlled access to substance abuser databases. Support Concurrent UpdatesConcurrent updates occur when various users make updates to the database at the same season. Supporting concurrent updates is also critical to database management as this chemical element ensures that updates are made appropriately and the end result is precise. Without DBMS interference important data could be lost and or imprecise data stored.DBMS uses features to bear concurrent updates such as batch processing, locking, two-phase locking, and time stamping to help make certain that updates are do ne correctly. Again, the user is not alert entirely this is incident as it is the database management systems liability to make sure all updates are stored appropriatelyRecovery of DataIn the take a misfortune occurs, DBMS must offer ways to pull through a database so that data is not eternally lost. There are times computers may break down, a fire or other natural disaster may occur, or a user may innovate inaccurate information invalidating or making records conflictingIf the database is cracked or spoiled in any way, the DBMS must be fit to recover the correct state of the database, and this process is called Recovery. The easiest way to do this is to make standard backups of information. This can be done at a set controlled time so in the event a catastrophe occurs, the database can be restored to the state that it was last at prior to backup.SecuritySecurity is the avoidance of wrong users accessing the database. DBMS uses features such as encryption, authentication, autho rization and views to provide security to the database. Encryption is when DBMS converts the data in a database to an unreadable format. No illegal mortal trying to access this information will be able to read it. Authorized users will be able to see it in normal form. earmark is a technique in which the database officer can identify the person accessing the database. Authorized users are given intelligences and successful entry of a legitimate password will allow the user entry into the database, if a password is not effectively entered, the user will be denied access. Authorization is a set of rules that the database administrator (DBA) sets up to specify levels of practice that individuals or groups are allowed to have.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.