Data Environments

Length: 1213 words (3.5 double-spaced pages)
Rating: Excellent
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Chapter I

Define each of the following terms in your own word

a) Database
c) Metadata

a) Database (Crucial Concept): A database is essentially a means of storage and retrieval of items of data. The data is usually either numerical or textual, although other data forms can be accommodated.

A database is a collection of data held logically and with a purpose. Is designed and organized in such manner that it can be accessed later on for different purposes. For example we need to access our Database to update some information from it or just to extract it. Most of the businesses need a DB. They need to retrieve data in its complete form for further analysis or different objectives. Databases are needed to store our data being ready and available when required.

b) DBMS (Crucial Concept): The DBMS would be responsible for all database activities (storage, retrieval, indexing, etc) and also be responsible for keeping a detailed description of the data being held.

DBMS is a program that helps users to communicate with the Operating System through an interface in order to access the data from a Database in a friendly way and as soon as possible. It allows users to store retrieve and update information quick and productive. DBMS handle to recover the database in case of system error and needs to have an organized system for security issues.

c) Metadata – Data that Describes Data

Metadata it’s all about data being held in a Database. There is no clear definition about this. I prefer to say that is the data or information contained in a DB.

Chapter II

List and briefly describe each of the four main components of a modern database system.

The four main components of a DB system are:

a) Data
b) Hardware
c) Software
d) Users

a) Data – Information that is stored in the DB. Some of the systems can have single-user in which at most one user can access the DB at any given time or multi-user in which many users can access the DB at the same time. Data in a DB system can be Integrated or Shared. Integrated is when a DB contains more files with any redundancy between those files partly eliminated. Shared is when data in the DB can be shared between users in the same time for different purposes.

How to Cite this Page

MLA Citation:
"Data Environments." 23 May 2017
Title Length Color Rating  
Essay on The Evolution of Data and Database Migration - The Evolution of Data and Database Migration Large scale projects such as the merging of multiple sites, green IT initiatives, virtualization projects, database server consolidation and the cycle of technology refreshes are common in the database world. A common theme throughout all of these is the migration of data. From a database management perspective, data migration has traditionally been treated as an exception to normal operations. Data migration also seems to coincide with unforeseen difficulties that lead to extended downtime and the need to cancel, roll back and defer the activity....   [tags: Technology Data IT] 1219 words
(3.5 pages)
Strong Essays [preview]
Data Discovery Tools Essay - “If there were a single market theme in 2012 it would be that data discovery became a mainstream architecture.” (Magic Quadrant 2013) Data discovery is one of the most recent sections of data analytics and technology industry. Information is playing a very critical role in operations and processes, and users are demanding for tools that facilitate easy access, analysis and sharing of data. There has been an increased demand for business intelligence expansion, and BI vendors are continually trying to satiate these demands....   [tags: Technology, Search based data]
:: 11 Works Cited
1518 words
(4.3 pages)
Powerful Essays [preview]
Data Warehousing Essay - Businesses around the world are faced with many challenges when attempting to compete and gain a competitive advantage over their competition. The members of the management team within these businesses need to make quick and accurate decisions which will often impact the company and all of its employees, possibly for years to come. One of the worst situations for one of these decision makers to find themselves in is when they know that all of the information they need is available; but they are unable to retrieve that information in an accurate and useful way....   [tags: Information Technology ]
:: 4 Works Cited
910 words
(2.6 pages)
Better Essays [preview]
Virtual Learning Environments Essay - Virtual Learning Environments (VLEs) are considered to be among the most outstanding, interesting and rapidly developing contemporary computer technologies. It is a package of software systems initially created in order to utilize the advantages offered by the Internet, such as Blackboard and WebCT. It provides a resource for exchanging, transforming and managing information, as well as offering various academic and administrative services, through a group of various tools. These environments are not restricted to e-learning or distance learning....   [tags: Education, Blackboard] 1946 words
(5.6 pages)
Strong Essays [preview]
The Processes of the Change in the Rural Environments in the UK Essay example - The Processes of the Change in the Rural Environments in the UK "Hi-tech farming develops higher yields at lower costs using less land". I would agree with this statement because over the past few years, precision farming has become a proven and affordable way to know your crops. Each year, more and more farmers turn to high-tech tools to collect data, process information in order to increase their yields. These hi-tech tools include Global positioning systems which allow the farmer to keep track of the crops he or she has sprayed and enables them to spray at night....   [tags: Papers] 638 words
(1.8 pages)
Strong Essays [preview]
Essay about Implications for Data Breaches - ... • Electromagnetic attacks — attacks based on leaked electromagnetic radiation, which can directly provide plaintexts and other information. • Acoustic cryptanalysis — attacks which exploit sound produced during a computation. • Differential fault analysis — in which introducing faults in a computation lead to discovering secrets. • Data remanence — in which sensitive data are read after supposedly having been deleted. C. Cross-VM Side Channels and Their Use to Extract Private Keys the study On October 2012 A group of researchers has developed a side-channel attack targeting virtual machines that could pose a threat to cloud computing environments....   [tags: cloud computing, hacking]
:: 4 Works Cited
1321 words
(3.8 pages)
Strong Essays [preview]
Quantitative and Qualitative methods Essay -   Contents 1.0 Introduction 2 2.0 Research methodology 2 Data types 2.1 3 Measuring Data 2.2 3 Graphical Data 2.3 3 Empirical research methods 2.4 3 Quantitative Methods 3.0 3 Qualitative Methods 3.1 3 Bibliography 4 1.0 Introduction I have been asked to produce a report which critically evaluates a wide variation of methodologies and how they can be applied to a given scenario. In this report I am going to be analyzing the usefulness of the methods that I can apply to different situations I will also be going on further to explain my knowledge of these methodologies by selecting methods and creating research documentation for a that scenario....   [tags: research, data]
:: 2 Works Cited
870 words
(2.5 pages)
Better Essays [preview]
Virtual Reality: Computer Generated Simulation Essay - “Virtual reality promises a kind of transcendence of the limits of physical reality” (Biocca, Kim, Levy 06). “Virtual Reality” is a computer-generated simulation of a three-dimensional environment in a seemingly real way by a person using special electronic equipment. When most people hear this they think of movies like “The Matrix”. They think films are the only place virtual reality is seen and used. However they are sorely mistaken in that aspect. Virtual reality is used in other fields and can be used in real life....   [tags: three-dimensional environment, data globe]
:: 5 Works Cited
1014 words
(2.9 pages)
Strong Essays [preview]
Essay on User Datagram Protocol - User Datagram Protocol is one of the transport layer protocol which offers limited amount of service when messages are exchanged between hosts. Data is further subdivided into data grams for transmission across the hosts. UDP does not allow retransmission of the damaged or lost packets and there is no acknowledgement for the packet which has been sent. DGRAM_SOCK is the type of socket used for transmission of data. Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagram's) and reassembling it at the other end....   [tags: data, udp, internet protocol]
:: 3 Works Cited
988 words
(2.8 pages)
Better Essays [preview]
Essay on History of Database Technology Past and Present - History of Database Technology Past and Present The term database was popularized with the growth of the computer industry and is typically thought of as software used to store, index, manipulate, and retrieve information (Vaughn). Database software has been in use since the Census Bureau used a punch card system to meet the requirements for the collection, sorting, and reporting of data for the 1890 census (National Research Council). These earliest databases were flat file databases. The flat-file style of database works well for small amounts of data that need to be organized to be read and edited by hand....   [tags: Data Database Management] 1389 words
(4 pages)
Strong Essays [preview]

Related Searches

b) Hardware – The main hardware parts are: - storage volumes, where is included all hardware types that are used to hold the stored data. Mostly are used magnetic disks.
- Processor and RAM memory
which are used to support the execution of the database software
c) Software – The “thing” that make connection between physical
DB (the data physically stored) and the users of the system. It’s the main “piece of the game” who “speaks” with the computer in the name of users. Database Manager or DBMS which is also known provide all facilities for the user to retrieve, update, or remove data from the DB. DBMS is the most important software component from a DB system but is not the only one. There are other development tools, design helps and the transaction manager.
d) Users – There are 3 types of users. Programmers which are responsible for designing and coding a DB application in a programming language; DB Administrator who will control the DB after is created and End Users who interact with the system. End Users use an interface to communicate with the system for input data or retrieve it but they cannot write more functions in the DB system

Chapter III

Briefly explain the major functions performed by the DBMS.

The major Functions are: - Data storage, retrieval and update
- Creation and maintenance of the data
- Managing the facilities for sharing the
- Backup and recovery
- Security

The DBMS must allow users to store retrieve and update information in a friendly way. Users need to input their data into the Database easily without knowing about the structure of the DBMS or how it was designed. When a user needs to find or update a specific data from a Database that should be quick and easy. The GUI is designed in such way to be helpful for the user. Users are not supposed to be concerned about internal structure of the Database.
The data dictionary is a ‘database about the database’ according to definition. It contains information about the Database which is used. It has information about the tables and columns, the name of them; describes characteristics of data, relationships between them and which program access data. DBMS need to create and maintain (updating, replacing, etc, data when is needed) this Data Dictionary for good functionality.
DBMS has to function properly when is accessed simultaneously by different users for different purposes. It needs to be capable to carry out the job for the users.
If the system encounters problems DBMS needs to be prompt and offer recovery solutions for the user.
The biggest issue of our times is Security. Of course that the DBMS must have powerful security structures. It’s a must to perform correctly password allocation. The DBMS needs to know which user has access to a Database and which his rights are. If a Database can be accessed by everyone then the data can be compromised.

Chapter IV

What is meant by program-data independence in the context of a database management system?

The advantages of program-data independence are that the DBMS manages with the metadata stored in it, so all other applications don’t need to worry about the data formats. Also queries and updates are managed by the DBMS and for that programs are not needed to process data access routines.
With program-data independence Databases are developed quicker and the maintenance process is much more productive than usual.

Chapter V

Explain by means of an example:
a) What is meant by data redundancy in a flat file
information and retrieval system?
b) How data in such a system might become inconsistent?

a) A DB stored on a flat file can cause eternal problemsJ.Data redundancy means that data is duplicated in many different files. Different systems or programs have separate copies of the same data. Just imagine how difficult will be to update data from such a system. You need to do that for each data stored from those different flat files even if is the same data in each flat file. This can cause real maintenance headaches, and it also compromises data integrity. Also it’s a waste of space to have duplicate items.
b) Data can become inconsistent in a flat file when data is changed. Just typing the same data so many times in different records can cause problems, and data become inconsistent. It can occur typing mistakes.

Return to