File Processing versus
Databases
File Processing Systems
In a typical file processing system, each department or area
within an organization has its own set of files.
The records in one file may not relate to the records in any other
file.
Organizations have used file processing systems for many
years.
File Processing Systems
Two major weaknesses:
Data Redundancy Each department or area in an organization
has its own files in a file processing system.
Duplicating data in this manner wastes resources such as storage
space and peoples time.
Data redundancy also can increase the chance of errors.
Isolated Data Often it is difficult to access data stored in
separate files in different departments.
Sharing data from multiple, separate files is a complicated
procedure and usually requires the experience of a computer
programmer.
The Database Approach
Many programs and users share the data in the database.
The database does secure its data, however, so that only
authorized users can access certain data items.
While a user is working with the database, the DBMS resides
in the memory of the computer.
The Database Approach
The following list presents some strengths of the database
approach:
Reduced Data Redundancy Most data items are stored in only
one file, which greatly reduces duplicate data.
Improved Data Integrity When users modify data in the database,
they make changes to one file instead of multiple files.
Shared Data The data in a database environment belongs to and
is shared, usually over a network, by the entire organization.
Easier Access The database approach allows nontechnical users
to access and maintain data, providing they have the necessary
privileges.
Reduced Development Time It often is easier and faster to
develop programs that use the database approach.
The Database Approach
Databases disadvantages:
-More complex than a file processing system.
-People with special training usually develop
larger databases and their associated
applications.
-Require more memory, storage, and processing
power than file processing systems.
-Data in databases can be more vulnerable than
data in file processing systems.
Database Management Systems
Database management
system (DBMS), or database
program, is software that
allows you to create, access,
and manage a database.
Data
dictionary- contains
data about each file in the
database and each field
within those files.
Database Management Systems
File
Retrieval and Maintenance
A DBMS provides several tools that allow users and programs
to retrieve and maintain data in the database. To retrieve
or select data in a database, you query it.
A query is a request for specific data from the database.
Query
language- consists of simple, English-like statements
that allow users to specify the data to display, print, or
store. Users can retrieve actual data in a query or display
the results of calculations performed on the data.
How to Use the Simple
Query Wizard:
Step 1 Select the
fields from the
Available Fields list
you want to be
displayed in the
resulting query.
Step 2 Assign a name
to the query, so that
you can open it later.
Step 3 View the
query results on the
screen.
Query
by Example
Most DBMSs include a query by example (QBE) feature
that has a graphical user interface to assist users with
retrieving data.
Form, sometimes called a data entry form, is a window on
the screen that provides areas for entering or modifying data
in a database.
Report generator- also called a report writer, allows users to
design a report on the screen, retrieve data into the report
design, and then display or print the report.
Data Security- A DBMS provides means to ensure that only
authorized users access data at permitted times.
-Access privileges- define the actions that a specific user or
group of users can perform. Access privileges for data involve
establishing who can enter new data, modify existing data,
delete unwanted data, and view data.
-Principle of least privilege policy- users' access privileges
are limited to the lowest level necessary to perform required
tasks.
Backup and Recovery
Occasionally a database is damaged or destroyed because of hardware
failure, a problem with the software, human error, or a catastrophe such as fire
or flood. A DBMS provides a variety of techniques to restore the database to a
usable form in case it is damaged or destroyed.
A backup- or copy, of the entire database should be made on a regular
basis. Some DBMSs have their own built-in backup utilities. Others require
users to purchase a separate backup utility, or use one included with the
operating system.
More complex DBMSs maintain a log, which is a listing of activities that
change the contents of the database.
A DBMS that creates a log usually provides a recovery utility. A recovery
utility uses the logs and/or backups to restore a database when it becomes
damaged or destroyed.
Continuous backup- a backup plan in which all data is backed up whenever
a change is made. This backup technique can cost more than other backup
strategies but is growing in popularity because of its benefits.