PRACTICAL FILE ON
ON
DATABASE MANAGEMENT SYSTEM
GURU GOBIND SINGH INDRAPRSTHA
UNIVERSITY
Submitted
In Partial Fulfillment for the requirement
of Bachelors of Business Administration
(2022-2025)
Submitted to: Submitted by:
Ms. Aarti Budhiraja Name: Deepali
Assistant Professor Enrollment: 06815501722
61, NEW DELHI INSTITUTE OF MANAGEMENT
TUGHALKABAD INSTITUTIONAL AREA, NEW DELHI – 110062
1
ACKNOWLEDGEMENT
In project work, acknowledgements play a vital role in recognizing
the contributions and support received from various individuals or
organizations. They serve as a way to express gratitude and
appreciation for their involvement in the project’s development and
success.
The purpose of acknowledgements is multi-fold. Firstly, they provide
an opportunity to acknowledge the efforts and expertise of those who
have directly or indirectly contributed to the project. This includes
mentors, advisors, colleagues, funding agencies, and other
stakeholders who have provided guidance, resources, or assistance.
Acknowledgements also help in establishing credibility by
showcasing the collaborative nature of the project.
DEEPALI
06815501722
2
CERTIFICATE
This is to certify that the practical file titled “DATABASE MANAGEMENT
SYSTEM” submitted by DEEPALI to New Delhi Institute of Management, Guru
Gobind Singh Indraprastha University in partial fulfilment of requirement for the
award of the Bachelor of Business Administration degree is an original piece of
work carried out under my guidance and may be submitted for evaluation. The
assistance rendered during the study has been duly acknowledged. No part of this
work has been submitted for any other degree.
Place: New Delhi Faculty Name:
Date: Ms. AARTI BUDHIRAJA
3
TABLE OF CONTENT
S. NO. CONTENT PAGE NO.
1. Introduction on ISM 5-9
2. Introduction to DBMS 10-13
3. Explanation of: 14-18
o SQL
o DDL
o DML
o Aggregate function
4. Explanation of ER diagram 19-20
5. Steps to create table 21-22
6. Queries of the commands 23-30
4
Q1. Explain Information System Management.
Ans. Information System Management (ISM) involves overseeing the
technological and informational infrastructure within an organization
to ensure it runs efficiently, securely, and in alignment with the
company's goals. This management area covers a wide range of
responsibilities, from implementing IT strategies to ensuring the
security and functionality of various systems that handle data and
workflows within a company. Here are the key aspects:
1. System Planning and Implementation: ISM professionals plan,
develop, and deploy information systems that meet organizational
needs. This includes selecting appropriate software and hardware,
customizing systems to fit specific workflows, and ensuring
seamless integration with other systems.
2. Data Management: ISM involves organizing, storing, and
safeguarding data so it can be accessed easily while remaining
secure. This means creating data governance policies, managing
databases, and ensuring that data quality and integrity are
maintained.
3. IT Infrastructure Management: ISM ensures that servers,
networks, storage, and other IT infrastructure are well-maintained,
secure, and scalable to meet the organization’s needs. This might
also involve cloud management and ensuring that systems are
accessible to remote or mobile workforces.
4. Security and Risk Management: Protecting information is a
primary focus of ISM, involving cybersecurity measures to protect
against data breaches, unauthorized access, and other threats. It
also includes compliance with data protection regulations (like
GDPR, HIPAA, etc.) and conducting regular security audits.
5
5. Support and Maintenance: ISM ensures continuous system
performance by providing troubleshooting, system upgrades, and
end-user support. Maintenance also includes backup systems,
disaster recovery plans, and ensuring system uptime and
reliability.
Characteristics of Information System Management:
1. Strategic Alignment: ISM aligns IT systems with the organization's
goals, ensuring that technology supports business objectives. This
characteristic emphasizes that all technological investments and
efforts are purposeful and contribute to overall organizational
success.
2. Data Integrity and Quality: Effective ISM maintains data accuracy,
completeness, and reliability. By ensuring high-quality data,
organizations can make informed decisions and improve
operational efficiency.
3. Scalability and Flexibility: ISM systems should be scalable to
handle growth and adaptable to accommodate new technologies
or changing business requirements. This allows organizations to
stay competitive and keep up with technological advancements.
4. Security and Risk Management: Security is central to ISM,
encompassing data protection, cybersecurity, and risk
management. It involves creating safeguards to prevent
unauthorized access, data breaches, and other threats while
complying with relevant laws and standards.
5. User-Centric Design: Effective ISM prioritizes user experience,
making systems intuitive and accessible for employees. This
includes user-friendly interfaces, training, and support, allowing
staff to utilize systems effectively.
6
Structure of Information System Management:
The structure of Information System Management (ISM) is organized
to effectively oversee and optimize an organization’s information
systems, ensuring they support business goals and operate securely
and efficiently. Here's a breakdown of a typical ISM structure, often
organized into several key areas or teams, depending on the size and
scope of the organization:
1. Executive Leadership and Strategic Management:
o Chief Information Officer (CIO) or IT Director: This senior
leader is responsible for aligning IT and business strategies,
overseeing the ISM department, and making high-level
decisions about technology investments.
o IT Steering Committee: Composed of executives and
department heads, this committee provides strategic
guidance, prioritizes IT projects, and ensures that
information systems align with organizational goals.
2. IT Infrastructure and Operations:
o Infrastructure Management Team: Responsible for
maintaining the organization’s hardware, network, servers,
and data centres. This team ensures stable connectivity,
system performance, and hardware availability.
o System Administrators: Manage and configure servers,
storage, and cloud environments, ensuring optimal
performance and access for employees.
o Network Engineers: Focus on network connectivity,
managing local and wide-area networks, VPNs, and internet
access, ensuring secure and continuous connectivity.
7
3. Data Management and Analytics:
o Data Governance Team: Develops and enforces policies
for data quality, access, security, and compliance, ensuring
data integrity across all departments.
o Database Administrators (DBAs): Maintain databases,
handle data backup and recovery, and ensure data
security and efficient data storage.
o Data Analysts: Use data insights to support decision-
making and strategic planning by gathering and analysing
data to identify trends, patterns, and potential areas of
improvement.
4. Application and Software Development:
o Software Development Team: Creates or customizes
applications to meet organizational needs, handling
software design, coding, testing, and maintenance.
o Enterprise Resource Planning (ERP) Specialists: Oversee
ERP systems, which integrate core business functions like
HR, finance, and inventory, ensuring these applications
meet user needs and business processes.
5. Cybersecurity and Risk Management:
o Chief Information Security Officer (CISO): Leads the
cybersecurity team, develops security policies, and
oversees compliance with data protection laws and
industry regulations.
o Security Analysts: Monitor systems for vulnerabilities,
handle incident response, and conduct regular risk
assessments.
8
6. Support and Maintenance:
o Help Desk and Technical Support Team: Provides first-
level support to employees, handling technical issues,
troubleshooting, and user assistance.
o Field Technicians: Provide on-site support and
maintenance, managing hardware repairs, upgrades, and
configurations.
7. Project Management and Change Management:
o Project Managers: Plan, coordinate, and execute IT
projects, managing timelines, budgets, and resources to
ensure projects meet objectives and stay on schedule.
o Change Management Team: Oversees changes in systems
and applications, ensuring that updates or upgrades cause
minimal disruption to operations and are communicated
effectively to end-users.
8. Innovation and Research:
o Innovation Team or R&D: Focuses on exploring emerging
technologies, analysing trends, and testing new solutions
that could benefit the organization’s IT infrastructure and
operations.
9
Q2. Introduction of Database Management System.
. A Database Management System (DBMS) is a software application
used to create, manage, and manipulate databases, providing an
efficient way to store, retrieve, and manage data in an organized
manner. DBMS acts as an interface between users and databases,
allowing users to perform operations on data without requiring them
to understand the complex underlying storage details. It plays a vital
role in managing large volumes of data, ensuring data consistency,
integrity, security, and scalability.
Key Components and Functions of a DBMS:
1. Data Definition: DBMS allows users to define the structure of
data, including tables, columns, data types, and relationships
between different data entities. This forms the blueprint of how
data is stored and related within the system.
2. Data Storage and Retrieval: DBMS enables efficient storage of
data on physical storage media and provides methods to
retrieve specific data through queries, allowing quick access
even for large datasets.
3. Data Manipulation: Users can add, update, delete, and modify
data using a query language, most commonly SQL (Structured
Query Language). This functionality allows for easy data
management.
4. Data Security and Access Control: DBMS provides security
features to protect data from unauthorized access and ensures
that only authorized users can perform specified operations.
Access control mechanisms also help in maintaining data
privacy.
5. Data Integrity and Consistency: DBMS enforces integrity rules to
maintain the accuracy and consistency of data. This is achieved
10
through constraints and transaction management, ensuring
that data remains reliable across various operations.
6. Concurrency Control: In multi-user environments, DBMS
manages concurrent access to data, ensuring that users can
work on the database simultaneously without conflicts or
inconsistencies in data.
Types of DBMS:
• Relational DBMS (RDBMS): Stores data in tables (relations) and
allows complex querying through SQL. Examples include
MySQL, PostgreSQL, and Oracle.
• NoSQL DBMS: Designed for large-scale, unstructured, or semi-
structured data, commonly used in big data applications.
Examples include MongoDB, Cassandra, and Redis.
• Hierarchical DBMS: Organizes data in a tree-like structure with
a parent-child relationship. Used for specific applications like
IBM’s IMS.
• Network DBMS: Uses a graph structure to allow complex
relationships, supporting many-to-many relationships.
Components of DBMS:
A Database Management System (DBMS) comprises several
core components that work together to store, organize,
retrieve, and manage data efficiently. Here are the primary
components of a DBMS:
1. Database Engine
• The database engine is the core component of a DBMS,
responsible for handling data storage, retrieval, and processing.
11
It manages read and write operations, performs queries, and
ensures data integrity and transaction management.
2. Database Schema
• The schema defines the logical structure of the database,
including tables, columns, data types, relationships, and
constraints. It acts as a blueprint for how data is organized in
the database.
3. Query Processor
• The query processor interprets and executes database queries,
transforming user queries (usually written in SQL) into
commands that the DBMS can understand and execute. It
includes both the query optimizer and query compiler.
4. Database Manager
• The database manager handles all interactions between the
data stored in the database and the user. It is responsible for
managing data integrity, security, and concurrency.
5. Transaction Management
• Transaction management ensures that all database transactions
are processed reliably and adhere to the ACID properties
(Atomicity, Consistency, Isolation, Durability). This component
ensures that transactions are executed fully or not at all,
avoiding partial updates.
6. Storage Manager
• The storage manager oversees data storage on physical media,
managing how data is stored, indexed, and accessed on disk. It
also controls the data buffer, caching frequently accessed data
in memory for faster access.
12
7. Data Dictionary (Metadata Repository)
• The data dictionary, or metadata repository, stores information
about the database schema, table structures, data types,
constraints, relationships, and user access rights. It acts as a
reference for the DBMS to manage data efficiently.
These components together ensure that a DBMS can effectively
manage and safeguard data, enabling users to interact with
data securely, efficiently, and reliably.
13
Q3. Introduction to the following Concepts.
✓ SQL
SQL, which stands for Structured Query Language, is a programming
language used to manage and manipulate relational databases. It
allows users to perform various operations on the data stored in
these databases, including retrieving, inserting, updating, and
deleting data. SQL is essential for managing large amounts of
structured data efficiently.
Key Concepts in SQL:
• Tables: SQL databases store data in tables, which are structured
into rows and columns. Each row represents a single record, and
each column holds a specific attribute or field of the data (e.g.,
name, age, address).
• Queries: SQL uses queries to communicate with the database. A
query is a request for information or a command to perform an
action. The basic SQL query syntax includes statements like
SELECT, INSERT, UPDATE, and DELETE to interact with the data.
• Data Manipulation Language (DML):
o SELECT: Used to retrieve data from one or more tables.
o INSERT: Adds new records to a table.
o UPDATE: Modifies existing data in a table.
o DELETE: Removes records from a table.
• Data Definition Language (DDL):
o CREATE: Defines new tables or other database objects.
o ALTER: Modifies existing tables, like adding a new column.
o DROP: Deletes tables or database objects.
14
• Data Control Language (DCL):
o GRANT: Assigns access rights to users.
o REVOKE: Removes access rights from users.
• Joins: Joins are used to combine data from multiple tables
based on related columns. For example, an INNER JOIN returns
rows when there is a match in both tables, while a LEFT JOIN
returns all rows from one table, even if there's no match in the
other.
• Indexes: Indexes are created on columns to speed up data
retrieval, improving query performance. They work like an
index in a book, making it easier to find specific information.
• Constraints: Constraints enforce rules on data in tables, like
ensuring values in a column are unique (UNIQUE) or not empty
(NOT NULL).
2.DDL –
DDL, or Data Definition Language, is a subset of SQL (Structured
Query Language) used for defining, altering, and deleting the
structure of database objects. Unlike DML (Data Manipulation
Language), which deals with the actual data, DDL commands define
the schema of the database, essentially setting up the "blueprint" for
how data is organized and managed.
Main DDL Commands:
1. CREATE:
• Used to create new database objects like tables, indexes, views,
or entire databases.
• Defines the structure of the table (columns, data types,
constraints).
ALTER:
15
o Modifies the structure of existing database objects.
o Allows you to add, modify, or delete columns, and add
constraints to a table.
2. DROP:
• Deletes entire database objects, such as tables, indexes, or views.
• Note: The data and structure are completely removed, so it’s a
permanent action.
3.DML - DML, or Data Manipulation Language, is a subset of SQL
(Structured Query Language) used to interact with and manage the
data within database tables. DML commands focus on manipulating
data, allowing users to retrieve, insert, update, and delete data
records.
Main DML Commands:
1. SELECT:
• Retrieves data from one or more tables based on specific
criteria.
• This is the most commonly used DML command, enabling users
to fetch and filter data for analysis or display.
2. INSERT:
• Adds new records (rows) to a table.
• Can insert data into specific columns or all columns in a table.
3. UPDATE:
• Modifies existing records in a table.
• Typically uses a WHERE clause to specify which records should
be updated; without it, all records in the table would be
updated.
16
4. DELETE:
• Removes records from a table.
• Like UPDATE, it often uses a WHERE clause to specify which
records to delete; if omitted, all records will be deleted from
the table.
3. AGGREGATE FUNCTIONS-
Aggregate functions are a key feature of SQL that allow users to
perform calculations on multiple rows of data, returning a
single summarized result. These functions are commonly used
with the GROUP BY clause to organize data into groups and
apply calculations within each group, making them essential for
generating reports and performing analytics.
Main Aggregate Functions are :
1. COUNT:
o Returns the number of rows that match a specific condition or,
if no condition is provided, counts all rows.
o Commonly used to count records or instances of non-NULL
values.
2. SUM:
o Adds up the values in a specified numeric column across all
rows.
o Useful for finding totals, such as total sales, revenue, or other
cumulative metrics.
17
3. AVG (Average):
o Calculates the average (mean) value of a numeric column.
o Often used to find the average score, price, or quantity.
4. MAX (Maximum):
o Returns the highest value in a specified column.
o Often used to find the maximum salary, price, or date in a dataset.
5. MIN (Minimum):
o Returns the lowest value in a specified column.
o Used to find the minimum salary, price, or date in a dataset.
18
Q4. Explain entity relationship with diagram.
ER Diagram stands for Entity Relationship Diagram, also known as
ERD is a diagram that displays the relationship of entity sets stored in
a database. In other words, ER diagrams help to explain the logical
structure of databases. ER diagrams are created based on three basic
concepts: entities, attributes and relationships.
ER Diagrams contain different symbols that use rectangles to
represent entities, ovals to define attributes and diamond shapes to
represent relationships.
At first look, an ER diagram looks very similar to the flowchart.
However, ER Diagram includes many specialized symbols, and its
meanings make this model unique. The purpose of ER Diagram is to
represent the entity framework infrastructure.
ER Diagrams Symbols & Notations
Entity Relationship Diagram Symbols & Notations mainly contains
three basic symbols which are rectangle, oval and diamond to
represent relationships between elements, entities and attributes.
There are some sub-elements which are based on main elements in
ERD Diagram. ER Diagram is a visual representation of data that
describes how data is related to each other using different ERD
Symbols and Notations.
Following are the main components and its symbols in ER Diagrams:
• Rectangles: This Entity Relationship Diagram symbol represents
entity types
• Ellipses: Symbol represent attributes
19
• Diamonds: This symbol represents relationship types
• Lines: It links attributes to entity types and entity types with
other relationship types
• Primary key: attributes are underlined
• Double Ellipses: Represent multi-valued attributes
20
Q5. Create EMPLOYEE table in MS ACCESS.
Steps 1: After opening MS Access choose Blank Database. After
choosing database click on create and then on table option.
Step 2: After clicking on Table, rename the table as employee. Then
click on design view to start filling the attributes for the employee
table.
21
Step 3: After filling attributes for table click on datasheet view, the
table will be created. Then fill the employees’ detail in it.
22
Q6. Write the queries for the following commands and also show
the output.
• CREATE TABLE:
Input
Output
23
• INSERT INTO:
Input
Output
24
• ALTER:
Input
Output
25
• UPDATE TABLE:
Input
Output
26
• SELECT:
Input
Output
27
• COUNT:
Input
Output
• SUM:
Input
Output
28
• AVERAGE:
Input
Output
• MINIMUM:
Input
Output
29
• MAXIMUM
Input
Output
30