StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Research Report outlining the general database techniques - Essay Example

Cite this document
Summary
General Database Techniques: For Implementing a Large Database General Database Techniques: For Implementing a Large Database What is a database? In their book, Date et al. (2006, p. 11) defined a database as being a “collection of persistent data that is used by the application systems of some given enterprise.” Persistent data is different from other kinds of data because of the fact that when it has been accepted by the Database Management System (DBMS) and entered into the database, a request to the DBMS has to be made explicitly in order to delete it from the database else it cannot be deleted…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Research Report outlining the general database techniques
Read Text Preview

Extract of sample "Research Report outlining the general database techniques"

Download file to see previous pages

16). When a database is designed, one should make sure that all functions performed by the database are correct and quick. There are some performances issues that arise due to the structure and the design of the database. Hence, it needs to be designed and structured carefully. Large tables in the database need to be identified so that special consideration to these tables can be given in terms of performance. Also the database should be tested by increasing a number of users who access the database in order to check performance.

Database performance increases through normalization, database partitioning, using federated database systems and certain hardware considerations such as RAID. Normalization Normalization is a process of removing redundancies of data in a database or in other words it is a technique of producing a set of relations with desirable properties given the data requirements of an enterprise. (Stephens et al., 2008, p. 62). If normalization is not done, then certain anomalies occur which include the insertion anomalies, delete anomalies and update anomalies.

Anomalies occur when at one table of a database there has been an occurrence of change either an insertion of a record or deletion of a record or updating the table; however, unaffecting the duplicate records that exist in other tables in relation to that table. The process of normalization is done basically in three steps. The database is brought to its first normal form (1NF). A relation (table, entity) in a database in which the intersection of each row and column contains one and only one value is said to be in 1NF.

All relations are supposed to be in 1NF. After 1NF, the relations in a database are brought to the 2NF. A relation that is in its 1NF and all non-primary key fields is fully functionally dependent on the primary key is said to be in 2NF. Then a relation that is in 1NF and 2NF and in which no non-primary key field is transitively dependent on the primary key field is said to be in 3NF. These are the three basic steps that normalize the database. Database Partitioning Through database partitioning, database is broken into small physical units that can be managed independently.

In this way, it becomes easier for the designers and operations personnel as the database becomes flexible in data management. Large physical units, on the other hand, cannot be structured, recovered, organized or monitored. Partitioning makes indexing easier and also allows sequential scanning. Through this process, data can be broken up by organization, business unit, region, date and others which help in the desired analysis of data (Connolly and Begg, 2008, p. 119). Through partitioning, the performance of database is enhanced.

This is because when database is partitioned, subsets of data are formed. And these subsets can be managed and accessed with efficiency and are useful for analysis. Partitioning also makes the activities of maintenance operations such as defragmentation and index rebuilds. Partitioning mak

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Report outlining the general database techniques Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1422256-research-report-outlining-the-general-database
(Research Report Outlining the General Database Techniques Essay)
https://studentshare.org/environmental-studies/1422256-research-report-outlining-the-general-database.
“Research Report Outlining the General Database Techniques Essay”, n.d. https://studentshare.org/environmental-studies/1422256-research-report-outlining-the-general-database.
  • Cited: 0 times

CHECK THESE SAMPLES OF Research Report outlining the general database techniques

Database Security Measures

To remain competitive and afloat in such a business environment, computer and information technology organizations must embark on the search for revolutionary and forward-looking techniques not only for creating but also for collecting, storing, capturing, organizing, managing, and distributing data/knowledge through its structure.... Importantly, these techniques should allow for the easy and effective retrieval of needed information at the convenient moments (Ali et al....
6 Pages (1500 words) Report

Data Mining Techniques for Identifying Information Sources

This report "Data Mining techniques for Identifying Information Sources" presents database efficiency.... Therefore, database design must demonstrate the highest level of normalization possible, in order to make the database efficient and robust.... In order to maintain 3 large databases for a VLDB and to keep them efficient for two years if required, there is a requirement for constructing a 'store and forward' mechanism that will process the data or information from and through each distribution center database....
5 Pages (1250 words) Report

Review of Oracle Database

Oracle makes use of techniques that are typically more superior for managing recovery than other database systems.... This report outlines the Oracle database.... A collection of data treated as a unit is called a database.... For enterprise grid computing Oracle database is the first database designed to manage information and applications in the most flexible and cost effective way.... Prevention of unauthorized access and efficient solutions for failure recovery are also provided by a database server....
7 Pages (1750 words) Report

Lanchester Liners Hospitality Database

The report "Lanchester Liners Hospitality database" presents a detailed overview of the design and implementation of a hospitality database for Lanchester Liners for holding information about their ships, and any corporate team-building events organized on-board.... hellip; It also discusses various issues related to multi-user access to a database including concurrency, locking, security, and access control.... The report is classified into two tasks: Task A defines the implementation details of the physical database and describes how the database is populated with the given data and reports are generated for given business requirements....
5 Pages (1250 words) Report

Implementing Database Security

Therefore, researchers and companies turned to find new techniques to protect their data and assure their customers' privacy.... Meanwhile, there are many practical techniques that make sure data security and aid database managers protect their data.... This report "Implementing database Security" discusses security and privacy that are an essential concept of building systems.... uring the last decade, researchers addressed some of the security and privacy issues and as a result of their efforts to deal with these issues, there are many rich resources that educate database administrators on how to harden their databases to secure their data....
11 Pages (2750 words) Report

Oracle Database Tuning Plan

This report "Oracle database Tuning Plan" sheds some light on the database performance tuning that is necessitated by existing bottlenecks that require making appropriate changes in the configuration of the database to reduce or eliminate.... Tuning is mostly done as a reaction response to a problem either before or after the database system has been deployed.... In tuning the database, a database administrator must come up with a strategy that outlines the performance tuning methodology that is supported by the software making up the DBMS....
7 Pages (1750 words) Report

The Trojan Horse Defense

This report "The Trojan Horse Defense" sheds some light on an online-based business that utilizes the Internet for both business to the customer and business to customer transactions; however, Trojan attacks pose an enormous challenge to it.... hellip; Trojan attacks are a threat inflicted by the untrustworthy or scandalous behavior of computer users taking advantage of the prevalent use of computer networks....
15 Pages (3750 words) Report

System Information Requirement Investigation Techniques

This report "System Information Requirement Investigation techniques" discusses an information system as an organized combination of people, information, and information technology, all coordinated in a manner that is aimed at achieving set objectives in a business organization setup (Adamsen 2000).... nbsp; Development of an information system involves a wide range of technical factors like data and information modeling, modeling of business processes, designing of an information database, networking designs, programming of a program to interface between the user and the information system, and assembling of all necessary hardware for setting up of the information system....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us