StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Are the Advantages and Disadvantages of Database - Essay Example

Cite this document
Summary
The paper "What Are the Advantages and Disadvantages of Database" is a great example of a finance and accounting essay. The change in technology necessitates a series of actions and security provisions to enhance data integrity, through storing information on a computer in an electronic form accessed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful

Extract of sample "What Are the Advantages and Disadvantages of Database"

Database Name Instructor’s Name Date Introduction The change in technology necessitates a series of actions and security provisions to enhance data integrity, through storing information on a computer in an electronic form accessed. For there to be a properly organized system, that achieves the set objectives of the organization, which is the core secret bonding the survival in the business world (Lightstone, Teorey & Nadeau, 2007). Data and information security is very crucial and handled through authentication techniques accessed by delegated individuals to handle and manage the confidential information that the survival of the organization depends on (Reeves, 2006, p. 23,). However, this can be best done with the aid of a system structured to procedurally collect information (data) stored a s a soft copy within a computer system, database is able to store both large and small information/ records which should be easily accessible with options of adding or removing the information content. Only the authorized personnel with the authentication code should do this. For database efficiency, there is need to put in place A DBMS, this is a database management system with ability to manage all the information and queries when in cooperated in the system. Apart from the above mention features of a database, any database should objectively generate both the ability to recover vanished data lest hardware failure and have high data attributes to securities and integrity. According to the (Rahman, 2007, p.11,), the essay is aimed at creating an understanding of a database, the past database systems, demerits of the old systems, improvement and development of the new system objectively to overcome the disadvantages of the old system and its special property in the information safekeeping and integrity. History of database Database must not be very large as in the situations of large institutions and government departments where they need to have separate dedicated servers (Lightstone, Teorey & Nadeau, 2007). However, being that all databases must be stored within a memory location accessible through computer for example a hard disk; this implies that the history of databases came after the invention of storage devices. In order to achieve information security, both the storage devices and the database be protected either under lock and key or through authentication codes respectively. Any computer works under some logical database to execute a given command to produce a feedback, the earlier computers had crude database management systems that were always problematic (Charles, 2008, p. 6). However, during the 1960’s, only the noble group were able to use electromagnetic databases to store information due to the high costs involved in possessing one. Other than that, the computers that are in most cases used for research purposes were earlier research project itself. Due to the technological advancement, by 1970’s, the increase in quality with decrease in price gradually became a routine. The memory capacities of the computers increased leading to the introduction of systems that could handle and manage data, though, at this time intrution and data compromise problems arose triggering the need to have a quick response to curb the problems. In the year 1980, the major computer venders incooperated database management system within their computers to find a solution (Charles, 2008, p.38). Different database management systems were designed for different computers an users, soon after, many competitors and clones got into then market introducing DBMS’ which could fit into any computer regardless of the make (Teorey, Lightstone & Nadeau, 2005). This shift turned following the advent of 1990’s from having a trusted, accurate DBMS, which is easy to maintain due to the spread and creation of information as well as the emergence of large memory capacities sophisticating DBMS administration within the market environment. A Chinese by the name Chen hard proposed an (ER), entity relationship, a model used for database design, which is conceptually a data mode. During this time, the Relational database systems became the purchasing fuels for business market for data. However, the structured query language, SQL became the IBM standard of database development used by some companies to date. The other database development languages that emerged due to the rise if many database development companies were; Dbase III, FoxBASE, Watcom SQL, Visual FoxPro, Sybase, Oracle, Microsoft based Visual Basics, Excel/ Access. Apart from the computer based databases, web based databases emerge by late 1990s’, for example the client server database which exponentially grew worldwide (Lightstone, Teorey & Nadeau, 2007). Database systems for example the point of sale (POS), the technology that well suite the supermarkets and other marketing organizations where customers are free to pick the goods they demand. With the consistency in technology, programs like front page, dream weaver, java-scripting languages, My SQL, Linux, active server, internet connector’s databases emerged (Keng, 2010, p. 26). As per (Keng, 2010, p. 14,), the emergence of improved database applications such as PDAs’ XML, SQL 92, object oriented just to mention, have drastically changed the speed at which information can be transceived throughout the world. However, most of the database management systems look complicated while they are not, this is just the user perception of the system in place. Database development In order to develop a database you have to identify the kind of model that you intend to use, this will determine the type of database to develop. There are four main types of models namely; Hierarchical Model, Flat model, Network Model and Relational Model. The Hierarchical Modeled Database- This kind of database has a treelike structure nested downwards to keep the order of data flow and organization in equal level within the list having the same data types . Flat Model Database- with reference to the name, this is a two dimensional flat structure of array data type. For example; having one column with many rows, each row contains different codes of the same data type, array (Teorey, Lightstone & Nadeau, 2005). Network Model- Network being a link that is connecting a series of items/ data, networked model definite referred feature is the internet-worked records linked through effective network to other records, in programming, the record (data type) whose value refers directly to/ pointing at another record stored in a memory location is a pointer. The Relational Model- In both data storage and access, relational model is the most preferred database type due to its extreme power and resources/ tools. The table well organized in a manner to ease addition and deletion of data without difficulties and reorganization. In the relational database model, the table can have numerous records, which in turn have a number of fields respectively (Charles, 2008, p. 16). The name relation derived from the availability of the table. If for example a company producing animal feeds intends to have a database in place, they will need to have many tables organized to cover all their requirements, e.g., there can be customer information (name, address, contacts, customer number e.t.c (Teorey, Lightstone & Nadeau, 2005). Another table can have the relation from the previous orders (Keng, 2010, p. 14 & Charles, 2008, p. 8), i.e. for example (animal product bought, item number, payment method, amount paid). All the tables should have primary keys to ease unique identification of records. Through a program interface called structured query language (SQL). This program connects different tables relating the information content through the primary keys that uniquely identify the features of each table, extracts only the required data to process a command. The programming skills gradually developed until now we can use the graphical user interface (GUI) on any type of computer for example; MS windows, UNIX- X window system, Apple, Macintosh, IBM just to mention. However, the availability of internet connection and SQL has enabled the database users to have the option of remotely connecting to the database without movement to the remote locations, which may be very far away from, the user. Taking an example the issue of the American Green card, you find that applicants get access to the site and get a chance to participate in the gamble, they submit in their details and other requirement from all over the world, through the universal resource locator (Ramon, 2008, p.5,). The American immigration department will be able to store the information in their database, which later they randomly hold a draw to get the lucky winners given a chance to study, live and work in America. Through the generation of the fourth generation language, the high-level language a lot of information obtained through typing a short code, which when executed gives extracts the requirements from the database. This has even simplified the development platform of the database in that it is needless to get a very powerful machine in order to run a server, or any other system. The fewer the codes the smaller the memory location to be sued o store the codes hence, even the inexpensive stand alone server can be used to effectively achieve information security through the database. Apart form the codes, the inter-operability of SQL server other networks led to successful achievement of the product especially under the client/ server environment (Keng, 2010, p. 20 & Charles, 2008, p. 18). Structured query language being very user friendly enables the database administrator or the program/ system administrator to structurally modify the database, allow more users to have permission to access or deny them the access to the information in the tables and the general database. Apart form that, the administrator may also change the system settings to increase the information integrity, routinely update the database content and monitor the information in the database through queries. An advantage of the SQL is that it allows everybody to query and get feedback information on the requested data. This development language allows integration of a variety the general user interfaces to the advantage of both the user and the administrator due to reduced cased of system misunderstanding. For example, MS. Access is a personal computer based database management system that is easy to use, as the user is required to enter data manually, likewise to the Personal oracle-7, which is also another user friendly general user interface tool used on large databases in the cooperate companies worldwide(Ramon, 2008, p.10,). However, the integration of Visual basic and structured programming language library, the OLE which is used as a link the user application to the to oracle database. Incase of errors, through a process referred to as binding, the user will get the program, results designed for the required purpose, this will help to reduce chances of making mistakes being that database contains very crucial information that should objectively guide the user. How to access information stored in the database The great feature is data storage; however, for most of the users, the ease of retrieving information is the main requirement other than information security. With reference to our example, the details of the animal food production company, pulling out any information regarding sale, orders, and previous transactions is extremely easy. However, the relational database increase the power of adding more queries which forms of request that enables the user are. It directly pull out only the specified information required without having the general information that you will still need to go through the explicitly point out the requirements, also through queries you can easily generate a report given the requirements of the report. SQL queries are very helpful in situations that you require an answer to the important questions; it is a very quick and reliable source of information for either individual or group decision (Keng, 2010, p. 27 & Charles, 2008, p. 22). Securing a Database In most cases, organizations engage into heavy expenses to install databases to control the inflow and outflow of information of which some are very confidential for the organizational survival. For example the issue of the Coca-Cola formula that when through computer database compromise, other competitors leaked would outweigh the beverage company in the global market. For the security of the stored information, authentication details like the password, user name and other information access features of the trusted individual delegated to handle the information should be availed. Such people allowed to key in their authentication details alone so that when the information leaked they should be able to bear the burden solely (Ramon, 2008, p.16,). Database progress is capable of formulating easier life due to the increasing number of web users, it is preferred that the information content in the web should have different securities in order to restrict the users who intend to maliciously intrude into the sights that are of no benefit to them. This effected through authentication (Connolly & Begg, 2010). For any information Conclusion The basis of developing a database is to collect and integrate information into a program; software that can sorts, store and display the content when demanded. Depending on the database sight owners requirements, the database in order software displayed in a number of styles. With attributes like primary and secondary keys, the chances of data redundancy are reduced enabling systematic data storage. However, the independency of the table on the database system platform and programming language together with the ability to integrate more than one table into a master table helps in the information retrieval and reduces storage space that in turn increases the processing speed of the computer/ server (Charles, 2008, p. 21). More than one user can access the database at the same time prompting the intensity of security to enhance integrity that can be achieved therough proper system administration. Thus, different users to be given limited rights to access only the information that is inline with their needs, due to the availability of the same data under the specific topics, there will be consistency in the relational database being that it is commonly used. Its main advantage is the systemasntic way of data storage that ease retrieval and alteration, leading to the maintenance of the data member relationship as stipulated in the relational database management systems (Keng, 2010, p. 52,). However, the advent of other programming languages line object oriented (Visual Basics ) with properties like encapsulation, inheritance, polymorphism, consistency, abstraction, durability, isolation, these properties referred to as acid properties of Database management system advantageously intensified efficiency, and integrity. References Atiar, R. (2007). Modern Database Panorama. Retrieved from http://www.articlesbase.com/education-articles/modern-database-panorama Charles, P. (2008). Database Security. Retrieved from http://www.accessscience.com.library.newcastle.edu.au/content. Aspx?searchStr=database Connolly, T. & Begg, C. (2010). Database systems: a practical approach to design, implementation, and management, 5th Ed. New York: Addison-Wesley. Keng, S. (2010). Toward a Unified Model of Information Systems Development Success: New York: McGraw Hill Publishers. Lightstone, S., Teorey, T., & Nadeau, T. (2007). Physical database design: the database professional's guide to exploiting indexes, views, storage, and more, 4th Ed. London: Morgan Kaufmann. Ramon, A. (2008). Database Management System: Management system. Retrieved from http://www.accessscience.com.library.newcastle.edu.au/content.aspx?searchStr=Database Reeves S. (2006). How database development can make your life easier. Retrieved from http://www.articlesbase.com/web-hosting-articles/how-database-development-can-make-your-life-easier Teorey, T., Lightstone, S., & Nadeau, T. (2005). Database modeling & design: logical design, 4th Ed. New York: Academic Press. What is a Database? (n.d.), what is a Database. Retrieved from http://www.tech-faq.com/what-is-a-database.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(What Are the Advantages and Disadvantages of Database Essay Example | Topics and Well Written Essays - 2250 words, n.d.)
What Are the Advantages and Disadvantages of Database Essay Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/finance-accounting/2034033-what-is-database-how-does-it-work-what-are-the-advantages-and-disadvantages
(What Are the Advantages and Disadvantages of Database Essay Example | Topics and Well Written Essays - 2250 Words)
What Are the Advantages and Disadvantages of Database Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/finance-accounting/2034033-what-is-database-how-does-it-work-what-are-the-advantages-and-disadvantages.
“What Are the Advantages and Disadvantages of Database Essay Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/finance-accounting/2034033-what-is-database-how-does-it-work-what-are-the-advantages-and-disadvantages.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Are the Advantages and Disadvantages of Database

Strategic Business Systems

There are three main components of a typical DSS system, and these include the user interface, the database and the model, network or structure of the DSS.... The database is the system in the machine that stores data and organizes it in a way that makes it possible and easy to retrieve the same.... database management systems are used to manage the database for more effectiveness in the management of data.... As a result, managers seem to be the only people who don't seem to know what they really want, and designing a good ICT support system for them is very difficult....
9 Pages (2250 words) Assignment

How Businesses Use DBMS Model

for the businesses to use these various DBMS effectively, the software comes with a driver known as Open database(ODDBC) that allows it to integrate with the other databases(OpenLink, 2013).... However, a good database Management System must also co-exist with a proper business plan and the companies must expect their profits in the long run but not immediately.... The relational data model provides a direct method to specify data as well as queries where users state directly the information contained in the database and the type of information that need for it....
6 Pages (1500 words)

The Impact of Social Media Technologies on Business

Second, the advantages of social media technologies to business organizations are discussed.... First, by using social media technologies, organizations gain access to a wide database of information about individuals.... s much as organizations stand to benefit from incorporating social media technologies in their strategies, there are several disadvantages that they may be confronted with as well.... what usually happens is that business organizations may fail to regulate the information about them that is generated by users and shared across different platforms....
4 Pages (1000 words)

Internal Knowledge Management Techniques in Large Consultancies

… The paper "Internal Knowledge Management Techniques in Large Consultancies" is a great example of management coursework.... nbsp;The extant literature presents consultancies as important knowledge suppliers, which pursue different knowledge management strategies.... The planning of how to manage internal knowledge is bolstered by prior consideration that knowledge is pivoted by two major scales: explicit and tacit....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us