Nobody downloaded yet

Database Architecture and Administration - Essay Example

Comments (0) Cite this document
The aim of this essay is to present an evolutionary history of various Database Models over the four decades of their existence. The essay attempts to list the strengths and weaknesses of each model and discuss the causes that led to their development…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Database Architecture and Administration
Read TextPreview

Extract of sample "Database Architecture and Administration"

Download file to see previous pages As the paper declares the navigational Model encompasses the “network model” and “hierarchical model” of database interfaces. The network model was developed by Charles Bachman in 1971 to define and set a standard for database systems. This model had a collection of records, connected to each other through links. Various record types were interconnected to each other, thus allowing a many-to-many relationship. IDS and IDMS are both examples of the network model. A network model can be explained using this schematic diagram.
This discussion explores that navigational databases are open-ended and are best suited to handle small-scale data. However, it is difficult to search for data in this system since it does not have the search functionality. The system had to be navigated “manually”, that is to reach a particular record, one had to start at the parent record and then navigate step-by-step until one reaches the desired record. Due to these limitations, navigational database models became outdated by 1980s, though a form of the hierarchical model is still used in XML applications. The main distinguishing feature of the relational model is that the data is organized in a tabular form in rows and columns. The rows list the data while columns list the attributes. A key is chosen that uniquely identifies every row in the table and links different records from different tables. To find a particular set of data, a “query” is generated which mines the entire database to return the required answer. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Database Architecture and Administration Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved de
(Database Architecture and Administration Essay Example | Topics and Well Written Essays - 2250 Words)
“Database Architecture and Administration Essay Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database Architecture and Administration


...?Task a) and b) The ER-Diagram consists of five main entities, ly VISIT, BOOKING, OWNER, DOG, and INVOICE. The relationships can be explained in detail considering their cardinalities, participations and constraints according to the given scenario. CLASS/VISIT and BOOKING A CLASS/VISIT can have several BOOKINGs and a one BOOKING have a single corresponding CLASS/VISIT. Hence a one to many relationship exits between these entities (Marked with 1 and M near the respective entity). A CLASS/VISIT may or may not have booking at a time and it is considered a BOOKING is optional for a CLASS/VISIT and CLASS/VISIT is mandatory for a booking (marked with a circle on BOOKING as the optional side). A class can either have no bookings... a) and b) The...
4 Pages(1000 words)Assignment


...?Business Systems and Process/Operations Management INDIVIDUAL REPORT 2 – INDIVIDUAL ASSIGNMENT Carrefour Case Study Table of Contents INTRODUCTION In the past, the purpose of implementing information technology in the businesses was to offer reports and some small business analysis charts to a small number of managerial staff. But with the passage of time, administrative structures have turned out to be less hierarchical and more decentralized. Thus, there is need to offer data and information to remotely located departments of business. Additionally, due to these changes in business structures, the information delivery process is also changed. In this scenario, IT managers face a lot of challenges in an attempt to bring...
8 Pages(2000 words)Essay


...users are allowed to perform on the database. This is the main method of securing data in a database. Access to the database mostly requires correct username and a password which is assigned by the database administrator. The database administrator identifies legitimate users of the database and assigns each a passwords that they use to directly or indirectly access the database for manipulation, retrieval or updating of the data. The second issue that is concerned with database security is database vulnerabilities. Threats from a variety of sources such...
5 Pages(1250 words)Coursework


...? Creating an Extended Entity Relationship Model (EERM) Creating an Extended Entity Relationship Model (EERM) We use a classical four-layered approach to inductive specification of database structures. The first layer is the data environment, called the basic data type scheme, which is defined by the system or is the assumed set of available basic data. The second layer is the schema of a given database. The third layer is the database itself representing a state of the application's data often called micro-data. The fourth layer consists of the macro-data that are generated from the micro-data by application of view queries to the micro-data (DIETRICH, 2011). The second layer is diversely treated by database modeling languages... for...
6 Pages(1500 words)Assignment

Database systems and Administration

...: In order to ensure that a database performs at optimum efficiency it is vital that the organization employs a full time IT team that comprises of a database administrator. The administrator must emphasize the organization into normalizing as many tables as possible. Second technique that a database administrator must implement is allowing the database to grow without compromising the system’s performance. Usually a system’s speed decreases as the size of the data increases. This means that it is vital that a database administrator must always keep free space to ensure that there is room...
16 Pages(4000 words)Essay


...are held on record. Products are identified by their name and records of the product type and a description of the product are kept. i.) Design an E-R diagram for the above database ii.) Derive a corresponding relational scheme from your E-R diagram. Table Assets: assetID (primary) productID (primary) location LeaseRenewalDate Table Assets Inspection: inspectionID (primary) inspectorID (primary) assetID (primary) maintenanceDate maintenanceAction Table Inspectors: inspectorID (primary) name position Table Products: productID (primary) name type description Question 2: A garden plant supplier keeps data about their customers, orders and the plants they sell in a relational database with the...
4 Pages(1000 words)Assignment

Database 201202 Mary Leaky Computer Science 201203 Andrew Breason Engineering 201204 Brook Forestor Communication Skills 201205 Achipolopolo Andrew Computer Science Courses Table Course_Number Course_Name Trainer_Emp_No Train_Location 10001 Database Administration 201201 Lecture 1 10002 Computer Application 201202 Lecture Hall 5 10003 Information System 201202 Computer Lab 10004 Object Oriented Programming 201203 Computer Lab 10005 System Analysis And Design 201204 Lecture Hall 7 Work cited 1. Business Database Systems (2008).Oxford University press. Peter Rob, Carlos...
1 Pages(250 words)Essay

Description of Bioterrorism Response System

...Bioterrorism Response System Introduction To respond to bioterrorism attacks, health officials must play their part in helping detect, communicate and manage such events. Technological advance enables health officials, including nurses to respond to an attack. To create a database for use in bioterrorism response, certain factors have to be considered; purpose of the system, being detection, diagnosis, management, and communication, clinical evaluation of the system and system security (Gill, 2008). Information from the system should help officials make accurate decisions. For the system to function accordingly, it has to have a measure of accuracy. Sensitivity is required in order to detect the smallest hints of attack....
1 Pages(250 words)Research Paper

Database Administration -2

...Database Administrator Skills The database Administrator is responsible for establishing effective control over the database, moreover, the performance/efficiency, integrity or correctness and security of an information system database. However, depending on the experience and organization the role and responsibility of the database administrator varies, therefore, the skills also always need to be improved with the passage of time. The following list provides all the required skills of the database administrator for information system database of large...
4 Pages(1000 words)Essay

Computer Systems Architecture and Administration

...Computer Systems Architecture and Administration a. Virtual Machine (VM) is a stratum of software that imitates the hardware of an ordinary computer system. In this regards, the A virtual-machine monitor is a suitable technique for adding functionality below ordinary operating system and application software. For instance, one class of virtual-machine monitor is commonly referred to as Type II virtual-machine monitors (VMMs) is structured on the abstractions delivered by a host operating system. Type II VMMs are sophisticated and expedient, but their performance is presently slower than that realized when running outside a virtual machine- in a standalone system. In broad terms, a virtual machine is a...
8 Pages(2000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Database Architecture and Administration for FREE!

Contact Us