logo

Report on Database and Their Uses

12 Pages3600 Words227 Views
   

Added on  2019-12-03

Report on Database and Their Uses

   Added on 2019-12-03

ShareRelated Documents
Information system management
Report on Database and Their Uses_1
Table of ContentsINTRODUCTION ...............................................................................................................................41.1 Concept of database management..............................................................................................41.2 Technical responsibilities of a database administrator...............................................................51.3 Analyse an organisations’ requirements for data storage and information gathering................61.4 Use of gathered database information in managerial decisions.................................................81.5 Strategies used by organization to deal with security threats information and database ..........9Conclusion..........................................................................................................................................10References...........................................................................................................................................11
Report on Database and Their Uses_2
Illustration IndexIllustration 1: DBMS............................................................................................................................5
Report on Database and Their Uses_3
INTRODUCTION Information management system used for managing the information in efficient andeffective way. Databases are used for storing and managing these informations. The system used formanaging these databases are called database management system. Management of informationhelps organisations in maximising their benefits in different fields. (Prajogo and Olhager, 2012).This report consists of proper description of database and their uses along the technicalresponsibilities of database administrator. It contains the requirement of organisations for datastorage and information gathering. Database security is also explained with effective techniques andstrategies. It is concluded with the summary of database and its uses in data security.1.1 Concept of database managementThe organised collection of data is called as database. It consists of schemas, tables, queries,views, etc. There are different types of databases like My SQL, Oracle, Microsoft SQL Server, etc.The general purpose databases contain definition, creation, querying and updating. Relational modelof database is one of the most popular and used model which uses SQL Language for querying andupdating the information (Mullins and Christiansen, 2015). Database systems are the combinationof database models, database management systems and databases. The functions provided bydatabases are as follows:Update: It contains modification, insertion and deletion of data.Definition: It consists of creation, modification and deletion of the definitions.Retrieval: The retrieval data can be available in the same form as it was inserted or in newform after updation.Administration: It contains data security, monitoring, controlling and recovering theinformation, any kind of failure in the system, etc (Lloyd, 2014).The languages used by database are of three types. These languages are explained below:Data Definition language (DDL): This language is used for defining data types andrelations among them.Data Manipulation language (DML): This contain different operations like inserting,deleting and updating data. Query languages: This language allows searching of information using different queries.
Report on Database and Their Uses_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Modelling & SQL Language : Assignment
|21
|2425
|31

Big Data: NoSQL Data Model, Database Management Systems, Implementation
|36
|2837
|431

ITC560 - Database Management System - Report
|8
|1460
|41

Structured Query Language - PDF
|9
|1603
|187

Database Design and Manipulation
|11
|1766
|50

Database Management: Components, Security, and Countermeasures
|15
|2284
|327