Database Management Systems: Analysis, Comparison, and Security
VerifiedAdded on 2025/04/16
|12
|2729
|226
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes database management systems.

LO1 Analyse different types of database management systems
Database: The term “database” refers to the storage of any kind of data in the system. It includes
a different set of data, their storage, the way in which these sets are managed & relations
between them and the process used for restore or retrieval of the data. Different logical structures
are used for the development and creation of a database. The creation of logical structures is
known as “Data Modelling”. With the development of technology, different data models have
been developed for the designing of a better and improved database for industries and various
organizations (Rai and Singh, 2015).
History of Database: In the early age before 1950’s plain papers were used for data storage
which was very hard to manage for big organizations, as a result, a better system for the storage
and management of data was required Then with the development of the computer system, punch
cards were developed for the storage, management and retrieval of data. That was an easier and
faster way to manage data in comparison with data on plain paper. The first database
management system “DBMS” was developed by Charles W. Bachman in 1960. After that,
different new techniques and systems were designed with the development of various new
technologies resulting in the development of a much improved and faster system for the database
management. A table is shown below for the history of the database management system
“DBMS” (Homan, Kovacs and Morris, 2009).
Table 1: Brief history of DBMS
Year Technology used or developed
1960’s Hierarchical and Network
1970’s Relational
1990’s Object-oriented and Object-relational
1995 and above Java, XML, CMDB, IMDB and others
P1 Compare and contrast the different types of database models.
Data models: It is a combination of two different words “Data” and “Model” which have
different meanings. Data means the information, file or folder and image in a digital form while
Database: The term “database” refers to the storage of any kind of data in the system. It includes
a different set of data, their storage, the way in which these sets are managed & relations
between them and the process used for restore or retrieval of the data. Different logical structures
are used for the development and creation of a database. The creation of logical structures is
known as “Data Modelling”. With the development of technology, different data models have
been developed for the designing of a better and improved database for industries and various
organizations (Rai and Singh, 2015).
History of Database: In the early age before 1950’s plain papers were used for data storage
which was very hard to manage for big organizations, as a result, a better system for the storage
and management of data was required Then with the development of the computer system, punch
cards were developed for the storage, management and retrieval of data. That was an easier and
faster way to manage data in comparison with data on plain paper. The first database
management system “DBMS” was developed by Charles W. Bachman in 1960. After that,
different new techniques and systems were designed with the development of various new
technologies resulting in the development of a much improved and faster system for the database
management. A table is shown below for the history of the database management system
“DBMS” (Homan, Kovacs and Morris, 2009).
Table 1: Brief history of DBMS
Year Technology used or developed
1960’s Hierarchical and Network
1970’s Relational
1990’s Object-oriented and Object-relational
1995 and above Java, XML, CMDB, IMDB and others
P1 Compare and contrast the different types of database models.
Data models: It is a combination of two different words “Data” and “Model” which have
different meanings. Data means the information, file or folder and image in a digital form while
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

the Model means the way of representation and both together forms “Data Models” which means
the logical representation of data. Data models consist of the following objects:
Source of data
Contents and object of the data
Relations between different data.
There are various techniques used for data modeling in order to design and develop different data
models for a complete database. Database models are classified into four types which are given
below (Rai and Singh, 2015).
1. Hierarchical database
2. Network database
3. Relational database
4. Object-oriented database
Hierarchical database: It is a type of database modeling in which data are arranged in a tree-
like structure and links are used to connect two different data sets to form a complete database.
These links used for the connections act as the connector between two data set which defines the
relation and rules & regulation followed to store and retrieve data in the database (Morris, 2015).
A simple example of a hierarchical database model for a company is shown below.
Figure 1: Hierarchical database model
the logical representation of data. Data models consist of the following objects:
Source of data
Contents and object of the data
Relations between different data.
There are various techniques used for data modeling in order to design and develop different data
models for a complete database. Database models are classified into four types which are given
below (Rai and Singh, 2015).
1. Hierarchical database
2. Network database
3. Relational database
4. Object-oriented database
Hierarchical database: It is a type of database modeling in which data are arranged in a tree-
like structure and links are used to connect two different data sets to form a complete database.
These links used for the connections act as the connector between two data set which defines the
relation and rules & regulation followed to store and retrieve data in the database (Morris, 2015).
A simple example of a hierarchical database model for a company is shown below.
Figure 1: Hierarchical database model

Network database: In this type of database modeling, designing of the database is done in a
graphical form with the help of pointers used as connectors from one data to another. The main
purpose of the pointer is to point the next available data in the database. It is flexible in
comparison with the hierarchical database model as it contains proper navigation for the easy
storage and retrieval of data in a database (Morris, 2015). An example of a network database is
shown below for a simple store.
Figure 2: Network database model
Relational database: It is a modified version of database modeling in which tabular form
representation is used. All the data models and their relations are stored in a tabular form which
is divided into a set of various rows and columns (Morris, 2015). A simple example of a
relational database is shown below.
Figure 3: Relational database model
graphical form with the help of pointers used as connectors from one data to another. The main
purpose of the pointer is to point the next available data in the database. It is flexible in
comparison with the hierarchical database model as it contains proper navigation for the easy
storage and retrieval of data in a database (Morris, 2015). An example of a network database is
shown below for a simple store.
Figure 2: Network database model
Relational database: It is a modified version of database modeling in which tabular form
representation is used. All the data models and their relations are stored in a tabular form which
is divided into a set of various rows and columns (Morris, 2015). A simple example of a
relational database is shown below.
Figure 3: Relational database model
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Object-oriented database: The basic principle of this database modeling is object-oriented
programing. It consists of different objects, relations and contents of data including all the
processes as well actions taken place while storage and retrieval of the data. All the details of the
actions and techniques used are stored in the database system (Morris, 2015).
A comparison table for different database models is shown below.
Table 2: Comparison table for database models
Hierarchical database Network database Relational database Object-oriented
database
Logical design is
very simple.
Logical design is
very simple.
Logical design is a bit
hard.
Logical design is
complex.
Implementation is
complex.
Implementation is
complex.
Implementation is
simple.
Implementation is
simple.
It does not support
for large data.
It support large data
in comparison with
hierarchical database.
It supports large data. It also support large
data.
It promotes
conceptual simplicity.
It promotes a
navigational system.
It promotes a tabular
system.
It promotes
inheritance with the
navigational system.
It has a limitation of
data integrity and
structural
independency.
It has a limitation of
standards and
structural
independency.
It has a limitation of
supporting text and
numerical value only.
It has a complex
navigational system.
Change in structure
means the change in
complete application
programs.
Change in structure
means the change in
complete application
programs.
Change in structure
does not require the
change in complete
application programs.
Change in structure
does not require the
change in complete
application programs.
programing. It consists of different objects, relations and contents of data including all the
processes as well actions taken place while storage and retrieval of the data. All the details of the
actions and techniques used are stored in the database system (Morris, 2015).
A comparison table for different database models is shown below.
Table 2: Comparison table for database models
Hierarchical database Network database Relational database Object-oriented
database
Logical design is
very simple.
Logical design is
very simple.
Logical design is a bit
hard.
Logical design is
complex.
Implementation is
complex.
Implementation is
complex.
Implementation is
simple.
Implementation is
simple.
It does not support
for large data.
It support large data
in comparison with
hierarchical database.
It supports large data. It also support large
data.
It promotes
conceptual simplicity.
It promotes a
navigational system.
It promotes a tabular
system.
It promotes
inheritance with the
navigational system.
It has a limitation of
data integrity and
structural
independency.
It has a limitation of
standards and
structural
independency.
It has a limitation of
supporting text and
numerical value only.
It has a complex
navigational system.
Change in structure
means the change in
complete application
programs.
Change in structure
means the change in
complete application
programs.
Change in structure
does not require the
change in complete
application programs.
Change in structure
does not require the
change in complete
application programs.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

M1 Assess how relational database models and the process of normalisation can
provide reliable and efficient data structures.
Relational database model: It plays an important role in various organizations and industries
for database management. It was developed in 1970 by E.F. Codd. For any database to be a
relation, it must have the property of atomicity, isolation, consistency and durability (Salehnia,
2015). Different rules were purposed by E.F. Codd for the relational database model which are
given below.
1. Foundation rule: For any database to be relational, it must be able to manage the
database entirely through the relational capabilities.
2. Information rule: All the information must be stored in tabular form including metadata.
3. Guaranteed Access Rule: Each data element should be accessible by the table name,
primary key and the attribute.
4. Systematic treatment of NULL: It should be used only for missing, unknown or no value.
5. Active Online Catalog: Database catalog must be stored online and governed by an
authorized user.
6. Comprehensive Data Sub-language Rule: There must be a managed language to allow
access to stored data of the database in all manners.
7. View Updating Rule: All the update in the database should be updated automatically by
the system.
8. Relational Level Operation: Different operations like Insert, Delete and Update should
be supported at each level of relations.
9. Physical data independence: Physical storage or location of data should not affect the
application.
10. Logical data independence: Any change in the logical structure should not affect at the
application level, it should remain the same.
11. Integrity Independence: Any modification in integrity constraints should not affect an
application layer.
12. Distribution Independence: Database should work without any effect on the basis of
distribution across network or different locations.
provide reliable and efficient data structures.
Relational database model: It plays an important role in various organizations and industries
for database management. It was developed in 1970 by E.F. Codd. For any database to be a
relation, it must have the property of atomicity, isolation, consistency and durability (Salehnia,
2015). Different rules were purposed by E.F. Codd for the relational database model which are
given below.
1. Foundation rule: For any database to be relational, it must be able to manage the
database entirely through the relational capabilities.
2. Information rule: All the information must be stored in tabular form including metadata.
3. Guaranteed Access Rule: Each data element should be accessible by the table name,
primary key and the attribute.
4. Systematic treatment of NULL: It should be used only for missing, unknown or no value.
5. Active Online Catalog: Database catalog must be stored online and governed by an
authorized user.
6. Comprehensive Data Sub-language Rule: There must be a managed language to allow
access to stored data of the database in all manners.
7. View Updating Rule: All the update in the database should be updated automatically by
the system.
8. Relational Level Operation: Different operations like Insert, Delete and Update should
be supported at each level of relations.
9. Physical data independence: Physical storage or location of data should not affect the
application.
10. Logical data independence: Any change in the logical structure should not affect at the
application level, it should remain the same.
11. Integrity Independence: Any modification in integrity constraints should not affect an
application layer.
12. Distribution Independence: Database should work without any effect on the basis of
distribution across network or different locations.

13. Non-Subversion Rule: There must be specific rules designed for low-level access so that
they should not be able to make any change in the data.
Normalization in database: It is a process in which designing of a database is done in an
organized way to be perfect and meet all the basic requirements like zero redundancy and logical
dependency of data in the database. For the database to be inconsistent form or state,
normalization of the database must be done. It is an efficient way to design and develop a
database for industries and other organizations as normalization reduces the size of database
resulting in increasing the performance of the database. An example of a normalized database is
shown below.
Figure 4: Normalized database
There are different processes used for the management of database which is very important for
the better performance of the database. This management technique is divided into various sub-
points used for the management such as data integrity, referential integrity, concurrency control
and others. All these processes results in an efficient and effective development of the database
for different organizations and industries.
they should not be able to make any change in the data.
Normalization in database: It is a process in which designing of a database is done in an
organized way to be perfect and meet all the basic requirements like zero redundancy and logical
dependency of data in the database. For the database to be inconsistent form or state,
normalization of the database must be done. It is an efficient way to design and develop a
database for industries and other organizations as normalization reduces the size of database
resulting in increasing the performance of the database. An example of a normalized database is
shown below.
Figure 4: Normalized database
There are different processes used for the management of database which is very important for
the better performance of the database. This management technique is divided into various sub-
points used for the management such as data integrity, referential integrity, concurrency control
and others. All these processes results in an efficient and effective development of the database
for different organizations and industries.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO4 Demonstrate the system administration and management tools available
on the chosen platform
With the development of new methods and techniques to design the best database with proper
functioning and better performance, different management and administrations tools and
techniques required. System administration and management have become the most important
part of a database in order to provide better security, high performance and avoid multiple
security risks. Without proper management and security arrangements, data stored in a database
might be stolen, infected with malware or potential threats and also provide invitations to online
hackers and attackers.
P5 Demonstrate the tools available in the system to monitor and optimise system
performance, and examine the audit logs.
Tracing database activities: It is an important and key point of all the database to trace all the
activities which have been performed on the database. It helps in the management and
troubleshooting of different errors & problems generated in the database. However, it has a
drawback of reducing the performance of the database. The operation of database tracing is
divided into five sub-operations which are given below.
1. Starting the database trace: It is the initial phase of the tracing operation of a database
for the management and audit of the stored database. “Enable” option is used for starting
tracing of the database activities.
2. Stopping the database trace: Once the activities of a database has been traced “Disable”
option is used to stop the tracing activity. It should be done once the activity has been
traced as per the requirement of the user or developer.
3. Exporting the trace of the database for the management: It is done to share all the
information collected during tracing for the management and troubleshooting if any
required for the management part.
4. Exporting the database for the audit: It is done for the audit of a stored database on the
basis of collected information as well as troubleshooting if any required for the audit part.
5. Delegating database trace: It is a process of providing authorization to manage the
process of tracing in the database by different users.
on the chosen platform
With the development of new methods and techniques to design the best database with proper
functioning and better performance, different management and administrations tools and
techniques required. System administration and management have become the most important
part of a database in order to provide better security, high performance and avoid multiple
security risks. Without proper management and security arrangements, data stored in a database
might be stolen, infected with malware or potential threats and also provide invitations to online
hackers and attackers.
P5 Demonstrate the tools available in the system to monitor and optimise system
performance, and examine the audit logs.
Tracing database activities: It is an important and key point of all the database to trace all the
activities which have been performed on the database. It helps in the management and
troubleshooting of different errors & problems generated in the database. However, it has a
drawback of reducing the performance of the database. The operation of database tracing is
divided into five sub-operations which are given below.
1. Starting the database trace: It is the initial phase of the tracing operation of a database
for the management and audit of the stored database. “Enable” option is used for starting
tracing of the database activities.
2. Stopping the database trace: Once the activities of a database has been traced “Disable”
option is used to stop the tracing activity. It should be done once the activity has been
traced as per the requirement of the user or developer.
3. Exporting the trace of the database for the management: It is done to share all the
information collected during tracing for the management and troubleshooting if any
required for the management part.
4. Exporting the database for the audit: It is done for the audit of a stored database on the
basis of collected information as well as troubleshooting if any required for the audit part.
5. Delegating database trace: It is a process of providing authorization to manage the
process of tracing in the database by different users.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Monitoring and optimizing performance of a database: The performance of a database
depends on two important factors named “monitoring and optimization”. Both are two different
operations. Monitoring means to collect all the information of different activities like a periodic
check of the performance, collecting logs for the errors generated and maintaining records of the
performance while optimization means the processes used to maximize the performance and
reduce the errors. Both together helps in achieving high performance of the database with
minimum errors (Microsoft, 2012).
Benefits of monitoring and optimization of a database are as follow:
1. It helps the developer or administrator to improve the performance of the database.
2. It helps in easily evaluation of different activities performed by users.
3. It helps in regular maintenance of the database.
4. It helps in troubleshooting of various errors generated in the database.
There are different other processes also done for the better performance of the database like audit
trails, managing different alerts and notifications in order to enhance the working and
performance of the database. Audit trails and process consists of various factors for an example
the type of SQL statement executed, username, time, application and others. Different logs
which are collected by the audit for different activities done by the users in a database are given
below.
User
Timestamp
Client and server host
Operations
Query ID
Connection address or ID
Table
Error code
Database maintenance: It is defined as a collection of different tasks performed for the
improvement and enhancement of the database. Some of the examples of the task performed in
the database maintenance are routine checkup for performance, free up space in the database,
depends on two important factors named “monitoring and optimization”. Both are two different
operations. Monitoring means to collect all the information of different activities like a periodic
check of the performance, collecting logs for the errors generated and maintaining records of the
performance while optimization means the processes used to maximize the performance and
reduce the errors. Both together helps in achieving high performance of the database with
minimum errors (Microsoft, 2012).
Benefits of monitoring and optimization of a database are as follow:
1. It helps the developer or administrator to improve the performance of the database.
2. It helps in easily evaluation of different activities performed by users.
3. It helps in regular maintenance of the database.
4. It helps in troubleshooting of various errors generated in the database.
There are different other processes also done for the better performance of the database like audit
trails, managing different alerts and notifications in order to enhance the working and
performance of the database. Audit trails and process consists of various factors for an example
the type of SQL statement executed, username, time, application and others. Different logs
which are collected by the audit for different activities done by the users in a database are given
below.
User
Timestamp
Client and server host
Operations
Query ID
Connection address or ID
Table
Error code
Database maintenance: It is defined as a collection of different tasks performed for the
improvement and enhancement of the database. Some of the examples of the task performed in
the database maintenance are routine checkup for performance, free up space in the database,

collecting different error generated in the database, updating internal statics, checking for
hardware faults if any present and various other tasks. This maintenance includes maintenance of
both stored database as well as the server.
The overall maintenance task is divided into four parts which are shown below.
1. Defragmentation of index
2. Maintenance of log files
3. Managing disk space
4. Integrity check
P6 Demonstrate the tools available in the system to manage security and
authorisations.
Security is very important for any database and the management of security of database have two
modes “Security management and Authorization”. The process of security management is also
known as authentication. With the advancement of new technologies and methods to design and
develop a various database, security factor also arises as an important part for the development of
a secure database (MICHALSKA and PONISZEWSKA-MARANDA, 2014).
Security management or Authentication: It is a process of authentication with the help of
various security methods and parameters in order to allow the user to perform any action only in
the area where they are allowed and restricting them from accessing other areas to secure the
database from any risks.
Authorization: It is also a process of managing different authentications for the user and the
functions which the active user can perform. It is done by the database administrator or the
manager. There are two different types of permissions present the authorization process.
1. Primary permission
2. Secondary permission.
Different database security risks are as follow:
Access to key fields.
Errors with data extraction.
Access control in SQL
hardware faults if any present and various other tasks. This maintenance includes maintenance of
both stored database as well as the server.
The overall maintenance task is divided into four parts which are shown below.
1. Defragmentation of index
2. Maintenance of log files
3. Managing disk space
4. Integrity check
P6 Demonstrate the tools available in the system to manage security and
authorisations.
Security is very important for any database and the management of security of database have two
modes “Security management and Authorization”. The process of security management is also
known as authentication. With the advancement of new technologies and methods to design and
develop a various database, security factor also arises as an important part for the development of
a secure database (MICHALSKA and PONISZEWSKA-MARANDA, 2014).
Security management or Authentication: It is a process of authentication with the help of
various security methods and parameters in order to allow the user to perform any action only in
the area where they are allowed and restricting them from accessing other areas to secure the
database from any risks.
Authorization: It is also a process of managing different authentications for the user and the
functions which the active user can perform. It is done by the database administrator or the
manager. There are two different types of permissions present the authorization process.
1. Primary permission
2. Secondary permission.
Different database security risks are as follow:
Access to key fields.
Errors with data extraction.
Access control in SQL
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Access to surrogate information
Authentication
The discrepancy in the security of SQL
Encryption: It is another important parameter for the development of a secure database. The
word encryption means coding the important data or the information like user name and the
password into a secure form in order to secure important information of the user from online
hackers and attackers. A high encryption process has been used for the encryption of important
information and then stored in the database (DATA ENCRYPTION, 2018). Some examples of
encryption technique used are Edge Encryption, Azure disk encryption and Different VPN. A
figure showing basic encryption technique is shown below.
Figure 5: Encryption technique
Edge Encryption: It is a type of encryption system which helps the user to encrypt their user
name and password by their own including different fields and attachments. It works like a
firewall between the browser used by users and the server instance. The same decryption process
is used by the database or the server in order to decode that information to process the request
and store the information in a proper way (DATA ENCRYPTION, 2018).
M4 Assess the effectiveness of the system administration and management tools
available on the platform identifying any shortcomings of the tools
All the techniques and methods explained above in this report has been used for the development
and enhancement of the performance of the complete database in order to achieve effective
performance and hassle-free working of the database of both for the users as well the
organization for which database has been developed. The complete development of the database
has been done with keeping in mind all the important management and security factors with
Authentication
The discrepancy in the security of SQL
Encryption: It is another important parameter for the development of a secure database. The
word encryption means coding the important data or the information like user name and the
password into a secure form in order to secure important information of the user from online
hackers and attackers. A high encryption process has been used for the encryption of important
information and then stored in the database (DATA ENCRYPTION, 2018). Some examples of
encryption technique used are Edge Encryption, Azure disk encryption and Different VPN. A
figure showing basic encryption technique is shown below.
Figure 5: Encryption technique
Edge Encryption: It is a type of encryption system which helps the user to encrypt their user
name and password by their own including different fields and attachments. It works like a
firewall between the browser used by users and the server instance. The same decryption process
is used by the database or the server in order to decode that information to process the request
and store the information in a proper way (DATA ENCRYPTION, 2018).
M4 Assess the effectiveness of the system administration and management tools
available on the platform identifying any shortcomings of the tools
All the techniques and methods explained above in this report has been used for the development
and enhancement of the performance of the complete database in order to achieve effective
performance and hassle-free working of the database of both for the users as well the
organization for which database has been developed. The complete development of the database
has been done with keeping in mind all the important management and security factors with
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

different process available for the improvement of security as well as managing risks of the
database. Different operations like activity tracking, audit trails and various optimization as well
as performance monitoring tasks have been used for the routine check-up of the performance and
improvement on the performance by troubleshooting different errors generated in the database.
Also, the encryption techniques have been used for the coding important information to avoid
that information from being stolen by online hackers.
database. Different operations like activity tracking, audit trails and various optimization as well
as performance monitoring tasks have been used for the routine check-up of the performance and
improvement on the performance by troubleshooting different errors generated in the database.
Also, the encryption techniques have been used for the coding important information to avoid
that information from being stolen by online hackers.

References
Rai, P. and Singh, P. (2015) “Studies and Analysis of Popular Database Models,” International
Journal of Computer Science and Mobile Computing, 4(5), pp. 834–838. Available at:
https://www.ijcsmc.com/docs/papers/May2015/V4I5201554.pdf (Accessed: February 12, 2019).
Homan, J. V., Kovacs, P. J. and Morris, R. (2009) “A COMPARISON OF THE RELATIONAL
DATABASE MODEL AND THE ASSOCIATIVE DATABASE MODEL,” iacis, X(1).
Available at: http://iacis.org/iis/2009/P2009_1301.pdf (Accessed: February 12, 2019).
Morris, C. (2015) Database Systems Design, Implementation, and Management 11e Chapter 2
Data Models, csuohio. Available at:
http://cis.csuohio.edu/~sschung/IST331/Coronel_PPT_Ch02.pdf (Accessed: February 12, 2019).
Salehnia, A. (2015) Comparisons of Relational Databases with Big Data: a Teaching Approach,
asee. Available at: https://www.asee.org/documents/zones/zone3/2015/Comparisons-of-
Relational-Databases-with-Big-Data-a-Teaching-Approach.pdf (Accessed: February 12, 2019).
Microsoft. (2012). Monitor and Tune for performance. [online] Available at:
https://download.microsoft.com/download/0/F/B/0FBFAA46-2BFD-478F-8E56-
7BF3C672DF9D/Monitor%20and%20Tune%20for%20Performance.pdf [Accessed 13 Feb.
2019].
MICHALSKA, A. and PONISZEWSKA-MARANDA, A. (2014). SECURITY MECHANISMS
FOR DATA ACCESS IN ASPECTS OF TOOLS AVAILABLE IN .NET FRAMEWORK. [online]
Cejsh.icm. Available at: http://cejsh.icm.edu.pl/cejsh/element/bwmeta1.element.desklight-
308b6607-569c-42dd-895f-76eed41e9b30/c/ISIM_Vol_3_3__170-181.pdf [Accessed 13 Feb.
2019].
DATA ENCRYPTION (2018) servicenow. Available at:
https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/resource-
center/white-paper/wp-data-encryption-with-servicenow.pdf (Accessed: February 13, 2019).
Rai, P. and Singh, P. (2015) “Studies and Analysis of Popular Database Models,” International
Journal of Computer Science and Mobile Computing, 4(5), pp. 834–838. Available at:
https://www.ijcsmc.com/docs/papers/May2015/V4I5201554.pdf (Accessed: February 12, 2019).
Homan, J. V., Kovacs, P. J. and Morris, R. (2009) “A COMPARISON OF THE RELATIONAL
DATABASE MODEL AND THE ASSOCIATIVE DATABASE MODEL,” iacis, X(1).
Available at: http://iacis.org/iis/2009/P2009_1301.pdf (Accessed: February 12, 2019).
Morris, C. (2015) Database Systems Design, Implementation, and Management 11e Chapter 2
Data Models, csuohio. Available at:
http://cis.csuohio.edu/~sschung/IST331/Coronel_PPT_Ch02.pdf (Accessed: February 12, 2019).
Salehnia, A. (2015) Comparisons of Relational Databases with Big Data: a Teaching Approach,
asee. Available at: https://www.asee.org/documents/zones/zone3/2015/Comparisons-of-
Relational-Databases-with-Big-Data-a-Teaching-Approach.pdf (Accessed: February 12, 2019).
Microsoft. (2012). Monitor and Tune for performance. [online] Available at:
https://download.microsoft.com/download/0/F/B/0FBFAA46-2BFD-478F-8E56-
7BF3C672DF9D/Monitor%20and%20Tune%20for%20Performance.pdf [Accessed 13 Feb.
2019].
MICHALSKA, A. and PONISZEWSKA-MARANDA, A. (2014). SECURITY MECHANISMS
FOR DATA ACCESS IN ASPECTS OF TOOLS AVAILABLE IN .NET FRAMEWORK. [online]
Cejsh.icm. Available at: http://cejsh.icm.edu.pl/cejsh/element/bwmeta1.element.desklight-
308b6607-569c-42dd-895f-76eed41e9b30/c/ISIM_Vol_3_3__170-181.pdf [Accessed 13 Feb.
2019].
DATA ENCRYPTION (2018) servicenow. Available at:
https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/resource-
center/white-paper/wp-data-encryption-with-servicenow.pdf (Accessed: February 13, 2019).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.