9. Database Systems (in practice) – 3marks Flashcards
The three schema architecture involves the levels of:
- External (end user view)
- Conceptual (mapping)
- Internal (how data is mapped and stored in the DB)
The three main DBMS languages used by SQL are:
Acronym to remember the three groups: DMC
• Data Definition Language (DDL): Provides commands to create and modify database structure and constraints.
• Data Manipulation Language (DML): Provides commands to insert, delete, update and retrieve
• Data Control Language (DCL): Provides commands to control the access of data
Pro’s of DBMS’s include:
- Separation of data from applications
- Push-down common functions (general-purpose systems!)
- Separation of physical structures and logical structures
- Relational model and theory
- Non-procedural query language
- Concurrency control and recovery
- High performance query processing
Cons of DBMS’s include:
- The Closed-World assumption
- A piece of software, independent of hardware platforms (for too long!)
- A victim of its own success (extensions not well supported)
- Limited data types
Characteristics of database approach are:
- Insulation between programs and data
- Support of multiple views of data
- Use of a catalog to store schema
Three schema architecture was proposed as it provided two types of data independence, being:
- Logical Data Independence
* Physical Data Independence
Describe the two types of Data Independence?
LOGICAL - The capacity to allow independent changes on conceptual schema without having to change external schemas or the application programs that access the database via the external schemas
PHYSICAL - Capacity to change internal schema without having to change the conceptual (or external) schemas
A System Catalog does what?
Stores database definitions (metadata) which describe the structure, type & constraints of the data
Semantic integrity constraints can be created, such as:
- triggers (SQL CREATE TRIGGER)
* assertions (SQL CREATE ASSERTION)
Assertions involve:
• Keys, entity constraints and referential integrity are structural constraints that are managed by the DBMS
Triggers involve:
- Like Assertions, Triggers are also stored in the database, and hence managed by the DBMS
- However, rather than aborting an operation because of a constraint violation, the DBMS, through Triggers, can make an alternative option available