•Conflict Resolution

DBMS and its Advantages

Posted on

  • One of the main advantages of using a database system is that the organization can exert, via the DBA, centralized management and control over the data.
  • The database administrator is the focus of the centralized control. Any application requiring a change in the structure of a data record requires an arrangement with the DBA, who makes the necessary modifications.
  • Such modifications do not affect other applications or users of the record in question.

 

  • Reduction of Redundancies:Centralized control of data by the DBA avoids unnecessary duplication of data and effectively reduces the total amount of data storage required. It also eliminates the extra processing necessary to trace the required data in a large mass of data.
  • Elimination of Inconsistencies: The main advantage of avoiding duplication is the elimination of inconsistencies that tend to be present in redundant data files .Any redundancies that exist in the DBMS are controlled and the system ensures that these multiple copies are consistent

 

  • Shared Data: A database allows the sharing of data under its control by any number of application programs or users. For example, the applications for the public relations and payroll departments can share the same data.
  • Integrity: Centralized control can also ensure that adequate checks are incorporated in the DBMS to provide data integrity .Data integrity means that the data contained in the database is both accurate and consistent. Therefore, data values being entered for the storage could be checked to ensure that they fall within a specified range and are of the correct format.
  • Security: Data is of vital importance to an organization and may be confidential. Such confidential data must not be accessed by unauthorized persons. The DBA who has the Ultimate responsibility for the data in the DBMS can ensure that proper access procedures are followed, including proper authentication schemes for access to the DBMS and additional checks before permitting access to sensitive data. Different levels of security could be implemented for various types of data and operations.
  • Conflict Resolution: Since the database is under the control of the DBA, he/she should resolve the conflicting requirements of various users and applications. In essence, the DBA chooses  the best file structure and access method to get optimal performance for the response critical applications, while permitting less critical applications to continue to use the database, albeit with a relatively slower response

 

Posted By-: Vissicomp Technology Pvt. Ltd.

Website -: http://www.vissicomp.com