tailieunhanh - Lecture Fundamentals of database systems: Chapter 1 - Emasri, Navathe
Chapter 1 of lecture Fundamentals of database systems include content: Types of databases and database applications, basic definitions, typical DBMS functionality, example of a database, main characteristics of the database approach, database users, advantages of using the database approach, when not to use databases. | Copyright 2007 Ramez Elmasriand Shamkant B. Navathe e iiTypeso iíDanạbSsesandíDatabaseiiiiiiiiiiiii Types of Databases and Database Applications Basic Definitions Typical DBMS Functionality Example of a Database UNIVERSITY Main Characteristics of the Database Approach Database Users Advantages of Using the Database Approach When Not to Use Databases Traditional Applications Numeric and Textual Databases More Recent Applications Multimedia Databases Geographic Information Systems GIS Data Warehouses Real-time and Active Databases Many other applications First part of book focuses on traditional applications A number of recent applications are described later in the book for example Chapters 24 26 28 29 30 Copyright 2007 Ramez Elmasri and Shamkant B. Navathe lide 1 Copyright 2007 Ramez Elmasri and Shamkant B. Navathe Slide 1-4 Database A collection of related data. Data Known facts that can be recorded and have an implicit meaning. Mini-world Some part of the real world about which data is stored in a database. For example student grades and transcripts at a university. Database Management System DBMS A software package system to facilitate the creation and maintenance of a computerized database. Database System The DBMS software together with the data itself. Sometimes the applications are also included. Copyright 2007 RamezElmasri and Shamkant B. Navathe Slide 1-5 1 Define a particular database in terms of its data types structures and constraints Construct or Load the initial database contents on a secondary storage medium Manipulating the database Retrieval Querying generating reports Modification Insertions deletions and updates to its content Accessing the database through Web applications Processing and Sharing by a set of concurrent users and application programs - yet keeping all data valid and consistent Other features Protection or Security measures to prevent unauthorized access Active processing to take internal actions on data Presentation and .
đang nạp các trang xem trước