Students can't be Wrong!
GET BEST GRADE, ORDER NOW
Types Of Actions Involve Database
205 Downloads | 4 Pages 823 Words | Published Date: 04/12/2015
2. What are the responsibilities of the DBA and the database designers?
3. What is the difference between a database schema and a database state?
4. What is the difference between procedural and nonprocedural DMLs?
5. What is the difference between the two-tier and three-tier client/server architectures?
The database is a database system which allows users to maintain their database. There are basically four actions which involved in the database-
- Define Database
- Construct Database
- Manipulate Database
- Share Database
The database definition is to define the database like database structure, database type to store data into database. It is called metadata of the data.
Construct database is the process in which the data get stored into the database and can be maintained by the DBMS.
Manipulate database is to retrieve database by using query and to insert, update and delete the database also.
Share database is to share database among many users so that more than one user can access database at one time.
DBA and the database designer both are responsible for data maintenance and data construction in an organization. Following are some responsibilities of DBA and the database designer-
- Database Security
- Design Database
- Implement Data Models
- Resolve Capacity Issues
- Resolve Performance Issues
- Maintain Database
The database schema is the metadata. It is the initial stage of the database. When the database is defined and implemented first time, only database schema is defined at that time.
The database state is the state of the database, which gets changed on every action upon the database. When the database is implemented first time, the database state is null and after inserting data into database, the database state gets changed.
The database schema is called intension while the database state is called extension in the database. (GITTA 2006)
4 What is the difference between procedural and nonprocedural DMLs?
DML is a data manipulation language. Data manipulation operations are described following-
- Insertion into database
- Retrieve database
- Edit database
- Delete database
Data manipulation language is the most important part of the DBMS. It is supported in all DBMS. There are two types of the data manipulation languages – Procedural Data Manipulation Language and Nonprocedural Data Manipulation Language.
Procedural Data Manipulation Language
Procedural Data Manipulation Language is the language which defines what data needs to be retrieve and it defines the process also; after retrieving the data, another set of data can be retrieved by the same procedure.
Nonprocedural Data Manipulation Language
Nonprocedural Data Manipulation Language is the language which defines what data needs to be retrieve without specifying the process.
There are two types of the client server architecture-
- Two-tier architecture
- Three-tier architecture
This is the basic type of the client server architecture. Two-tier architecture is generally used in all communication networks. Following figure is describing the process of two-tier architecture-
In this the client sends the request to the server for the resources and the server responds directly to the client. There is no any third party involved in the complete process. The server does not call any other application or any other machine to accomplish the user request.
In this architecture there is one middle layer exist between the user and the database system. The middle layer is the application server that interacts with the client and data server. Following three are the important units in the three-tier architecture-
The client requests the resources to the server and is equipped with the user interface for the presentation of the response of the server.
The application server is the middle layer in the three-tier client server architecture. The application server provides the resources to the clients that are requested by the client from the user interface. The application server call the another database server to complete the specified task.
The data server is the main important unit in the three-tier client server architecture. The data server provides the data to the application server that is required. Following figure is describing the process of three-tier architecture-
 Microsoft 2012, Client/Server Architecture, Viewed on 17th Jan 2015 <https://technet.microsoft.com/en-us/library/cc917543.aspx>
 Client-Server Architecture, Kathleen R. Murray May 2002, Viewed on 17th Jan 2015
TechTarget 2015, White Paper: The role of the database administrator, Viewed on 17th Jan 2015 <https://www.computerweekly.com/feature/White-Paper-The-role-of-the-database-administrator>
GITTA 2006, Database Schemes and Database Instances, Viewed on 17th Jan 2015 <https://www.gitta.info/DBSysConcept/en/html/DataModSchem_learningObject2.html>
 Winstudent 2014, The Database Manipulation Language (DML), Viewed on 17th Jan 2015 <https://www.winstudent.com/the-data-manipulation-language-dml/>
MyAssignmenthelp.com delivers assignment help to millions of students of USA. We have in-house teams of assignment writers who are experts on wide ranges of subjects. We have appointed teams of native writers who provide assignment help to students in New York City and all over the USA. They are skilled assignment writers who successfully cater to search terms likeâ€™ do my assignment in the USA' and readily entertain queries related to write my assignments.
Most Downloaded Sample of Programing
166 Download | 2 Pages 309 Words
1. How do these items act as barriers to intercultural communication?Answer: The communication barriers Linguistic, Cultural and Emotional act as barriers for...
65 Download | 2 Pages 429 Words
A just and fair decision always reflects an objective process, however, not all decisions are fair and just because they have influences and impacts that is actuall...
159 Download | 10 Pages 2,301 Words
Question - Write a case study on Digital Forensic methodology? ContentsExecutive Summary.Introduction. Global F...
39 Download | 10 Pages 2,338 Words
Table of ContentsIntroductionWeek 3: Critical ThinkingWeek 5: SWOT analysis of presentation skillsWeek 7: Reflective WritingWeek 11: Personal Ethi...
90 Download | 16 Pages 3,848 Words
Question-Write A report based on role of information technology of financial corporate sector company Aldermore bank? Executive summaryThe report i...
254 Download | 9 Pages 2,091 Words
Question-Q1.Design a work break down structure (WBS) for this project with milestones?Q2. What are the key risks and how would you manage them?Q3. What are the key ...
244 Download | 24 Pages 5,949 Words
The small business organizations need to have adoption of the cloud computing practices to a significant level. With the adoption of cloud computing...
128 Download | 11 Pages 2,608 Words
Question :Write a Literature Review for the Topic/Project below following a set structure. The Literature Review is a critical examination of the most relevant, r...
55 Download | 9 Pages 2,202 Words
Question 1 :Give a brief introduction and explanation (approximately 500 words) of the technology that you have chosen and then produce a technology road map that s...
140 Download | 15 Pages 3,562 Words
Introduction:Internet marketing or online marketing is the approach where the marketers are promoting the products with the help of internet. Under this process, th...
358 Download | 10 Pages 2,446 Words
Question:1. Briefly describe the business processes supported by a Supply Chain Management (SCM) information system. In a global business like Emerson what are th...
230 Download | 5 Pages 1,196 Words
Question:Read the case study ‘Success to Succession’. • Identify the importance of wetware costs. • Identify an organisation implementing an A...
308 Download | 9 Pages 2,002 Words
IntroductionThe current digital age allows most of the organisations around the world to have the information and communication technologies to have the business ...
292 Download | 9 Pages 2,193 Words
IntroductionIn this briefing paper, the ICT topic ‘Big Data’ will be reviewed from literatures. Big data is the new IT buzzword that refers to the vol...
323 Download | 7 Pages 1,626 Words
IntroductionIt is not necessary that a crime can only take place outside the protection of the home. In fact a large number of crimes take place in the home also....
205 Download | 4 Pages 823 Words
Question:1. What four main types of actions involve databases? Briefly discuss each.? 2. What are the responsibilities of the DBA and the database designers? 3. Wha...
45 Download | 7 Pages 1,743 Words
Question :What is effective professional communication? Answer:Professional communication is emerging as an area of investigation in various discipline...
349 Download | 2 Pages 332 Words
Question:To give you practical experience in using Entity-Relationship and Relational Database modeling techniques. Project Specifi...
192 Download | 10 Pages 2,454 Words
Question:Snort Rules &nbs...
20 Download | 12 Pages 2,870 Words
Question:As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare digital forensics investigative plan to enable a systematic...