Free Sample   Types Of Actions Involve Database


Students can't be Wrong!






PhD Experts


250 Words

Types Of Actions Involve Database

  205 Downloads   |   4 Pages 823 Words   |   Published Date: 04/12/2015


1. What four main types of actions involve databases? Briefly discuss each.?
2. What are the responsibilities of the DBA and the database designers?
3. What is the difference between a database schema and a database state?
4. What is the difference between procedural and nonprocedural DMLs?
5. What is the difference between the two-tier and three-tier client/server architectures?


The database is a database system which allows users to maintain their database. There are basically four actions which involved in the database-

  • Define Database
  • Construct Database
  • Manipulate Database
  • Share Database
There are the basic actions which are necessary for the database users.

 Define Database

 The database definition is to define the database like database structure, database type to store data into database. It is called metadata of the data.

Construct Database

 Construct database is the process in which the data get stored into the database and can be maintained by the DBMS.

Manipulate Database

Manipulate database is to retrieve database by using query and to insert, update and delete the database also.

Share Database

 Share database is to share database among many users so that more than one user can access database at one time.

 DBA and the database designer both are responsible for data maintenance and data construction in an organization. Following are some responsibilities of DBA and the database designer-

  • Database Security
  • Design Database
  • Implement Data Models
  • Resolve Capacity Issues
  • Resolve Performance Issues
  • Maintain Database
 (TechTarget 2015)

 The database schema is the metadata. It is the initial stage of the database. When the database is defined and implemented first time, only database schema is defined at that time.

 The database state is the state of the database, which gets changed on every action upon the database. When the database is implemented first time, the database state is null and after inserting data into database, the database state gets changed.

 The database schema is called intension while the database state is called extension in the database. (GITTA 2006)

4 What is the difference between procedural and nonprocedural DMLs? 

 DML is a data manipulation language. Data manipulation operations are described following-

  • Insertion into database
  • Retrieve database
  • Edit database
  • Delete database

 Data manipulation language is the most important part of the DBMS. It is supported in all DBMS. There are two types of the data manipulation languages – Procedural Data Manipulation Language and Nonprocedural Data Manipulation Language.

Procedural Data Manipulation Language

 Procedural Data Manipulation Language is the language which defines what data needs to be retrieve and it defines the process also; after retrieving the data, another set of data can be retrieved by the same procedure.

 Nonprocedural Data Manipulation Language

 Nonprocedural Data Manipulation Language is the language which defines what data needs to be retrieve without specifying the process.

(Winstudent 2014)

 There are two types of the client server architecture-

  • Two-tier architecture
  • Three-tier architecture

 Two-tier architecture

 This is the basic type of the client server architecture. Two-tier architecture is generally used in all communication networks. Following figure is describing the process of two-tier architecture-


 In this the client sends the request to the server for the resources and the server responds directly to the client. There is no any third party involved in the complete process. The server does not call any other application or any other machine to accomplish the user request.

 Three-tier architecture

 In this architecture there is one middle layer exist between the user and the database system. The middle layer is the application server that interacts with the client and data server. Following three are the important units in the three-tier architecture-


 The client requests the resources to the server and is equipped with the user interface for the presentation of the response of the server.

 Application Server

The application server is the middle layer in the three-tier client server architecture. The application server provides the resources to the clients that are requested by the client from the user interface. The application server call the another database server to complete the specified task.

 Data Server

 The data server is the main important unit in the three-tier client server architecture. The data server provides the data to the application server that is required. Following figure is describing the process of three-tier architecture-




[1] Microsoft 2012, Client/Server Architecture, Viewed on 17th Jan 2015 <>

[2] Client-Server Architecture, Kathleen R. Murray May 2002, Viewed on 17th Jan 2015

[3]TechTarget 2015, White Paper: The role of the database administrator, Viewed on 17th Jan 2015 <>

[4]GITTA 2006, Database Schemes and Database Instances, Viewed on 17th Jan 2015 <>

[5] Winstudent 2014, The Database Manipulation Language (DML), Viewed on 17th Jan 2015 <> delivers assignment help to millions of students of USA. We have in-house teams of assignment writers who are experts on wide ranges of subjects. We have appointed teams of native writers who provide assignment help to students in New York City and all over the USA. They are skilled assignment writers who successfully cater to search terms like’ do my assignment in the USA' and readily entertain queries related to write my assignments.

Most Downloaded Sample of Programing

  166 Download  |   2 Pages 309 Words

1. How do these items act as barriers to intercultural communication?Answer:  The communication barriers Linguistic, Cultural and Emotional act as barriers for...

Read More

  65 Download  |   2 Pages 429 Words

A just and fair decision always reflects an objective process, however, not all decisions are fair and just because they have influences and impacts that is actuall...

Read More

  159 Download  |   10 Pages 2,301 Words

Question - Write a case study on Digital Forensic methodology?  ContentsExecutive Summary.Introduction.      Global F...

Read More

  39 Download  |   10 Pages 2,338 Words

 Table of ContentsIntroductionWeek 3: Critical ThinkingWeek 5: SWOT analysis of presentation skillsWeek 7: Reflective WritingWeek 11: Personal Ethi...

Read More

  90 Download  |   16 Pages 3,848 Words

Question-Write A report based on role of information technology of financial corporate sector company Aldermore bank?  Executive summaryThe report i...

Read More

  254 Download  |   9 Pages 2,091 Words

Question-Q1.Design a work break down structure (WBS) for this project with milestones?Q2. What are the key risks and how would you manage them?Q3. What are the key ...

Read More

  244 Download  |   24 Pages 5,949 Words

  The small business organizations need to have adoption of the cloud computing practices to a significant level. With the adoption of cloud computing...

Read More

  128 Download  |   11 Pages 2,608 Words

Question :Write a Literature Review for the Topic/Project below following a set structure. The Literature Review is a critical examination of the most relevant, r...

Read More

  55 Download  |   9 Pages 2,202 Words

Question 1 :Give a brief introduction and explanation (approximately 500 words) of the technology that you have chosen and then produce a technology road map that s...

Read More

  140 Download  |   15 Pages 3,562 Words

Introduction:Internet marketing or online marketing is the approach where the marketers are promoting the products with the help of internet. Under this process, th...

Read More

  358 Download  |   10 Pages 2,446 Words

Question:1. Briefly describe the business processes supported by a Supply Chain Management (SCM) information system. In a global business like Emerson what are th...

Read More

  230 Download  |   5 Pages 1,196 Words

Question:Read the case study ‘Success to Succession’. • Identify the importance of wetware costs. • Identify an organisation implementing an A...

Read More

  308 Download  |   9 Pages 2,002 Words

IntroductionThe current digital age allows most of the organisations around the world to have the information and communication technologies to have the business ...

Read More

  292 Download  |   9 Pages 2,193 Words

IntroductionIn this briefing paper, the ICT topic ‘Big Data’ will be reviewed from literatures. Big data is the new IT buzzword that refers to the vol...

Read More

  323 Download  |   7 Pages 1,626 Words

IntroductionIt is not necessary that a crime can only take place outside the protection of the home. In fact a large number of crimes take place in the home also....

Read More

  205 Download  |   4 Pages 823 Words

Question:1. What four main types of actions involve databases? Briefly discuss each.? 2. What are the responsibilities of the DBA and the database designers? 3. Wha...

Read More

  45 Download  |   7 Pages 1,743 Words

Question :What is effective professional communication? Answer:Professional communication is emerging as an area of investigation in various discipline...

Read More

  349 Download  |   2 Pages 332 Words

Question:To give  you  practical  experience  in using Entity-Relationship and Relational Database modeling techniques. Project Specifi...

Read More

  192 Download  |   10 Pages 2,454 Words

Question:Snort Rules                       &nbs...

Read More

  20 Download  |   12 Pages 2,870 Words

Question:As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare digital forensics investigative plan to enable a systematic...

Read More